Search results for "operating system"

showing 10 items of 134 documents

Hypervisor Memory Introspection and Hypervisor Based Malware Honeypot

2020

Memory acquisition is a tool used in advanced forensics and malware analysis. Various methods of memory acquisition exist. Such solutions are ranging from tools based on dedicated hardware to software-only solutions. We proposed a hypervisor based memory acquisition tool. [22]. Our method supports ASLR and Modern operating systems which is an innovation compared to past methods [27, 36]. We extend the hypervisor assisted memory acquisition by adding mass storage device honeypots for the malware to cross and propose hiding the hypervisor using bluepill technology.

021110 strategic defence & security studiesAtomicitySoftware_OPERATINGSYSTEMSHoneypotComputer science0211 other engineering and technologiesHypervisor02 engineering and technologycomputer.software_genreVirtualizationMemory forensicsMass storage0202 electrical engineering electronic engineering information engineeringOperating systemMalware020201 artificial intelligence & image processingMalware analysiscomputer
researchProduct

Efficient Protection for VDI Workstations

2019

Many enterprises migrate to a private cloud VDI environment. In such an environment multiple workstations are served by a single powerful server. On such an environment each VDI workstation receives only a limited CPU power. An average of less than a quarter of a core per planned VDI workstation is a common setup. Under such cases, anti-virus and application control software load is multiplied by the number of VDI workstation running on each server. These security applications take merely a few percentages of a single core on a normal desktop. However, on a VDI server where the multiple VDI workstations run on a single server, they may consume 20-25 percent the load. Naturally, such an incr…

021110 strategic defence & security studiesCPU power dissipationWorkstationComputer sciencebusiness.industry0211 other engineering and technologiesControl softwareSingle serverCloud computing02 engineering and technologycomputer.software_genreVirtualizationlaw.inventionlawControl system0202 electrical engineering electronic engineering information engineeringOperating system020201 artificial intelligence & image processingSingle-corebusinesscomputer2019 6th IEEE International Conference on Cyber Security and Cloud Computing (CSCloud)/ 2019 5th IEEE International Conference on Edge Computing and Scalable Cloud (EdgeCom)
researchProduct

Smear layer removal evaluation of different protocol of Bio Race file and XP- endo Finisher file in corporation with EDTA 17% and NaOCl.

2017

Background The aim of the present study was to compare the amount of the smear layer remaining in prepared root canals with different protocols of Bio RaCe files and XP-endo Finisher file (XPF) in association with 17% EDTA and sodium hypochlorite solution. Material and Methods A total of 68 extracted single-rooted teeth were randomly divided into 4 experimental groups (n=14) and two control groups (n=6). The root canals were prepared with Bio RaCe files (FKG Dentaire, Switzerland) using the crown-down technique based on manufacturer's instructions and irrigated according to the following irrigation techniques: Group 1: XPF with 2 mL of 2.5% NaOCl for 1 minute. Group 2:, XPF with 1 mL of 17%…

0301 basic medicineScoring systemPost hocRoot canalmedicine.medical_treatmentSmear layerDentistryNegative controlPositive controlcomputer.software_genreOperative Dentistry and Endodontics03 medical and health scienceschemistry.chemical_compound0302 clinical medicinemedicineGeneral DentistrySalineMathematicsbusiness.industryResearch030206 dentistry:CIENCIAS MÉDICAS [UNESCO]030104 developmental biologymedicine.anatomical_structurechemistrySodium hypochloriteUNESCO::CIENCIAS MÉDICASOperating systembusinesscomputerJournal of clinical and experimental dentistry
researchProduct

Arm Hypervisor and Trustzone Alternatives

2020

Many scenarios such as DRM, payments, and homeland security require a trusted and verified trusted execution environment (TEE) on ARM. In most cases such TEE should be available in source code mode. The vendor cannot conduct code review and ensure that the operating system is trustworthy unless source code is available. Android and other rich execution environments (REEs) support various TEE implementations. Each TEE implementation has its own unique way of deploying trusted applications and features. Most TEEs in ARM can be started at TrustZone™ or Hyp (Hypervisor) mode. Choosing a proper TEE operating system can be a problem for trusted application developers and hardware vendors. This ar…

0303 health sciences03 medical and health sciencesComputer science0202 electrical engineering electronic engineering information engineeringOperating system020206 networking & telecommunicationsHypervisor02 engineering and technologycomputer.software_genrecomputer030304 developmental biology
researchProduct

Agent-Based Model to Study and Quantify the Evolution Dynamics of Android Malware Infection

2014

[EN] In the last years the number of malware Apps that the users download to their devices has risen. In this paper, we propose an agentbased model to quantify the Android malware infection evolution, modeling the behavior of the users and the different markets where the users may download Apps. The model predicts the number of infected smartphones depending on the type of malware. Additionally, we will estimate the cost that the users should afford when the malware is in their devices. We will be able to analyze which part is more critical: the users, giving indiscriminate permissions to the Apps or not protecting their devices with antivirus software, or the Android platform, due to the v…

Agent-based modelSoftware_OPERATINGSYSTEMSArticle SubjectApplied Mathematicslcsh:MathematicsComputer securitycomputer.software_genrelcsh:QA1-939ComputingMilieux_MANAGEMENTOFCOMPUTINGANDINFORMATIONSYSTEMSAndroid malwareMalwareAndroid (operating system)MATEMATICA APLICADAcomputerAnalysisMathematics
researchProduct

MASK 2017: ARIA digitally-enabled, integrated, person-centred care for rhinitis and asthma multimorbidity using real-world-evidence

