Results 21 to 30 of about 17,798 (178)
Dynamic and Transparent Analysis of Commodity Production Systems [PDF]
We propose a framework that provides a programming interface to perform complex dynamic system-level analyses of deployed production systems. By leveraging hardware support for virtualization available nowadays on all commodity machines, our framework is
Fattori, Aristide +3 more
core +1 more source
HyBIS: Windows Guest Protection through Advanced Memory Introspection
Effectively protecting the Windows OS is a challenging task, since most implementation details are not publicly known. Windows has always been the main target of malwares that have exploited numerous bugs and vulnerabilities.
C Mahapatra +8 more
core +1 more source
On Some Limitations of Information Flow Tracking in Full-system Emulators
Tracking and verification of data flows includes set of techniques that can be applied to make applications more secure, to perform software analysis for debugging or reverse engineering, and so on. Taint analysis is one of the techniques used to control
M. A. Klimushenkova +5 more
doaj +1 more source
Classifying malware attacks in IaaS cloud environments
In the last few years, research has been motivated to provide a categorization and classification of security concerns accompanying the growing adaptation of Infrastructure as a Service (IaaS) clouds. Studies have been motivated by the risks, threats and
Noëlle Rakotondravony +8 more
doaj +1 more source
Providing Self-Aware Systems with Reflexivity
We propose a new type of self-aware systems inspired by ideas from higher-order theories of consciousness. First, we discussed the crucial distinction between introspection and reflexion.
A Church +21 more
core +1 more source
JWalk: a tool for lazy, systematic testing of java classes by design introspection and user interaction [PDF]
Popular software testing tools, such as JUnit, allow frequent retesting of modified code; yet the manually created test scripts are often seriously incomplete.
A. Petrenko +32 more
core +1 more source
Notes towards an anthropology of the internet
What might an anthropology of the internet look like? It require a combination of introspection, personal judgment and world history to explore the universe of cyberspace. This world is not sufficient to itself, nor is it 'the world'.
Keith Hart
doaj +1 more source
The Rise of Human–Computer Integration in Marketing: A Theory Synthesis
ABSTRACT Human–computer integration (HCInt) technologies, which merge human bodily, cognitive, and sensory functions with computational processes, are reshaping the foundations of consumer experience. Unlike traditional human–computer interaction, HCInt entails adaptive and reciprocal coupling through AI‐driven augmentation, wearables, muscle–computer ...
Carlos Velasco +5 more
wiley +1 more source
A Real-Time Correlation of Host-Level Events in Cyber Range Service for Smart Campus
Smart campus is an exciting, new, and emerging research area that uses technology and infrastructure to support and improve its processes in campus services, teaching, learning, and research, especially, the explosive growth in knowledge makes the role ...
Zhihong Tian +6 more
doaj +1 more source
How Do I Measure up? Social Influence and L2 Motivation in the Algorithmic Age
ABSTRACT Comparative thinking is a fundamental human drive and a hallmark of contemporary life. For social action, such as the learning and use of additional languages, a target for appraisal (an L2 attribute) is evaluated in relation to a comparison standard (an appraiser's standpoint).
Alastair Henry, Meng Liu
wiley +1 more source

