Treffer 1 - 20 von 2.150

1

An Investigation into Misuse of Java Security APIs by Large Language Models
Mousavi, Zahra ; Islam, Chadni ; Moore, Kristen ; et al.

Computer Science - Crypt... Computer Science - Compu... Computer Science - Compu...
Report
Merkliste
2

Java Platform Security: a Behavioral Model for Speculative Execution Vulnerabilities
Parekh, Shikha
2025 International Conference on Intelligent Communication Networks and Computational Techniques (ICICNCT) Intelligent Communication Networks and Computational Techniques (ICICNCT), 2025 International Conference on. :1-7 Sep, 2025

Konferenz
Merkliste
3

Teaching Java security to enhance cybersecurity education
Haywood, Adley ; Yu, Huiming ; Yuan, Xiaohong
2013 Proceedings of IEEE Southeastcon Southeastcon, 2013 Proceedings of IEEE. :1-6 Apr, 2013

Konferenz
Merkliste
4

Java security extensions for a Java server in a hostile environment
Wheeler, D.M. ; Conyers, A. ; Luo, J. ; et al.
Seventeenth Annual Computer Security Applications Conference Computer security applications Computer Security Applications Conference, 2001. ACSAC 2001. Proceedings 17th Annual. :64-73 2001

Konferenz
Merkliste
5

Have Java's Security Issues Gotten out of Hand?
Garber, Lee
Computer. 45(12):18-21 Dec, 2012

Fachzeitschrift
Merkliste
6

An evaluation of the Java security model
Sterbenz, A.
Proceedings 12th Annual Computer Security Applications Conference Computer security applications Computer Security Applications Conference, 1996., 12th Annual. :2-14 1996

Konferenz
Merkliste
7

Java Security: A Ten Year Retrospective
Gong, Li
2009 Annual Computer Security Applications Conference Computer Security Applications Conference, 2009. ACSAC '09. Annual. :395-405 Dec, 2009

Konferenz
Merkliste
8

Java security: from HotJava to Netscape and beyond
Dean, D. ; Felten, E.W. ; Wallach, D.S.
Proceedings 1996 IEEE Symposium on Security and Privacy Security and privacy Security and Privacy, 1996. Proceedings., 1996 IEEE Symposium on. :190-200 1996

Konferenz
Merkliste
9

Research on NTRU Algorithm for Mobile Java Security
Shen, Xiaoyu ; Du, Zhenjun ; Chen, Rong
2009 International Conference on Scalable Computing and Communications; Eighth International Conference on Embedded Computing Scalable Computing and Communications; Eighth International Conference on Embedded Computing, 2009. SCALCOM-EMBEDDEDCOM'09. International Conference on. :366-369 Sep, 2009

Konferenz
Merkliste
10

Java security: present and near future
Li Gong
IEEE Micro Micro, IEEE. 17(3):14-19 Jun, 1997

Fachzeitschrift
Merkliste
11

Enabling Dynamic Security Policy in the Java Security Manager
FPS 2012; Foundations and practice of security

Autrel, F. ; Cuppens-Boulahia, N. ; Cuppens, F.
LECTURE NOTES IN COMPUTER SCIENCE. (7743):180-193

Konferenz
Merkliste
12

A systematic analysis and hardening of the Java security architecture
Holzinger, Philipp Albert ; Holzinger, Philipp Albert

E-Ressource
Merkliste
15

CHERI JNI: Sinking the Java Security Model into the C
Chisnall, David ; Davis, Brooks ; Gudka, Khilan ; et al.
ACM SIGPLAN notices. 52(4):569-584

Zeitschrift
Merkliste
16

Grounded Look at Java Security
Gougher, R.A.
IEEE Software IEEE Softw. Software, IEEE. 15(6):124-125 Jan, 1998

Fachzeitschrift
Merkliste
17

Overview of Java Security
Electronic commerce research; ICECR 4

Vasiu, L.
INTERNATIONAL CONFERENCE ON ELECTRONIC COMMERCE RESEARCH. 2:541-549

Konferenz
Merkliste
18

Reflections on MOPs, Components, and Java Security
Object-oriented programming; ECOOP 2001

Caromel, D. ; Vayssiere, J.
LECTURE NOTES IN COMPUTER SCIENCE. :256-274

Konferenz
Merkliste
19

Performance of the Java security manager
Herzog, Almut ; Shahmehri, Nahid
In Computers & Security 2005 24(3):192-207

Fachzeitschrift
Merkliste
20

Java™ Security Infrastructure for Global Electronic Commerce
Software technology and engineering practice

Muftic, S. ; Morogan, M.
SOFTWARE TECHNOLOGY AND ENGINEERING PRACTICE. :181-186

Konferenz
Merkliste

Filter