Results 201 to 210 of about 78,918 (241)
Ensuring Reproducibility and Deploying Models with the Image2Radiomics Framework: An Evaluation of Image Processing on PanNET Model Performance. [PDF]
Tixier F +7 more
europepmc +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Understanding Linux kernel vulnerabilities
Journal of Computer Virology and Hacking Techniques, 2021Protecting the Linux kernel from malicious activities is of paramount importance. Several approaches have been proposed to analyze kernel-level vulnerabilities. Existing studies, however, have a strong focus on the attack type (e.g., buffer overflow).
openaire +1 more source
Hotswapping Linux kernel modules
Journal of Systems and Software, 2006Contemporary operating system kernels are able to improve their functionality by installing kernel extensions at runtime. However, when an existing kernel extension needs to be upgraded, it must be completely removed before the new kernel extension is installed.
Yueh-Feng Lee, Ruei-Chuan Chang
openaire +1 more source
2017 Computing Conference, 2017
The development of Linux is one of the most prominent examples of free and open-source software collaboration. The kernel is used in many projects including Android which has over 82% in market share worldwide. Therefore, Linux's kernel security has a lot of impact on IT&C industry.
Costin Carabas, Mihai Carabas
openaire +1 more source
The development of Linux is one of the most prominent examples of free and open-source software collaboration. The kernel is used in many projects including Android which has over 82% in market share worldwide. Therefore, Linux's kernel security has a lot of impact on IT&C industry.
Costin Carabas, Mihai Carabas
openaire +1 more source
Linux kernel loadable wrappers
Proceedings DARPA Information Survivability Conference and Exposition. DISCEX'00, 2002This paper describes the results of the Hypervisors for Security and Robustness (Kernel Hypervisors) program. Using the concept of a loadable module, kernel loadable wrappers (KLWs) were implemented in a Linux kernel. These kernel loadable wrappers provide unbypassable security wrappers for application specific security requirements and can also be ...
T. Mitchem, R. Lu, R. O'Brien, R. Larson
openaire +1 more source
Improving Linux Kernel Fuzzing
2023In the Linux Kernel project, one of the most rapidly evolving code bases, fuzz testing is a successful approach for vulnerability detection. However, with the high rate of change in the kernel code, testing each change thoroughly becomes a challenge. With this study, we explore various ways to improve the current Linux Kernel testing landscape.
openaire +1 more source
A linux kernel cryptographic framework
Proceedings of the 27th Annual ACM Symposium on Applied Computing, 2012This paper describes a cryptographic service framework for the Linux kernel. The framework enables user-space applications to perform operations with cryptographic keys, while at the same time ensuring that applications cannot directly access or extract the keys from storage.
Nikos Mavrogiannopoulos +2 more
openaire +1 more source
Cohesion Analysis in Linux Kernel
2006 13th Asia Pacific Software Engineering Conference (APSEC'06), 2006It is widely accepted that strong coupling such as common coupling should be used with caution among modules. Linux kernel is analyzed in terms of these common coupling instances and the results show the presence of excessive common coupling among modules. It is mentioned that unless the kernel is restructured with a bare minimum of common coupling, it
D. Janakiram +2 more
openaire +1 more source

