Secure coding in software development
The demand of secure computing systems and its platform is crucial in today's networked and computing world. As the number of illegitimate users and applications increased, the systems vulnerabilities can be a treat to individuals and organizations. This paper highlights software vulnerabilitie...
| Main Authors: | Zainuddin @ Zenah, Nor Harisah, Abdul Aziz, Normaziah |
|---|---|
| Format: | Proceeding Paper |
| Language: | English |
| Published: |
2011
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/22606/ http://irep.iium.edu.my/22606/1/secure_coding_in_software_development.pdf |
Similar Items
Web application - What makes it secure or insecure?
by: Abdul Aziz, Normaziah, et al.
Published: (2011)
by: Abdul Aziz, Normaziah, et al.
Published: (2011)
Secure coding in cross site scripting
by: Abdul Aziz, Normaziah, et al.
Published: (2011)
by: Abdul Aziz, Normaziah, et al.
Published: (2011)
Software defined networking (SDN) and its security issues
by: Abdul Aziz, Normaziah, et al.
Published: (2019)
by: Abdul Aziz, Normaziah, et al.
Published: (2019)
Guideline for privacy and security in Cloud First Security Environment
by: Abdul Aziz, Normaziah, et al.
Published: (2017)
by: Abdul Aziz, Normaziah, et al.
Published: (2017)
Android Malware classification using static code analysis and Apriori algorithm improved with particle swarm optimization
by: Adebayo, Olawale Surajudeen, et al.
Published: (2014)
by: Adebayo, Olawale Surajudeen, et al.
Published: (2014)
Network forensics: detection and mitigation of botnet malicious code via darknet
by: R. Othman, R. Azrina, et al.
Published: (2012)
by: R. Othman, R. Azrina, et al.
Published: (2012)
Risk identification for an information security management system implementation
by: Ramli, Noraza, et al.
Published: (2012)
by: Ramli, Noraza, et al.
Published: (2012)
Static code analysis of permission-based features for android malware classification using apriori algorithm with particle swarm optimization
by: Adebayo, Olawale Surajudeen, et al.
Published: (2015)
by: Adebayo, Olawale Surajudeen, et al.
Published: (2015)
VAP Code: A Secure Graphical Password Scheme for Smart Devices
by: Azad, Saiful, et al.
Published: (2016)
by: Azad, Saiful, et al.
Published: (2016)
Inculcating secure coding for beginners
by: A. Aziz, Normaziah, et al.
Published: (2017)
by: A. Aziz, Normaziah, et al.
Published: (2017)
VAP Code: A Secure Graphical Password for Smart Devices
by: Azad, Saiful, et al.
Published: (2017)
by: Azad, Saiful, et al.
Published: (2017)
The Application of New Software Development
by: Oxley, A.
Published: (2006)
by: Oxley, A.
Published: (2006)
Software Project Management: A Practical Guide to manage Small Software Development Project.
by: Abd Ghani, M. K.
Published: (2011)
by: Abd Ghani, M. K.
Published: (2011)
Supporting system development by novice software engineers using a tutor-based software visualization (TubVis) approach
by: Sulaiman, Shahida, et al.
Published: (2008)
by: Sulaiman, Shahida, et al.
Published: (2008)
Software requirement analysis for point of sales tinting software
by: Manikam, Sadesh
Published: (2007)
by: Manikam, Sadesh
Published: (2007)
The rise of software vulnerability: Taxonomy of software vulnerabilities detection and machine learning approaches
by: Hazim, Hanif, et al.
Published: (2021)
by: Hazim, Hanif, et al.
Published: (2021)
WINPCAP : design and development of covert channel for secure communication
by: Omar, Syaril Nizam
Published: (2007)
by: Omar, Syaril Nizam
Published: (2007)
Secure E-Voting With Blind Signature
by: Ibrahim, Subariah, et al.
Published: (2003)
by: Ibrahim, Subariah, et al.
Published: (2003)
Development of an imputation technique - INI for software metric database with incomplete data
by: Wasito, Ito, et al.
Published: (2007)
by: Wasito, Ito, et al.
Published: (2007)
The evolution and trend of chain code scheme
by: Wulandhari, Lily Ayu, et al.
