Robert C. Seacord
#32,082
Most Influential Person Now
American computer security expert
Robert C. Seacord's AcademicInfluence.com Rankings
Robert C. Seacordcriminal-justice Degrees
Criminal Justice
#269
World Rank
#299
Historical Rank
#87
USA Rank
Cyber Security
#36
World Rank
#38
Historical Rank
#13
USA Rank
Robert C. Seacordcomputer-science Degrees
Computer Science
#1634
World Rank
#1689
Historical Rank
#794
USA Rank
Cybersecurity
#37
World Rank
#39
Historical Rank
#14
USA Rank
Database
#9642
World Rank
#10186
Historical Rank
#1386
USA Rank
Download Badge
Criminal Justice Computer Science
Robert C. Seacord's Degrees
- PhD Computer Science University of Notre Dame
- Masters Computer Science University of Idaho
- Bachelors Computer Science Rensselaer Polytechnic Institute
Similar Degrees You Can Earn
Why Is Robert C. Seacord Influential?
(Suggest an Edit or Addition)According to Wikipedia, Robert C. Seacord is an American computer security specialist and writer. He is the author of books on computer security, legacy system modernization, and component-based software engineering. Education Seacord earned a Bachelor's degree in computer science from Rensselaer Polytechnic Institute in December 1983. He has also completed graduate-level courses at Carnegie-Mellon University in software design, creation and maintenance; user interfaces; software project management; formal methods; human factors; operating systems; and entrepreneurship.
Robert C. Seacord's Published Works
Published Works
- Modernizing Legacy Systems - Software Technologies, Engineering Processes, and Business Practices (2003) (310)
- Volume II: Technical Concepts of Component-Based Software Engineering (2000) (272)
- Building systems from commercial components (2002) (209)
- Secure coding in C and C (2005) (201)
- AGORA: A Search Engine for Software Components (1998) (127)
- A Survey of Legacy System Modernization Approaches (2000) (93)
- The CERT C Secure Coding Standard (2008) (89)
- Secure Design Patterns (2009) (85)
- A survey of black-box modernization approaches for information systems (2000) (72)
- The Cert Oracle Secure Coding Standard for Java (2011) (61)
- Volume I: Market Assessment of Component-Based Software Engineering (2001) (59)
- A Structured Approach to Classifying Security Vulnerabilities (2005) (49)
- Measuring software sustainability (2003) (42)
- As-If Infinitely Ranged Integer Model (2010) (28)
- Replaceable Components and the Service Provider Interface (2002) (22)
- K-BACEE: knowledge-based automated component ensemble evaluation (2001) (21)
- Java Coding Guidelines: 75 Recommendations for Reliable and Secure Programs (2013) (17)
- Secure Coding Standards (2006) (16)
- An Enterprise Information System Data Architecture Guide (2001) (15)
- The CERT® C Coding Standard, Second Edition: 98 Rules for Developing Safe, Reliable, and Secure Systems (2014) (15)
- Serpent: a user interface management system (1990) (14)
- Custom vs. off-the-shelf architecture (1999) (14)
- Serpent: a user interface environment (1990) (13)
- Secure Coding in C and C++ (SEI Series in Software Engineering) (2013) (12)
- Legacy System Modernization Strategies (2001) (11)
- Source Code Analysis Laboratory (SCALe) (2012) (10)
- Secure coding in C and C++ of strings and integers (2006) (9)
- Ranged Integers for the C Programming Language (2007) (8)
- An Online Learning Approach to Information Systems Security Education (2011) (7)
- Teaching secure coding: report from summit on education in secure software (2012) (7)
- A course-based usability analysis of Cilk Plus and OpenMP (2015) (7)
- Mining and managing software assets (2002) (6)
- Automated Component Ensemble Evaluation (2002) (6)
- Component-Based Software Engineering Processes (1999) (6)
- Effective C (2020) (5)
- User Interface Management Systems and Application Portability (1990) (5)
- Theory and Practice of Enterprise JavaBeanTM Portability (1999) (5)
- The Serpent Runtime Architecture and Dialogue Model (1988) (5)
- Java Concurrency Guidelines (2010) (5)
- Source Code Analysis Laboratory (SCALe) for Energy Delivery Systems (2010) (4)
- Incremental Modernization of Legacy Systems (2001) (3)
- Java Deserialization Vulnerabilities and Mitigations (2017) (3)
- A Comparison of Component Integration between JavaBeans and PCTE (1998) (3)
- Workshop on Component-Based Software Engineering Processes (1999) (3)
- Maintaining Transactional Context: A Model Problem (2001) (3)
- Improving the Automated Detection and Analysis of Secure Coding Violations (2014) (3)
- SEI Independent Research and Development Projects (2003) (3)
- Uninitialized Reads (2016) (2)
- K-BACEE : A Knowledge-Based Automated Component Ensemble Evaluation Tool (2000) (2)
- Component Web search engines (2000) (2)
- Life Cycle Activity Areas for Component-Based Software Engineering Processes (1999) (1)
- Theory and Practice of Enterprise JavaBean TM Portability (1999) (1)
- Rule-Based COTS Integration (2003) (1)
- Introduction to Software Security for Mobile Platforms Minitrack (2014) (1)
- Specifications for Managed Strings (2006) (1)
- Mobile device security (2015) (1)
- Custom vs . Vendor-Integrated COTS Software (1999) (1)
- Supporting the Use of CERT ® Secure Coding Standards in DoD Acquisitions (2012) (1)
- Safety and Security Coding Standards for C (2016) (1)
- Secure Software Architecture, Design, Implementation and Assurance (2007) (1)
- The COTS Spot CMMISM and BSCC (2003) (0)
- Connection method, node connection method, data processing method and method for inserting node in tree (1989) (0)
- Secure Coding Becomes Standard (2007) (0)
- Performance of Compiler-Assisted Memory Safety Checking (2014) (0)
- Evaluation of CERT Secure Coding Rules through Integration with Source Code Analysis Tools (2008) (0)
- C language mechanism for error handling and deferred cleanup (2021) (0)
- Securing Internet sessions with Sorbet (1999) (0)
- SEI Independent Research and Development Projects (FY 2003) (2003) (0)
- N 2336 Title : Bounds-checking Interfaces : Field Experience and Future Directions Summary (2019) (0)
- As-If Infinitely Ranged Integer Model, Second Edition (2010) (0)
- A method for processing hierarchical data (1989) (0)
- for Software Components (1998) (0)
- Theory and Practice of Enterprise JavaBean(TRADEMARK) Portability (1999) (0)
- Building Systems from Commercial Components Using Model Problems (2001) (0)
- Architecture and Design Considerations for Secure Software (2011) (0)
- Introduction to HICSS-47 Software Security for Mobile Platforms Minitrack (2014) (0)
- Instrumented Fuzz Testing Using AIR Integers (2010) (0)
- Workshop on COTS integration and evaluation (2002) (0)
- Half day tutorial in methods of component-based software engineering essential concepts and classroom experience (2001) (0)
- Uninitialized reads (2017) (0)
- Browsers for distributed systems: Universal paradigm or siren's song? (1998) (0)
- Specifications for Managed Strings, Second Edition (2010) (0)
- Supporting the Use of CERT (registered trademark) Secure Coding Standards in DoD Acquisitions (2012) (0)
This paper list is powered by the following services:
Other Resources About Robert C. Seacord
What Schools Are Affiliated With Robert C. Seacord?
Robert C. Seacord is affiliated with the following schools: