Works matching DE "COMPUTER operating system security measures"
Results: 34
A Formal Verification Approach for Linux Kernel Designing.
- Published in:
- Technologies (2227-7080), 2024, v. 12, n. 8, p. 132, doi. 10.3390/technologies12080132
- By:
- Publication type:
- Article
Single- and Multi-Objective Modified Aquila Optimizer for Optimal Multiple Renewable Energy Resources in Distribution Network.
- Published in:
- Mathematics (2227-7390), 2022, v. 10, n. 12, p. 2129, doi. 10.3390/math10122129
- By:
- Publication type:
- Article
CHANGING CHALLENGES AND CRISIS MANAGEMENT METHODS WITHIN A STABLE RULE OF LAW – HUNGARY’S CONSTITUTIONAL RESPONSE TO THE CHALLENGES OF THE 21ST CENTURY.
- Published in:
- Novi Sad Faculty of Law: Collected Papers / Zbornik Radova: Pravni Fakultet u Novom Sadu, 2021, v. 55, n. 2, p. 627, doi. 10.5937/zrpfns55-33487
- By:
- Publication type:
- Article
DETECTION OF OPERATING SYSTEM VULNERABILITIES AND NETWORK TRAFFIC ANALYSIS METHODS.
- Published in:
- Journal of Mathematics, Mechanics & Computer Science, 2024, v. 121, n. 1, p. 99, doi. 10.26577/JMMCS2024121110
- By:
- Publication type:
- Article
A buffer overflow detection and defense method based on RISC-V instruction set extension.
- Published in:
- Cybersecurity (2523-3246), 2023, v. 6, n. 1, p. 1, doi. 10.1186/s42400-023-00164-x
- By:
- Publication type:
- Article
Applying Formal Methods to a Certifiably Secure Software System.
- Published in:
- IEEE Transactions on Software Engineering, 2008, v. 34, n. 1, p. 82, doi. 10.1109/TSE.2007.70772
- By:
- Publication type:
- Article
CONCEPTUAL BASES OF BANKING ACTIVITY SAFETY SYSTEM FORMING.
- Published in:
- Economic Annals-XXI / Ekonomìčnij Časopis-XXI, 2013, n. 1/2, p. 56
- By:
- Publication type:
- Article
A Logic of Access Control.
- Published in:
- Computer Journal, 2001, v. 44, n. 1, p. 54, doi. 10.1093/comjnl/44.1.54
- By:
- Publication type:
- Article
A Clearer View of Vista features.
- Published in:
- TechTrends: Linking Research & Practice to Improve Learning, 2008, v. 52, n. 3, p. 6, doi. 10.1007/s11528-008-0143-z
- By:
- Publication type:
- Article
POTENCJAŁ WSPÓŁCZESNEGO ODDZIAŁYWANIA EMIGRACYJNEGO BRYGADOWEGO KOŁA MŁODYCH „POGOŃ".
- Published in:
- Studia Polonijne, 2023, v. 44, p. 73, doi. 10.18290/sp2344.4
- By:
- Publication type:
- Article
Runtime Verification for Anomaly Detection of Robotic Systems Security.
- Published in:
- Machines, 2023, v. 11, n. 2, p. 166, doi. 10.3390/machines11020166
- By:
- Publication type:
- Article
The Process of Using Power Supply Technical Solutions for Electronic Security Systems Operated in Smart Buildings: Modelling, Simulation and Reliability Analysis.
- Published in:
- Energies (19961073), 2024, v. 17, n. 24, p. 6453, doi. 10.3390/en17246453
- By:
- Publication type:
- Article
Selected Reliability Aspects Related to the Power Supply of Security Systems.
- Published in:
- Energies (19961073), 2024, v. 17, n. 15, p. 3665, doi. 10.3390/en17153665
- By:
- Publication type:
- Article
Issues Related to Power Supply Reliability in Integrated Electronic Security Systems Operated in Buildings and Vast Areas.
- Published in:
- Energies (19961073), 2023, v. 16, n. 8, p. 3351, doi. 10.3390/en16083351
- By:
- Publication type:
- Article
The Issue of Operating Security Systems in Terms of the Impact of Electromagnetic Interference Generated Unintentionally.
- Published in:
- Energies (19961073), 2021, v. 14, n. 24, p. 8591, doi. 10.3390/en14248591
- By:
- Publication type:
- Article
Artificial Intelligence for Optimal Sizing and Location of DG in Power Systems.