2018

mHealth, such as apps running on consumer smart devices is becoming increasingly popular and has the potential to profoundly affect healthcare and health outcomes. However, it may be disruptive and results achieved are not always reaching the goals. Allergic Rhinitis and its Impact on Asthma (ARIA) has evolved from a guideline using the best evidence-based approach to care pathways suited to real-life using mobile technology in allergic rhinitis (AR) and asthma multimorbidity. Patients largely use over-the-counter medications dispensed in pharmacies. Shared decision making centered around the patient and based on self-management should be the norm. Mobile Airways Sentinel networK (MASK), th…

AllergyHEALTH-ORGANIZATIONIMPACTRespiratory Medicine and Allergy[SDV]Life Sciences [q-bio]Allergic Rhinitis and its Impact on Asthma - ARIAReviewMASK - Mobile Airways Sentinel networK0302 clinical medicine610 Medical sciences MedicineApp; ARIA; Asthma; Care pathways; MASK; mHealth; Rhinitis; Immunology and Allergy; Immunology; Pulmonary and Respiratory MedicineHealth careMedicine and Health SciencesImmunology and Allergy030212 general & internal medicineAndroid (operating system)mHealthRinitisRhinitiComputingMilieux_MISCELLANEOUSLungmedicin och allergiRhinitisPRODUCTIVITY3. Good healthALLERGIC RHINITISmHealthRiniteCare pathwaysMedical emergencyLife Sciences & BiomedicinePulmonary and Respiratory MedicineSTRATEGIESMASKMASK study groupImmunologyMEDLINE610K-ANONYMITYPharmacy[object Object]Settore MED/10 - Malattie Dell'Apparato RespiratorioVALIDATIONMACVIA-ARIA03 medical and health sciencesmedicineMobile technologyTECHNOLOGYApp -MASKApp ; ARIA ; Asthma ; Care pathways ; MASK ; mHealth ; RhinitisARIA; App; Asthma; Care pathways; MASK; Rhinitis; mHealthAsmaAsthmaCare pathwayScience & TechnologyARIAbusiness.industryApp; ARIA; Asthma; Care pathways; MASK; mHealth; RhinitisSettore MED/09 - MEDICINA INTERNACorrectionGuidelineRC581-607medicine.diseaseAsthma030228 respiratory systemImmunologic diseases. AllergybusinessAppEUROPEAN COUNTRIES[SDV.MHEP]Life Sciences [q-bio]/Human health and pathology
researchProduct

<title>Real-time face tracking and recognition for video conferencing</title>

2001

This paper describes a system of vision in real time, allowing to detect automatically the faces presence, to localize and to follow them in video sequences. We verify also the faces identities. These processes are based by combining technique of image processing and methods of neural networks. The tracking is realized with a strategy of prediction-verification using the dynamic information of the detection. The system has been evaluated quantitatively on 8 video sequences. The robustness of the method has been tested on various lightings images. We present also the analysis of complexity of this algorithm in order to realize an implementation in real time on a FPGA based architecture.

Artificial neural networkComputer scienceFacial motion capturebusiness.industryImage processingcomputer.software_genreFacial recognition systemVideoconferencingRobustness (computer science)Computer graphics (images)Video trackingComputer visionArtificial intelligencebusinessReal-time operating systemcomputerAdvanced Signal Processing Algorithms, Architectures, and Implementations XI
researchProduct

Iterative sparse matrix-vector multiplication for accelerating the block Wiedemann algorithm over GF(2) on multi-graphics processing unit systems

2012

SUMMARY The block Wiedemann (BW) algorithm is frequently used to solve sparse linear systems over GF(2). Iterative sparse matrix–vector multiplication is the most time-consuming operation. The necessity to accelerate this step is motivated by the application of BW to very large matrices used in the linear algebra step of the number field sieve (NFS) for integer factorization. In this paper, we derive an efficient CUDA implementation of this operation by using a newly designed hybrid sparse matrix format. This leads to speedups between 4 and 8 on a single graphics processing unit (GPU) for a number of tested NFS matrices compared with an optimized multicore implementation. We further present…

Block Wiedemann algorithmComputer Networks and CommunicationsComputer scienceGraphics processing unitSparse matrix-vector multiplicationGPU clusterParallel computingGF(2)Computer Science ApplicationsTheoretical Computer ScienceGeneral number field sieveMatrix (mathematics)Computational Theory and MathematicsFactorizationLinear algebraMultiplicationComputer Science::Operating SystemsSoftwareInteger factorizationSparse matrixConcurrency and Computation: Practice and Experience
researchProduct

Predictability, chaos and coordination in bird vigilant behaviour

1999

CHAOS (operating system)Animal Science and ZoologyPredictabilityPsychologySocial psychologyEcology Evolution Behavior and SystematicsCognitive psychologyAnimal Behaviour
researchProduct

Revisiting Bicausative Matrices: The Swiss Cheese of Chaos

2009

This paper returns to de Mesnard's paper of 2000, which has exposed the so-called method of bicausative matrices. This method was created to analyze the structural change between two matrices, as an improvement of the causative method of Jackson and al. (1990). In its 2000 paper, de Mesnard has shown that chaos affects the bicausative method: two solutions are found with a brutal switching between both. This new paper demonstrates that the chaos can be largely circumvented, is essentially localized in a small interval and is only a transitory effect between two non-chaotic "regimes", is not always observed, is limited to relatively small matrices.

CHAOS (operating system)GeographySwiss cheeseApplied mathematicsInterval (mathematics)CartographySSRN Electronic Journal
researchProduct