2008 Second International Conference on Emerging Security Information, Systems and Technologies 2008
DOI: 10.1109/securware.2008.20
|View full text |Cite
|
Sign up to set email alerts
|

Designing an Undergraduate Software Security Course

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2009
2009
2013
2013

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 4 publications
0
2
0
Order By: Relevance
“…The tools include a packet sniffer simulator, a Simulation of Kerberos Authentication Architecture, and a Visualization tool for Wireless Network Attacks. An undergraduate software security course described in [12] introduces a security development lifecycle model, and tools and techniques for designing trustworthy software.…”
Section: Security Coursesmentioning
confidence: 99%
“…The tools include a packet sniffer simulator, a Simulation of Kerberos Authentication Architecture, and a Visualization tool for Wireless Network Attacks. An undergraduate software security course described in [12] introduces a security development lifecycle model, and tools and techniques for designing trustworthy software.…”
Section: Security Coursesmentioning
confidence: 99%
“…An informal survey of the top fifteen computer science universities revealed only four to include a software security course designed specifically for undergraduates [14]. Those colleges that did offer software security education did so through a focused technical elective [11].…”
Section: Prior Workmentioning
confidence: 99%