Results 11 to 20 of about 932,981 (241)

Operation System Vulnerabilities Analysis Based on Code Clone Detection

open access: yesJisuanji kexue yu tansuo, 2021
Software vulnerability detection based on code clone detection technology is an important direction in the static analysis of software vulnerability. At present, the existing software vulnerability detection tools have deficie-ncies in the vulnerability ...
WANG Zhe, REN Yi, ZHOU Kai, GUAN Jianbo, TAN Yusong
doaj   +1 more source

Distributed operating systems [PDF]

open access: yesComputer Standards & Interfaces, 1987
In the past five years, distributed operating systems research has gone through a consolidation phase. On a large number of design issues there is now considerable consensus between different research groups. In this paper, an overview of recent research in distributed systems is given.
openaire   +2 more sources

Algorithmization for calculating the security assessment of AIS operating systems of internal affairs bodies, developed on the basis of an analysis of security requirements GOST R ISO/IEC 15408 and possible threats

open access: yesВестник Дагестанского государственного технического университета: Технические науки, 2023
Objective. The article provides a generalized algorithmization of the processes necessary for developing software for assessing the security of operating systems of automated information systems of internal affairs bodies of the Russian Federation.Method.
A. I. Yangirov   +3 more
doaj   +1 more source

Distributed operating systems

open access: yesACM Computing Surveys, 1985
Distributed operating systems have many aspects in common with centralized ones, but they also differ in certain ways. This paper is intended as an introduction to distributed operating systems, and especially to current university research about them.
Tanenbaum, A.S., van Renesse, R.
openaire   +3 more sources

Usability Analysis of a Novel Biometric Authentication Approach for Android-Based Mobile Devices

open access: yesJournal of Telecommunications and Information Technology, 2014
Mobile devices are widely replacing the standard personal computers thanks to their small size and userfriendly use. As a consequence, the amount of information, often confidential, exchanged through these devices is raising.
Vincenzo Conti   +3 more
doaj   +1 more source

ALGORITHM OF USER’S PERSONAL DATA PROTECTION AGAINST DATA LEAKS IN WINDOWS 10 OS

open access: yesInformatyka, Automatyka, Pomiary w Gospodarce i Ochronie Środowiska, 2019
In the European Union, in the first half of 2018, the General Data Protection Regulation came into force, which established the new rules for processing users’ personal data for IT companies.
Olexander Zadreyko   +2 more
doaj   +1 more source

Secure deployment strategy of virtual machines based on operating system diversity

open access: yes网络与信息安全学报, 2017
The resource-sharing model for cloud computing raises many security issues,such as co-resident of virtual machines,while greatly improving resource utilization.In particular,when a user adopts a single operating system,an attacker can steal privacy and ...
Miao ZHANG   +5 more
doaj   +3 more sources

A Technical Review on Development of an Advanced Electromechanical System

open access: yesComputers, 2020
Development of an advanced electromechanical system requires a blend of technical expertise and knowledge, from electrical and mechanical engineering to software and system engineering.
Nazita Taghavi   +2 more
doaj   +1 more source

Influence of Software on the Features of Laser-printed Characters

open access: yesJournal of Forensic Science and Medicine, 2017
Verifying the authenticity or otherwise of printed documents is one of the most important aspects of questioned document examination and plays a vital role in the field of forensic science.
Yuanli Han, Xingzhou Han
doaj   +1 more source

Wireless Sensor Network Operating System Design Rules Based on Real-World Deployment Survey

open access: yesJournal of Sensor and Actuator Networks, 2013
Wireless sensor networks (WSNs) have been a widely researched field since the beginning of the 21st century. The field is already maturing, and TinyOS has established itself as the de facto standard WSN Operating System (OS).
Leo Selavo   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy