Splint is a tool for statically checking C programs for security vulnerabilities and coding mistakes. With minimal effort, Splint can be used as a better lint.
D. Liu, and P. Ning. Security for Wireless Sensor Networks, volume 28 of Advances in Information Security, Springer US, 10.1007/978-0-387-46781-8_5.(2007)
K. Becker, G. Stumme, R. Wille, U. Wille, and M. Zickwolff. Knowledge Engineering and Knowledge Management Methods, Models, and Tools, volume 1937 of Lecture Notes in Computer Science, Springer, Berlin/Heidelberg, (2000)
S. Fahl, M. Harbach, M. Oltrogge, T. Muders, and M. Smith. Financial Cryptography and Data Security, volume 7859 of Lecture Notes in Computer Science, Springer Berlin Heidelberg, (2013)
F. Hermann, A. Schuller, S. Thiel, C. Knecht, and S. Scerri. Human-Computer Interaction. Users and Contexts of Use, volume 8006 of Lecture Notes in Computer Science, Springer Berlin Heidelberg, (2013)
C. Bellettini, and J. Rrushi. Proceedings of The Ifip Tc 11 23rd International Information Security Conference, volume 278 of IFIP – The International Federation for Information Processing, Springer US, (2008)
N. Forgó, A. Haidar, and H. Gerhartinger. Peter Coveney, Vanessa Díaz-Zuccarini, Peter Hunter, Marco Viceconti (editors), Computational biomedicine : modelling the human body, Oxford University Press, (2014)
J. Moskal, and C. Matheus. Rule Representation, Interchange and Reasoning on the Web, volume 5321 of Lecture Notes in Computer Science, Springer Berlin Heidelberg, (2008)
S. Fahl, M. Harbach, M. Oltrogge, T. Muders, and M. Smith. Financial Cryptography and Data Security, volume 7859 of Lecture Notes in Computer Science, Springer Berlin Heidelberg, (2013)
D. Bruschi, L. Martignoni, and M. Monga. Detection of Intrusions and Malware & Vulnerability
Assessment, volume 4064 of LNCS, Springer, Berlin/Heidelberg, Berlin, Germany, (2006)
D. Balzarotti, M. Monga, and S. Sicari. Quality of Protection: Security Measurements and
Metrics, volume 23 of Advances in Information Security, Springer, New York, (June 2006)
M. Vieira, H. Madeira, K. Sachs, and S. Kounev. Resilience Assessment and Evaluation of Computing Systems, Springer-Verlag, Berlin, Heidelberg, ISBN: 978-3-642-29031-2.(2012)
M. Schäfer, V. Lenders, and I. Martinovic. Applied Cryptography and Network Security, volume 7954 of Lecture Notes in Computer Science, Springer Berlin Heidelberg, (2013)
N. Pattan, and D. Madamanchi. Mobile Computing, Applications, and Services, volume 35 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, Springer Berlin Heidelberg, 10.1007/978-3-642-12607-9_21.(2010)
Y. Zhang, W. Trappe, Z. Li, M. Joglekar, and B. Nath. Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks, volume 30 of Advances in Information Security, Springer US, 10.1007/978-0-387-46276-9_6.(2007)
E. Mansfield, J. Pevehouse, and D. Bearce. Power and the purse : Economic statecraft, interdependence, and national security, Frank Cass, London and Portland, OR, (2000)
C. Kloukinas, and G. Spanoudakis. Trust, Privacy and Security in Digital Business, volume 4657 of Lecture Notes in Computer Science, Springer Berlin Heidelberg, (2007)
N. Gatti, M. Monga, and S. Sicari. Decision and Game Theory for Security, volume 6442 of Lecture Notes in Computer Science, Springer-Verlag Berlin Heidelberg, Berlin, Germany, (November 2010)
D. Bruschi, M. Monga, and E. Rosti. Crimine virtuale, minaccia reale. ICT Security:
politiche e strumenti di prevenzione, volume 571.2.7 of FTI Forum per la tecnologia dell'informazione, FrancoAngeli, (2004)
A. Fragkiadakis, V. Siris, and N. Petroulakis. Wired/Wireless Internet Communications, volume 6074 of Lecture Notes in Computer Science, Springer Berlin Heidelberg, (2010)
