This project is an attempt to combine the advantages of software flexibility and security of hardware firewalls. It aims at the implementation of these advantages in the hypervisor source code for the purpose of creat...
详细信息
ISBN:
(纸本)9789898565242
This project is an attempt to combine the advantages of software flexibility and security of hardware firewalls. It aims at the implementation of these advantages in the hypervisor source code for the purpose of creating user data confidentiality protection against its leakage from the personal computer through the network. The hypervisor implementation is based on the hardware virtualization extensions of both processors and motherboards. This constitutes a key feature, which enables hypervisor to combine the following advantages: the advantages of access to the OS environment and hardware protection against various intruders' methods of compromise, including those capable of exploiting OS kernel resources for performing the malicious actions.
The paper introduces a novel approach to the detection of social bots using ensembling of classifiers. We also studied the impact of different feature sets and demonstrated the power of graph embedding which is underu...
详细信息
This paper considers the problem of influential users detection in online social networks. Identifying of such key entities is of interest in many areas: marketing, politics, information security, business. The degree...
详细信息
In this work, we develop software based on porousMultiphaseFoam library in OpenFOAM package to study enhanced oil recovery methods, and to study the influence of these methods on the oil recovery factor. New models of...
详细信息
In the paper, we describe a metamodel to represent dynamics of AADL-models. The metamodel allows to visualize step-by-step a process of models' behavioral aspects analysis. In particular, it essentially helps to d...
详细信息
During the recent years artificial neural networks have become a great part of everyday life. One of the big problems in AI is acceleration of neural network inference using different hardware: from CPUs and GPUs to F...
详细信息
Automatic generation and simulation of test programs is known to be the main means for verifying microprocessors. The problem is that test program generators for new designs are often developed from scratch with littl...
详细信息
Verification of Linux kernel modules and especially device drivers is a critically important task. However, due to the special nature of the kernel operation, it is very challenging to perform runtime analysis of part...
详细信息
作者:
Fedotova, IdaliyaHse University
Ivannikov Institute for System Programming of the Russian Academy of Sciences Moscow Russia
Typology of semantic shifts has been in the focus of linguistic typology for the last 20 years. Emergence of cross-linguistic databases and linguistic platforms has taken the study of semantic changes to the new level...
详细信息
Timed automata and timed finite state machins (TFSMs) have been proposed to represent more accurately the behaviour of systems in continuous time. Recently, we introduced a model of TFSMs that extends the expressive p...
详细信息
暂无评论