Abstract
Computer plays an important role in human life and work, and the popularization of computer education level is more closely related to the overall strength of the country. Software development is an important factor to improve the level of the computer. At the same time, the application of software security technology is also an important way to ensure the normal operation of the computer. This requires paying attention to the specific application of security technology in software development computers. The purpose of this paper is to investigate the technical problems of computer security software development. This work provides an overview of the dynamic data reliability images, based on interactions within the data during software development. The algorithm can be applied to various stages of the software version to protect the copyright of the software. The test in this paper shows that the average correction rate reaches about 40% in open source projects, and the software can also run safely during normal use. It has an excellent ability to resist various cyber-attacks.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
David, A., Xavier, B., Dolors, C., et al.: Non-functional requirements in model-driven development of service-oriented architectures. Sci. Comput. Program. 168(DEC.15), 18–37 (2018)
Zhao, Y., Yang, Z., Ma, D.: A survey on formal specification and verification of separation kernels. Front. Comput. Sci. China. 11(4), 585–607 (2017)
Gardner, Z., Philippa, S.: Verified trustworthy software systems. Philos. Trans. R. Soc. A. Math. Phys. Eng. Sci. 375(2104), 20150408 (2017)
Ibrahim, J., Zhu, J., Hanif, S., Shafiq, S., et al.: Emerging trends in software testing tools & methodologies: a review.Int. J. Comput. Sci. Inf. Secur. 17(7), 108–112 (2019)
Ateoullar, D., Mishra, A.: Automation testing tools: a comparative view. Int. J. Inf. Comput. Secur. 12(4), 63–76 (2020)
Agrawal, A., Zarour, M., Alenezi, M., et al.: Security durability assessment through fuzzy analytic hierarchy process. Peer J. Comput. Sci. 5(5), e215 (2019)
Jafari, A.J., Rasoolzadegan, A.: Security patterns: a systematic mapping study. J. Comput. Lang. 56, 100938 (2020)
Vidas, T., Larsen, P., Okhravi, H., et al.: Changing the game of software security. IEEE Secur. Priv. 16(2), 10–11 (2018)
Belinda, B.I., Emmanuel, A.A., Solomon, N., et al.: Evaluating software quality attributes using analytic hierarchy process (AHP). Int. J. Adv. Comput. Sci. Appl. 12(3), 165–173 (2021)
Meldrum, S., Licorish, S.A., Owen, C.A., et al.: Understanding stack overflow code quality: a recommendation of caution. Sci. Comput. Program. 199, 102516 (2020)
Jj, A., Jyl, B., Ys, A.: A data type inference method based on long short-term memory by improved feature for weakness analysis in binary code - ScienceDirect. Fut. Gener. Comput. Syst. 100, 1044–1052 (2019)
Devi, T.R., Rama, B.: Software reusability development through NFL approach for identifying security based inner relationships of affecting factors. Int. J. Elect. Comput. Eng. 10(1), 333 (2020)
Acknowledgment
Supported by Sichuan Science and Technology Program, NO: 22ZDYF2965.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Xian, M., Zheng, X., Ye, X. (2023). Application of Computer Network Security Technology in Software Development. In: Xu, Z., Alrabaee, S., Loyola-González, O., Cahyani, N.D.W., Ab Rahman, N.H. (eds) Cyber Security Intelligence and Analytics. CSIA 2023. Lecture Notes on Data Engineering and Communications Technologies, vol 173. Springer, Cham. https://doi.org/10.1007/978-3-031-31775-0_13
Download citation
DOI: https://doi.org/10.1007/978-3-031-31775-0_13
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-31774-3
Online ISBN: 978-3-031-31775-0
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)