Research on Major Weakness Rules for Secure Software Development
Vol. 38, No. 10, pp. 831-840, Oct. 2013
Abstract
Statistics
Cumulative Counts from November, 2022
Multiple requests among the same browser session are counted as one view. If you mouse over a chart, the values of data points will be shown.
Multiple requests among the same browser session are counted as one view. If you mouse over a chart, the values of data points will be shown.
|
Cite this article
[IEEE Style]
J. Bang and R. Ha, "Research on Major Weakness Rules for Secure Software Development," The Journal of Korean Institute of Communications and Information Sciences, vol. 38, no. 10, pp. 831-840, 2013. DOI: .
[ACM Style]
Jiho Bang and Rhan Ha. 2013. Research on Major Weakness Rules for Secure Software Development. The Journal of Korean Institute of Communications and Information Sciences, 38, 10, (2013), 831-840. DOI: .
[KICS Style]
Jiho Bang and Rhan Ha, "Research on Major Weakness Rules for Secure Software Development," The Journal of Korean Institute of Communications and Information Sciences, vol. 38, no. 10, pp. 831-840, 10. 2013.