Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Agriculture (1)
- Apiculture (1)
- Archival Science (1)
- Computer Engineering (1)
- Computer and Systems Architecture (1)
-
- Databases and Information Systems (1)
- Education (1)
- Engineering (1)
- Higher Education (1)
- Information Security (1)
- Library and Information Science (1)
- Life Sciences (1)
- OS and Networks (1)
- Other Computer Sciences (1)
- Scholarly Publishing (1)
- Social and Behavioral Sciences (1)
- Software Engineering (1)
- Institution
- Keyword
-
- Circuit switched data (CSD) (1)
- Digital preservation (1)
- Distributed information systems (1)
- Electronic publishing (1)
- General Packet Radio Service (GPRS) (1)
-
- Hijacking attacks on memory (1)
- Hypervisor-based protection (1)
- Image classification (1)
- Indexing (1)
- Information retrieval (1)
- Information systems (1)
- Internet of Things (IoT) (1)
- Kernel Data Protection (1)
- Libraries (1)
- Memory isolation (1)
- Natural language processing (1)
- Open access (1)
- Optical character recognition software (1)
- Recommender systems (1)
- Search engines (1)
- Short message service (SMS) (1)
- Software engineering (1)
- Taxonomy (1)
- Text mining (1)
- Text processing (1)
- User experience (1)
- User-centered design (1)
- Windows kernel (1)
- Wireless Sensor Network (WSN) (1)
- ZigBee (1)
Articles 1 - 3 of 3
Full-Text Articles in Systems Architecture
Windows Kernel Hijacking Is Not An Option: Memoryranger Comes To The Rescue Again, Igor Korkin
Windows Kernel Hijacking Is Not An Option: Memoryranger Comes To The Rescue Again, Igor Korkin
Journal of Digital Forensics, Security and Law
The security of a computer system depends on OS kernel protection. It is crucial to reveal and inspect new attacks on kernel data, as these are used by hackers. The purpose of this paper is to continue research into attacks on dynamically allocated data in the Windows OS kernel and demonstrate the capacity of MemoryRanger to prevent these attacks. This paper discusses three new hijacking attacks on kernel data, which are based on bypassing OS security mechanisms. The first two hijacking attacks result in illegal access to files open in exclusive access. The third attack escalates process privileges, without applying …
Iot Based Agriculture 4.0: Challenges And Opportunities, Halimjon Khujamatov, Temur Toshtemirov Mr., Doston Turayevich Khasanov Mr., Nasiba Saburova Ms., Ilhom Ikromovich Xamroyev Mr.
Iot Based Agriculture 4.0: Challenges And Opportunities, Halimjon Khujamatov, Temur Toshtemirov Mr., Doston Turayevich Khasanov Mr., Nasiba Saburova Ms., Ilhom Ikromovich Xamroyev Mr.
Bulletin of TUIT: Management and Communication Technologies
In recent years, the world's population growth has been intensifying, resulting in specific problems related to the depletion of natural resources, food shortages, declining fertile lands, and changing weather conditions. This paper has been discussed the use of IoT technology as a solution to such problems.
At the same time, the emergence of IoT technology has given rise to a new research direction in agriculture. Soil analysis and monitoring using Zigbee wireless sensor network technology, which is part of the IoT, will enable the creation of an IoT ecosystem as well as the development of smart agriculture. In addition, entrepreneurship, …
Building And Using Digital Libraries For Etds, Edward A. Fox
Building And Using Digital Libraries For Etds, Edward A. Fox
The Journal of Electronic Theses and Dissertations
Despite the high value of electronic theses and dissertations (ETDs), the global collection has seen limited use. To extend such use, a new approach to building digital libraries (DLs) is needed. Fortunately, recent decades have seen that a vast amount of “gray literature” has become available through a diverse set of institutional repositories as well as regional and national libraries and archives. Most of the works in those collections include ETDs and are often freely available in keeping with the open-access movement, but such access is limited by the services of supporting information systems. As explained through a set of …