- Published in:
- International Review of Automatic Control, 2024, v. 17, n. 1, p. 10, doi. 10.15866/ireaco.v17i1.23372
- By:
- Publication type:
- Article
An Algorithm for Improving Email Security on the Android Operating System in the Industry 4.0 Era.
- Published in:
- Journal of Engineering (2314-4912), 2021, p. 1, doi. 10.1155/2021/4690611
- By:
- Publication type:
- Article
FUZZY SYSTEM-BASED EVENT TREE ANALYSIS SUPPORT OF THE SMART SECURITY SYSTEM OF HEALTH CARE CENTERS AND HOSPITALS.
- Published in:
- Interdisciplinary Description of Complex Systems, 2022, v. 20, n. 3, p. 239, doi. 10.7906/indecs.20.3.3
- By:
- Publication type:
- Article
Development of humming call system for blocking spam on a smartphone.
- Published in:
- Multimedia Tools & Applications, 2017, v. 76, n. 16, p. 17371, doi. 10.1007/s11042-017-4511-6
- By:
- Publication type:
- Article
MOSKG: countering kernel rootkits with a secure paging mechanism.
- Published in:
- Security & Communication Networks, 2015, v. 8, n. 18, p. 3580, doi. 10.1002/sec.1282
- By:
- Publication type:
- Article
Penetration Testing -- Reconnaissance with NMAP Tool.
- Published in:
- International Journal of Advanced Research in Computer Science, 2017, v. 8, n. 3, p. 844
- By:
- Publication type:
- Article
Penetration Testing Exploitation of Windows XP SP0.
- Published in:
- International Journal of Advanced Research in Computer Science, 2017, v. 8, n. 3, p. 839
- By:
- Publication type:
- Article
Analysis of Tizen Security Model and Ways of Bypassing It on Smart TV Platform.
- Published in:
- Applied Sciences (2076-3417), 2021, v. 11, n. 24, p. 12031, doi. 10.3390/app112412031
- By:
- Publication type:
- Article
Mitigation of privilege escalation attack using kernel data relocation mechanism.
- Published in:
- International Journal of Information Security, 2024, v. 23, n. 5, p. 3351, doi. 10.1007/s10207-024-00890-4
- By:
- Publication type:
- Article
MOBİL ORTAMLARDA BİLGİ VE HABERLEŞME GÜVENLİĞİ ÜZERİNE BİR İNCELEME.
- Published in:
- Journal of the Faculty of Engineering & Architecture of Gazi University / Gazi Üniversitesi Mühendislik Mimarlık Fakültesi Dergisi,, 2009, v. 24, n. 3, p. 499
- By:
- Publication type:
- Article
The Application of GPS-Based Friend/Foe Localization and Identification to Enhance Security in Restricted Areas.
- Published in:
- Sensors (14248220), 2024, v. 24, n. 16, p. 5208, doi. 10.3390/s24165208
- By:
- Publication type:
- Article
$500.
- Published in:
- Government Technology, 2017, v. 30, n. 4, p. 53
- Publication type:
- Article
Per-user network access control kernel module with secure multifactor authentication.
- Published in:
- Journal of Supercomputing, 2024, v. 80, n. 1, p. 970, doi. 10.1007/s11227-023-05480-0
- By:
- Publication type:
- Article
An Architectural Approach to Preventing Code Injection Attacks.
- Published in:
- IEEE Transactions on Dependable & Secure Computing, 2010, v. 7, n. 4, p. 351, doi. 10.1109/TDSC.2010.1
- By:
- Publication type:
- Article
Crowdstrike and Kernel-Level Access.
- Published in:
- ITNOW, 2024, v. 66, n. 4, p. 58, doi. 10.1093/itnow/bwae135
- By:
- Publication type:
- Article
On the Effect of k Values and Distance Metrics in KNN Algorithm for Android Malware Detection.
- Published in:
- Advances in Data Science & Adaptive Analysis, 2021, v. 13, n. 3/4, p. 1, doi. 10.1142/S2424922X21410011
- By:
- Publication type:
- Article
How to Elevate the SOC to the Next Level.
- Published in:
- ISACA Journal, 2023, n. 5, p. 44
- By:
- Publication type:
- Article
Solving Standards Implementation Issues With a Global ISMS.
- Published in:
- ISACA Journal, 2023, n. 4, p. 26
- By:
- Publication type:
- Article
Microsoft Windows vs. Apple Mac OS X: Resilience against ARP cache poisoning attack in a local area network.
- Published in:
- Information Security Journal: A Global Perspective, 2016, v. 25, n. 1-3, p. 68, doi. 10.1080/19393555.2016.1170912
- By:
- Publication type:
- Article