Results 21 to 30 of about 447,234 (333)
In August 2011, Linux entered its third decade. Ten years before, Chou et al. published a study of faults found by applying a static analyzer to Linux versions 1.0 through 2.4.1. A major result of their work was that the drivers directory contained up to
Calvès, Christophe +5 more
core +5 more sources
Linux XIA: an interoperable meta network architecture to crowdsource the future Internet [PDF]
With the growing number of proposed clean-slate redesigns of the Internet, the need for a medium that enables all stakeholders to participate in the realization, evaluation, and selection of these designs is increasing.
Byers, John +2 more
core +3 more sources
ConfigFix: Interactive Configuration Conflict Resolution for the Linux Kernel [PDF]
Highly configurable systems are highly complex systems. The Linux kernel is arguably one of the most well-known examples. Given its vast configuration space, researchers have used it to conduct many empirical studies as well as to build dedicated methods
Patrick Franz +4 more
semanticscholar +1 more source
Unikernels leverage library OS architectures to run isolated workloads on the cloud. They have garnered attention in part due to their promised performance characteristics such as small image size, fast boot time, low memory footprint and application ...
H. Kuo +3 more
semanticscholar +1 more source
Research on WiFi Penetration Testing with Kali Linux
Aiming at the vulnerability of wireless network, this paper proposed a method of WiFi penetration testing based on Kali Linux which is divided into four stages: preparation, information collection, simulation attack, and reporting.
He-Jun Lu, Yang Yu
semanticscholar +1 more source
Analisi dell'approccio marketing open source di ...
PACE, STEFANO, LUCIANO FRATOCCHI
+6 more sources
D-Link Comprehensive Training Solution for Networking Professionals
The paper is devoted to the description of the structure of educational resources of the D-Link company as a comprehensive training solution, including a portal for distance learning and certification, an electronic library, lecture courses ...
Philip Zakharov +3 more
doaj +1 more source
Analysis of Linux OS security tools for packet filtering and processing
Open-source software and its components are widely used in various products, solutions, and applications, even in closed-source. Majority of them are made on Linux or Unix based systems. Netfilter framework is one of the examples.
Dmitrij Melkov, Šarūnas Paulikas
doaj +1 more source
Studying Computer Networking Technologies in School: Problems and Suggestions
Computer networking technologies are an important part of the information exchange process. In the existing basic textbooks of computer science in grades 7-11, insufficient attention is paid to this topic.
Pavel Romasevich +2 more
doaj +1 more source
Digital Forensic on Secure Digital High Capacity using DFRWS Method
As evidenced in the trial, between 2015 and the second quarter of 2022, there were 54 cases involving secure digital high capacity (SDHC) storage hardware as evidenced in trials. In 2021 there will be an increase in cases involving SDHC.
Anton Yudhana, Imam Riadi, Budi Putra
doaj +1 more source

