Results 21 to 30 of about 17,798 (178)

Dynamic and Transparent Analysis of Commodity Production Systems [PDF]

open access: yes, 2010
We propose a framework that provides a programming interface to perform complex dynamic system-level analyses of deployed production systems. By leveraging hardware support for virtualization available nowadays on all commodity machines, our framework is
Fattori, Aristide   +3 more
core   +1 more source

HyBIS: Windows Guest Protection through Advanced Memory Introspection

open access: yes, 2016
Effectively protecting the Windows OS is a challenging task, since most implementation details are not publicly known. Windows has always been the main target of malwares that have exploited numerous bugs and vulnerabilities.
C Mahapatra   +8 more
core   +1 more source

On Some Limitations of Information Flow Tracking in Full-system Emulators

open access: yesТруды Института системного программирования РАН, 2018
Tracking and verification of data flows includes set of techniques that can be applied to make applications more secure, to perform software analysis for debugging or reverse engineering, and so on. Taint analysis is one of the techniques used to control
M. A. Klimushenkova   +5 more
doaj   +1 more source

Classifying malware attacks in IaaS cloud environments

open access: yesJournal of Cloud Computing: Advances, Systems and Applications, 2017
In the last few years, research has been motivated to provide a categorization and classification of security concerns accompanying the growing adaptation of Infrastructure as a Service (IaaS) clouds. Studies have been motivated by the risks, threats and
Noëlle Rakotondravony   +8 more
doaj   +1 more source

Providing Self-Aware Systems with Reflexivity

open access: yes, 2017
We propose a new type of self-aware systems inspired by ideas from higher-order theories of consciousness. First, we discussed the crucial distinction between introspection and reflexion.
A Church   +21 more
core   +1 more source

JWalk: a tool for lazy, systematic testing of java classes by design introspection and user interaction [PDF]

open access: yes, 2007
Popular software testing tools, such as JUnit, allow frequent retesting of modified code; yet the manually created test scripts are often seriously incomplete.
A. Petrenko   +32 more
core   +1 more source

Notes towards an anthropology of the internet

open access: yesHorizontes Antropológicos, 2004
What might an anthropology of the internet look like? It require a combination of introspection, personal judgment and world history to explore the universe of cyberspace. This world is not sufficient to itself, nor is it 'the world'.
Keith Hart
doaj   +1 more source

The Rise of Human–Computer Integration in Marketing: A Theory Synthesis

open access: yesPsychology &Marketing, EarlyView.
ABSTRACT Human–computer integration (HCInt) technologies, which merge human bodily, cognitive, and sensory functions with computational processes, are reshaping the foundations of consumer experience. Unlike traditional human–computer interaction, HCInt entails adaptive and reciprocal coupling through AI‐driven augmentation, wearables, muscle–computer ...
Carlos Velasco   +5 more
wiley   +1 more source

A Real-Time Correlation of Host-Level Events in Cyber Range Service for Smart Campus

open access: yesIEEE Access, 2018
Smart campus is an exciting, new, and emerging research area that uses technology and infrastructure to support and improve its processes in campus services, teaching, learning, and research, especially, the explosive growth in knowledge makes the role ...
Zhihong Tian   +6 more
doaj   +1 more source

How Do I Measure up? Social Influence and L2 Motivation in the Algorithmic Age

open access: yesInternational Journal of Applied Linguistics, EarlyView.
ABSTRACT Comparative thinking is a fundamental human drive and a hallmark of contemporary life. For social action, such as the learning and use of additional languages, a target for appraisal (an L2 attribute) is evaluated in relation to a comparison standard (an appraiser's standpoint).
Alastair Henry, Meng Liu
wiley   +1 more source

Home - About - Disclaimer - Privacy