A comprehensive study of kernel (issues and concepts) in different operating systems

HS Malallah, SRM Zeebaree… - Asian Journal of …, 2021 - journal.251news.co.in
Various operating systems (OS) with numerous functions and features have appeared over
time. As a result, they know how each OS has been implemented guides users' decisions on …

Embedded policing and policy enforcement approach for future secure IoT technologies

F Siddiqui, M Hagan, S Sezer - 2018 - IET
The Internet of Things (IoT) holds great potential for productivity, quality control, supply chain
efficiencies and overall business operations. However, with this broader connectivity, new …

Enhancing security and privacy of next-generation edge computing technologies

M Hagan, F Siddiqui, S Sezer - 2019 17th International …, 2019 - ieeexplore.ieee.org
The advent of high performance fog and edge computing and high bandwidth connectivity
has brought about changes to Internet-of-Things (IoT) service architectures, allowing for …

基于APT 活动全生命周期的攻击与检测综述

王郅伟, 何睎杰, 易鑫, 李孜旸, 曹旭栋, 尹涛, 李书豪… - 通信学报 - infocomm-journal.com
从攻击方法和检测方法两方面展开, 首先综述高级持续威胁(APT) 攻击的定义与特点,
总结相关攻击模型的研究发展, 在此基础上给出更一般性的APT 全生命周期模型, 并划分4 …

Survey of attack and detection based on the full life cycle of APT.

W Zhiwei, HE Xijie, YI Xin, LI Ziyang… - Journal on …, 2024 - search.ebscohost.com
The advanced persistent threat (APT) attack was explored from two perspectives: attack
methods and detection methods. First, the definitions and characteristics of APT attacks were …

Analysis and remodeling of the DirtyCOW vulnerability by debugging and abstraction

Y Wen, J Wang - International Workshop on Structured Object-Oriented …, 2019 - Springer
It is hard to understand clearly the principle of DirtyCOW vulnerability of Linux operating
system, even for many experienced kernel developers. An approach is presented to rebuild …

A Lightweight Container Security Framework Adapted to the Power Cloud Platform

W Liu, J Yan, X Wei, H Wang… - 2021 IEEE 4th …, 2021 - ieeexplore.ieee.org
In recent years, due to the elastic container technical characteristics and active open source
community support, container technology has become an important basic technology for the …

[PDF][PDF] Vergleich von Isolationsframeworks für den Containerbetrieb

T Stoffel - 2020 - timstoffel.net
Steigender Wettbewerb fordert von den Unternehmen mehr Flexibilität im Betrieb ihrer
Softwareprodukte. Dabei setzt sich die Containervirtualisierung, aufgrund ihrer …

Reactive and Proactive Threat Detection and Prevention for the Internet of Things

M Hagan, S Sezer, K McLaughlin - 2019 32nd IEEE …, 2019 - ieeexplore.ieee.org
The Internet of Things presents significant potential benefits to society. However, so too
exists a multitude of threats, both those adapted from IT systems and newly created attacks …

[引用][C] Creación de un sistema inclusivo adaptado a las personas con discapacidades en las extremidades superiores.

MR Guachamin Sarango - 2022 - Machala: Universidad Tëcnica de …