![](https://dblp.uni-trier.de./img/logo.320x120.png)
![search dblp search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
default search action
1st SEAD@ICSE 2018: Gothenburg, Sweden
- Mehdi Mirakhorli, Matthias Galster:
Proceedings of the 1st International Workshop on Security Awareness from Design to Deployment, SEAD@ICSE 2018, Gothenburg, Sweden, May 27, 2018. ACM 2018, ISBN 978-1-4503-5727-2 - Laurie A. Williams:
Continuously integrating security. 1-2 - Pete Rotella:
Software security vulnerabilities: baselining and benchmarking. 3-10 - Laurens Sion
, Koen Yskout
, Dimitri Van Landuyt
, Wouter Joosen:
Risk-based design security analysis. 11-18 - Anthony Peruma
, Daniel E. Krutz:
Understanding the relationship between quality and security: a large-scale analysis of Android applications. 19-25 - Tamara Lopez
, Thein Than Tun, Arosha K. Bandara
, Mark Levine
, Bashar Nuseibeh
, Helen Sharp
:
An investigation of security conversations in stack overflow: perceptions of security and community involvement. 26-32 - Faeq Alrimawi, Liliana Pasquale, Deepak Mehta, Bashar Nuseibeh
:
I've seen this before: sharing cyber-physical incident knowledge. 33-40 - Dirk van der Linden
, Awais Rashid
, Emma J. Williams
, Bogdan Warinschi:
Safe cryptography for all: towards visual metaphor driven cryptography building blocks. 41-44 - Alexander van Den Berghe, Koen Yskout
, Wouter Joosen:
Security patterns 2.0: towards security patterns based on security building blocks. 45-48 - Rohan Krishnamurthy, Michael Meinel, Carina Haupt, Andreas Schreiber
, Patrick Mäder:
DLR secure software engineering: position and vision paper. 49-50 - Anthony Peruma
, Samuel A. Malachowsky, Daniel E. Krutz:
Providing an experiential cybersecurity learning experience through mobile security labs. 51-54
![](https://dblp.uni-trier.de./img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.