Published: (2008)
by: Wulandhari, Lily Ayu, et al.
Published: (2008)
Competency assessment of short free text answers
by: Lajis, Adidah, et al.
Published: (2014)
by: Lajis, Adidah, et al.
Published: (2014)
NL scoring and Bloom competency test: an experimental result
by: Lajis, Adidah, et al.
Published: (2012)
by: Lajis, Adidah, et al.
Published: (2012)
Exploring the synergy: user stories in agile software development
by: Siti Nur Fathin Najwa, Mustaffa, et al.
Published: (2025)
by: Siti Nur Fathin Najwa, Mustaffa, et al.
Published: (2025)
Software Learning Tool to Calculate Isotope Pattern for Chemistry Area of Study
by: Kamalrudin, Massila, et al.
Published: (2008)
by: Kamalrudin, Massila, et al.
Published: (2008)
Software Requirement Specification Tool
by: Kong, Meng Yeow
Published: (2016)
by: Kong, Meng Yeow
Published: (2016)
Development of low-cost supercomputer based on used CPU's using open source software
by: Sulaiman, Hanifah, et al.
Published: (2008)
by: Sulaiman, Hanifah, et al.
Published: (2008)
Framework for component-based software engineering of embedded software in resource constrained real-time systems
by: Abg. Jawawi, Dayang Norhayati, et al.
Published: (2008)
by: Abg. Jawawi, Dayang Norhayati, et al.
Published: (2008)
An algebraic approach for sentence based feature extraction applied for automatic text summarization
by: Batcha, Nowshath Kadhar, et al.
Published: (2014)
by: Batcha, Nowshath Kadhar, et al.
Published: (2014)
Techniques for analysing android malware
by: Adebayo, Olawale Surajudeen, et al.
Published: (2014)
by: Adebayo, Olawale Surajudeen, et al.
Published: (2014)
An intelligence based model for the prevention of advanced cyber-attacks
by: Adebayo, Olawale Surajudeen, et al.
Published: (2014)
by: Adebayo, Olawale Surajudeen, et al.
Published: (2014)
The trend of mobile malwares and effective detection techniques
by: Abdul Aziz, Normaziah, et al.
Published: (2015)
by: Abdul Aziz, Normaziah, et al.
Published: (2015)
A new efficient text detection method for image spam filtering
by: Al Muataz, Zubaidah, et al.
Published: (2015)
by: Al Muataz, Zubaidah, et al.
Published: (2015)
An evaluation of traceability approaches to support software evolution
by: Rochimah, S., et al.
Published: (2007)
by: Rochimah, S., et al.
Published: (2007)
Medical certificate verification system using QR code
by: Lai, Chong Lan
Published: (2014)
by: Lai, Chong Lan
Published: (2014)
Neural network corner detection of vertex chain code
by: Subri, S. H., et al.
Published: (2006)
by: Subri, S. H., et al.
Published: (2006)
Information security culture guidelines to improve employee’s security behavior: A review of empirical studies
by: Akhyari, N., et al.
Published: (2018)
by: Akhyari, N., et al.
Published: (2018)
Experimental Model for Teaching Software Testing
by: Kamal Z., Zamli, et al.
Published: (2015)
by: Kamal Z., Zamli, et al.
Published: (2015)
Network security setting
by: Shah, Asadullah, et al.
Published: (2011)
by: Shah, Asadullah, et al.
Published: (2011)
Security of multimedia in the web
by: Zeki, Akram M.
Published: (2011)
by: Zeki, Akram M.
Published: (2011)
Security Mechanism for MANETs
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2009)
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2009)
Similar Items
-
Web application - What makes it secure or insecure?
by: Abdul Aziz, Normaziah, et al.
Published: (2011) -
Secure coding in cross site scripting
by: Abdul Aziz, Normaziah, et al.
Published: (2011) -
Software defined networking (SDN) and its security issues
by: Abdul Aziz, Normaziah, et al.
Published: (2019) -
Guideline for privacy and security in Cloud First Security Environment
by: Abdul Aziz, Normaziah, et al.
Published: (2017) -
Android Malware classification using static code analysis and Apriori algorithm improved with particle swarm optimization
by: Adebayo, Olawale Surajudeen, et al.
Published: (2014)