Results 31 to 40 of about 17,865 (172)
HyBIS: Windows Guest Protection through Advanced Memory Introspection
Effectively protecting the Windows OS is a challenging task, since most implementation details are not publicly known. Windows has always been the main target of malwares that have exploited numerous bugs and vulnerabilities.
C Mahapatra +8 more
core +3 more sources
Trusted auditing method of virtual machine based on improved expectation decision method
Whether the cloud computing environment is credible is the key factor in the promotion and effective use of cloud computing.For this reason,the expected value decision method in risk decision-making was improved.The usage scenarios was redefined,the cost
Junfeng TIAN, Yongchao ZHANG
doaj +2 more sources
What am I? Virtual Machines and the Mind/Body Problem [PDF]
When your word processor or email program is running on your computer, this creates a "virtual machine” that manipulates windows, files, text, etc. What is this virtual machine, and what are the virtual objects it manipulates?
Pollock, John
core
AI Alignment Versus AI Ethical Treatment: 10 Challenges
ABSTRACT A morally acceptable course of AI development should avoid two dangers: creating unaligned AI systems that pose a threat to humanity and mistreating AI systems that merit moral consideration in their own right. This paper argues these two dangers interact and that if we create AI systems that merit moral consideration, simultaneously avoiding ...
Adam Bradley, Bradford Saad
wiley +1 more source
The Rise of Human–Computer Integration in Marketing: A Theory Synthesis
ABSTRACT Human–computer integration (HCInt) technologies, which merge human bodily, cognitive, and sensory functions with computational processes, are reshaping the foundations of consumer experience. Unlike traditional human–computer interaction, HCInt entails adaptive and reciprocal coupling through AI‐driven augmentation, wearables, muscle–computer ...
Carlos Velasco +5 more
wiley +1 more source
Virtual Machine Introspection (VMI) is a powerful technology used to detect and analyze malicious software inside Virtual Machines (VMs) from the outside.
Lukas Beierlieb +4 more
doaj +1 more source
ABSTRACT When estimating future flood events using a global hydrological model (GHM), the large uncertainties associated with general circulation models (GCMs) and bias in the GHM model pose significant challenges. In the meantime, most future flood estimations are conducted only at specific gauge stations due to limited data availability and are ...
Jiaqing Wang, Quan J. Wang, Jianshi Zhao
wiley +1 more source
Secure Virtualization and Multicore Platforms State-of-the-Art report [PDF]
SVaM
Douglas, Heradon, Gehrmann, Christian
core +1 more source
SciTokens: Capability-Based Secure Access to Remote Scientific Data
The management of security credentials (e.g., passwords, secret keys) for computational science workflows is a burden for scientists and information security officers.
Basney, Jim +7 more
core +1 more source
JWalk: a tool for lazy, systematic testing of java classes by design introspection and user interaction [PDF]
Popular software testing tools, such as JUnit, allow frequent retesting of modified code; yet the manually created test scripts are often seriously incomplete.
A. Petrenko +32 more
core +1 more source

