Login / Signup
Structuring a Comprehensive Software Security Course Around the OWASP Application Security Verification Standard.
Sarah Elder
Nusrat Zahan
Valeri Kozarev
Rui Shu
Tim Menzies
Laurie A. Williams
Published in:
ICSE (SEET) (2021)
Keyphrases
</>
data sets
website
decision support
access control
genetic algorithm
learning algorithm
sensor networks
security issues
security analysis
iso iec
security systems
network connection