Results 11 to 20 of about 932,981 (241)
Operation System Vulnerabilities Analysis Based on Code Clone Detection
Software vulnerability detection based on code clone detection technology is an important direction in the static analysis of software vulnerability. At present, the existing software vulnerability detection tools have deficie-ncies in the vulnerability ...
WANG Zhe, REN Yi, ZHOU Kai, GUAN Jianbo, TAN Yusong
doaj +1 more source
Distributed operating systems [PDF]
In the past five years, distributed operating systems research has gone through a consolidation phase. On a large number of design issues there is now considerable consensus between different research groups. In this paper, an overview of recent research in distributed systems is given.
openaire +2 more sources
Objective. The article provides a generalized algorithmization of the processes necessary for developing software for assessing the security of operating systems of automated information systems of internal affairs bodies of the Russian Federation.Method.
A. I. Yangirov +3 more
doaj +1 more source
Distributed operating systems have many aspects in common with centralized ones, but they also differ in certain ways. This paper is intended as an introduction to distributed operating systems, and especially to current university research about them.
Tanenbaum, A.S., van Renesse, R.
openaire +3 more sources
Usability Analysis of a Novel Biometric Authentication Approach for Android-Based Mobile Devices
Mobile devices are widely replacing the standard personal computers thanks to their small size and userfriendly use. As a consequence, the amount of information, often confidential, exchanged through these devices is raising.
Vincenzo Conti +3 more
doaj +1 more source
ALGORITHM OF USER’S PERSONAL DATA PROTECTION AGAINST DATA LEAKS IN WINDOWS 10 OS
In the European Union, in the first half of 2018, the General Data Protection Regulation came into force, which established the new rules for processing users’ personal data for IT companies.
Olexander Zadreyko +2 more
doaj +1 more source
Secure deployment strategy of virtual machines based on operating system diversity
The resource-sharing model for cloud computing raises many security issues,such as co-resident of virtual machines,while greatly improving resource utilization.In particular,when a user adopts a single operating system,an attacker can steal privacy and ...
Miao ZHANG +5 more
doaj +3 more sources
A Technical Review on Development of an Advanced Electromechanical System
Development of an advanced electromechanical system requires a blend of technical expertise and knowledge, from electrical and mechanical engineering to software and system engineering.
Nazita Taghavi +2 more
doaj +1 more source
Influence of Software on the Features of Laser-printed Characters
Verifying the authenticity or otherwise of printed documents is one of the most important aspects of questioned document examination and plays a vital role in the field of forensic science.
Yuanli Han, Xingzhou Han
doaj +1 more source
Wireless Sensor Network Operating System Design Rules Based on Real-World Deployment Survey
Wireless sensor networks (WSNs) have been a widely researched field since the beginning of the 21st century. The field is already maturing, and TinyOS has established itself as the de facto standard WSN Operating System (OS).
Leo Selavo +3 more
doaj +1 more source

