Filtros : "Noruega" "CHAIM, MARCOS LORDELLO" Limpar

Filtros



Refine with date range


  • Source: International Journal of Systems and Software Security and Protection. Unidade: EACH

    Subjects: DESENVOLVIMENTO DE SOFTWARE, VULNERABILIDADE, SEGURANÇA DE SOFTWARE

    Acesso à fonteDOIHow to cite
    A citação é gerada automaticamente e pode não estar totalmente de acordo com as normas
    • ABNT

      CHAIM, Marcos Lordello e SANTOS, Daniel Soares e CRUZES, Daniela Soares. What do we know about buffer overflow detection?. International Journal of Systems and Software Security and Protection, v. 9, n. 3, p. 01-33, 2018Tradução . . Disponível em: https://doi.org/10.4018/IJSSSP.2018070101. Acesso em: 13 maio 2024.
    • APA

      Chaim, M. L., Santos, D. S., & Cruzes, D. S. (2018). What do we know about buffer overflow detection? International Journal of Systems and Software Security and Protection, 9( 3), 01-33. doi:10.4018/IJSSSP.2018070101
    • NLM

      Chaim ML, Santos DS, Cruzes DS. What do we know about buffer overflow detection? [Internet]. International Journal of Systems and Software Security and Protection. 2018 ; 9( 3): 01-33.[citado 2024 maio 13 ] Available from: https://doi.org/10.4018/IJSSSP.2018070101
    • Vancouver

      Chaim ML, Santos DS, Cruzes DS. What do we know about buffer overflow detection? [Internet]. International Journal of Systems and Software Security and Protection. 2018 ; 9( 3): 01-33.[citado 2024 maio 13 ] Available from: https://doi.org/10.4018/IJSSSP.2018070101
  • Source: CEUR Workshop Proceedings. Unidade: EACH

    Subjects: COMPUTAÇÃO MÓVEL, SEGURANÇA DE REDES

    Acesso à fonteHow to cite
    A citação é gerada automaticamente e pode não estar totalmente de acordo com as normas
    • ABNT

      OYETOYAN, Tosin Daniel e CHAIM, Marcos Lordello. Comparing capability of static analysis tools to detect security weaknesses in mobile applications. CEUR Workshop Proceedings, v. 1977, p. 8-18, 2017Tradução . . Disponível em: https://brage.bibsys.no/xmlui/bitstream/handle/11250/2456625/paper2.pdf?sequence=7&isAllowed=y. Acesso em: 13 maio 2024.
    • APA

      Oyetoyan, T. D., & Chaim, M. L. (2017). Comparing capability of static analysis tools to detect security weaknesses in mobile applications. CEUR Workshop Proceedings, 1977, 8-18. Recuperado de https://brage.bibsys.no/xmlui/bitstream/handle/11250/2456625/paper2.pdf?sequence=7&isAllowed=y
    • NLM

      Oyetoyan TD, Chaim ML. Comparing capability of static analysis tools to detect security weaknesses in mobile applications [Internet]. CEUR Workshop Proceedings. 2017 ; 1977 8-18.[citado 2024 maio 13 ] Available from: https://brage.bibsys.no/xmlui/bitstream/handle/11250/2456625/paper2.pdf?sequence=7&isAllowed=y
    • Vancouver

      Oyetoyan TD, Chaim ML. Comparing capability of static analysis tools to detect security weaknesses in mobile applications [Internet]. CEUR Workshop Proceedings. 2017 ; 1977 8-18.[citado 2024 maio 13 ] Available from: https://brage.bibsys.no/xmlui/bitstream/handle/11250/2456625/paper2.pdf?sequence=7&isAllowed=y

Digital Library of Intellectual Production of Universidade de São Paulo     2012 - 2024