Results 21 to 30 of about 447,234 (333)

Faults in Linux 2.6 [PDF]

open access: yes, 2014
In August 2011, Linux entered its third decade. Ten years before, Chou et al. published a study of faults found by applying a static analyzer to Linux versions 1.0 through 2.4.1. A major result of their work was that the drivers directory contained up to
Calvès, Christophe   +5 more
core   +5 more sources

Linux XIA: an interoperable meta network architecture to crowdsource the future Internet [PDF]

open access: yes, 2015
With the growing number of proposed clean-slate redesigns of the Internet, the need for a medium that enables all stakeholders to participate in the realization, evaluation, and selection of these designs is increasing.
Byers, John   +2 more
core   +3 more sources

ConfigFix: Interactive Configuration Conflict Resolution for the Linux Kernel [PDF]

open access: yes2021 IEEE/ACM 43rd International Conference on Software Engineering: Software Engineering in Practice (ICSE-SEIP), 2020
Highly configurable systems are highly complex systems. The Linux kernel is arguably one of the most well-known examples. Given its vast configuration space, researchers have used it to conduct many empirical studies as well as to build dedicated methods
Patrick Franz   +4 more
semanticscholar   +1 more source

A Linux in unikernel clothing

open access: yesEuropean Conference on Computer Systems, 2020
Unikernels leverage library OS architectures to run isolated workloads on the cloud. They have garnered attention in part due to their promised performance characteristics such as small image size, fast boot time, low memory footprint and application ...
H. Kuo   +3 more
semanticscholar   +1 more source

Research on WiFi Penetration Testing with Kali Linux

open access: yesComplex, 2021
Aiming at the vulnerability of wireless network, this paper proposed a method of WiFi penetration testing based on Kali Linux which is divided into four stages: preparation, information collection, simulation attack, and reporting.
He-Jun Lu, Yang Yu
semanticscholar   +1 more source

Linux

open access: yesJournal of Information Processing and Management, 2001
Analisi dell'approccio marketing open source di ...
PACE, STEFANO, LUCIANO FRATOCCHI
  +6 more sources

D-Link Comprehensive Training Solution for Networking Professionals

open access: yesСовременные информационные технологии и IT-образование, 2020
The paper is devoted to the description of the structure of educational resources of the D-Link company as a comprehensive training solution, including a portal for distance learning and certification, an electronic library, lecture courses ...
Philip Zakharov   +3 more
doaj   +1 more source

Analysis of Linux OS security tools for packet filtering and processing

open access: yesMokslas: Lietuvos Ateitis, 2021
Open-source software and its components are widely used in various products, solutions, and applications, even in closed-source. Majority of them are made on Linux or Unix based systems. Netfilter framework is one of the examples.
Dmitrij Melkov, Šarūnas Paulikas
doaj   +1 more source

Studying Computer Networking Technologies in School: Problems and Suggestions

open access: yesСовременные информационные технологии и IT-образование, 2021
Computer networking technologies are an important part of the information exchange process. In the existing basic textbooks of computer science in grades 7-11, insufficient attention is paid to this topic.
Pavel Romasevich   +2 more
doaj   +1 more source

Digital Forensic on Secure Digital High Capacity using DFRWS Method

open access: yesJurnal RESTI (Rekayasa Sistem dan Teknologi Informasi), 2022
As evidenced in the trial, between 2015 and the second quarter of 2022, there were 54 cases involving secure digital high capacity (SDHC) storage hardware as evidenced in trials. In 2021 there will be an increase in cases involving SDHC.
Anton Yudhana, Imam Riadi, Budi Putra
doaj   +1 more source

Home - About - Disclaimer - Privacy