• search
    search
  • reviewers
    reviewers
  • feeds
    feeds
  • assignments
    assignments
  • settings
  • logout

Structuring a Comprehensive Software Security Course Around the OWASP Application Security Verification Standard.

Sarah ElderNusrat ZahanValeri KozarevRui ShuTim MenziesLaurie A. Williams
Published in: ICSE (SEET) (2021)
Keyphrases
  • data sets
  • website
  • decision support
  • access control
  • genetic algorithm
  • learning algorithm
  • sensor networks
  • security issues
  • security analysis
  • iso iec
  • security systems
  • network connection