M. Vieira, H. Madeira, K. Sachs, and S. Kounev. Resilience Assessment and Evaluation of Computing Systems, Springer-Verlag, Berlin, Heidelberg, ISBN: 978-3-642-29031-2.(2012)
L. Lazos, and R. Poovendran. Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks, volume 30 of Advances in Information Security, Springer US, 10.1007/978-0-387-46276-9_8.(2007)
S. Brands, and D. Chaum. Advances in Cryptology, volume 765 of Lecture Notes in Computer Science, Springer Berlin Heidelberg, EUROCRYPT edition, (1994)
C. Bellettini, and J. Rrushi. Critical Infrastructure Protection II, volume 290 of IFIP Advances in Information and Communication Technology, Springer US, (2008)
J. Bender, M. Fischlin, and D. Kügler. Information Security, volume 5735 of Lecture Notes in Computer Science, Springer Berlin / Heidelberg, 10.1007/978-3-642-04474-8_3.(2009)
D. Goel, E. Kher, S. Joag, V. Mujumdar, M. Griss, and A. Dey. Mobile Computing, Applications, and Services, volume 35 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, Springer Berlin Heidelberg, 10.1007/978-3-642-12607-9_3.(2010)
J. Rennstich. Emerging issues in the 21st century world-system: New theoretical directions for the 21st century world-system, 2, Praeger, Westport, CT, (2003)
R. Hasan, and W. Yurcik. StorageSS '06: Proceedings of the second ACM workshop on Storage security and survivability, page 1--8. New York, NY, USA, ACM, (2006)
J. Schulte, I. Döpke, R. Keil, K. Stark, and J. Eder. The 5th International Conference on Collaborative Computing: Networking, Applications and Worksharing, (2009)
N. Borisov, I. Goldberg, and D. Wagner. MobiCom '01: Proceedings of the 7th annual international conference on Mobile computing and networking, page 180--189. New York, NY, USA, ACM, (2001)
M. Harbach, S. Fahl, T. Muders, and M. Smith. Proceedings of the 2012 ACM conference on Computer and communications security, page 989--991. New York, NY, USA, ACM, (2012)
S. Fahl, Y. Acar, H. Perl, and M. Smith. ASIA CCS '14 Proceedings of the 9th ACM symposium on Information, computer and communications security, ACM, (2014)
S. Fahl, M. Harbach, Y. Acar, and M. Smith. Proceedings of the Ninth Symposium on Usable Privacy and Security, page 13:1--13:13. New York, NY, USA, ACM, (2013)
R. Keil, J. Schulte, and I. Döpke. Proceedings of the 5th International Conference on Advanced Information Management and Service, 0, page 898--906. Los Alamitos, CA, USA, IEEE Computer Society, (August 2009)
J. Jurjens. ASE '06: Proceedings of the 21st IEEE International Conference on Automated Software Engineering (ASE'06), page 167--176. Washington, DC, USA, IEEE Computer Society, (2006)
C. Haley, R. Laney, and B. Nuseibeh. AOSD '04: Proceedings of the 3rd international conference on Aspect-oriented software development, page 112--121. New York, NY, USA, ACM Press, (2004)
S. Bush. Invited Paper: SFI Workshop: Resilient and Adaptive Defense of Computing
Networks 2003, Complexity and Inference, DIMACS Center, Rutgers University, Piscataway, NJ, (June 2003)
Y. Zhang, Q. Liu, and Y. Liu. Proceedings of the 2014 International Conference on Computer Science and Electronic Technology, page 312-316. Atlantis Press, (January 2015)
C. Liu, G. Clark, and J. Lindqvist. Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems, page 374-386. New York, NY, USA, Association for Computing Machinery (ACM), (2017)
A. Greubel, A. Dmitrienko, and S. Kounev. Proceedings of the 34th Annual Computer Security Applications Conference, New York, NY, USA, ACM, (December 2018)
T. Prantl, P. Ten, L. Iffländer, A. Dmitrenko, S. Kounev, and C. Krupitzer. 2020 IEEE 28th International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems (MASCOTS), (November 2020)Acceptance Rate: 27\%.