Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
[PDF][PDF] A survey on virtualization technologies
SNT Chiueh, S Brook - Rpe Report, 2005 - 132.248.181.216
Virtualization is a technology that combines or divides computing resources to present one
or many operating environments using methodologies like hardware and software …
or many operating environments using methodologies like hardware and software …
Methods and systems for launching applications into existing isolation environments
M Chinta, SA Raj - US Patent 8,090,797, 2012 - Google Patents
(54) METHODS AND SYSTEMS FOR LAUNCHING 2 gen)'et,, ast et a. APPLICATIONS INTO
EXISTING ISOLATION 5,341,478 A 8/1994 Travis et a1 'ENVIRONMENTS 5,384,911 A …
EXISTING ISOLATION 5,341,478 A 8/1994 Travis et a1 'ENVIRONMENTS 5,384,911 A …
[BOG][B] Forensic discovery
D Farmer, W Venema - 2004 - dl.acm.org
Forensic Discovery | Guide books skip to main content ACM Digital Library home ACM
Association for Computing Machinery corporate logo Google, Inc. (search) Advanced Search …
Association for Computing Machinery corporate logo Google, Inc. (search) Advanced Search …
Blade: an attack-agnostic approach for preventing drive-by malware infections
Web-based surreptitious malware infections (ie, drive-by downloads) have become the
primary method used to deliver malicious software onto computers across the Internet. To …
primary method used to deliver malicious software onto computers across the Internet. To …
[PDF][PDF] {AdJail}: Practical Enforcement of Confidentiality and Integrity Policies on Web Advertisements
Web publishers frequently integrate third-party advertisements into web pages that also
contain sensitive publisher data and end-user personal data. This practice exposes …
contain sensitive publisher data and end-user personal data. This practice exposes …
A general dynamic information flow tracking framework for security applications
LC Lam, T Chiueh - 2006 22nd Annual Computer Security …, 2006 - ieeexplore.ieee.org
Many software security solutions require accurate tracking of control/data dependencies
among information objects in network applications. This paper presents a general dynamic …
among information objects in network applications. This paper presents a general dynamic …
The state of the art of application restrictions and sandboxes: A survey of application-oriented access controls and their shortfalls
Under most widely-used security mechanisms the programs users run possess more
authority than is strictly necessary, with each process typically capable of utilising all of the …
authority than is strictly necessary, with each process typically capable of utilising all of the …
Method and apparatus for isolating execution of software applications
LG Laborczfalvi, A Roychoudhry, AG Borzycki… - US Patent …, 2010 - Google Patents
Prior Publication Data() Us 2006/0075381 A1 Apr '6'2006 A method for isolating access by
application programs to native resources provided by an operating system redirects a 51 …
application programs to native resources provided by an operating system redirects a 51 …
Method and a system for responding locally to requests for file metadata associated with files stored remotely
JH Nord, DR Hoy - US Patent 8,131,825, 2012 - Google Patents
(57) ABSTRACT A method and system for responding locally to requests for file metadata
associated with files stored remotely includes a method of responding locally to requests for …
associated with files stored remotely includes a method of responding locally to requests for …
Method and system for accessing a remote file in a directory structure associated with an application program executing locally
BJ Pedersen, JH Nord, DR Hoy - US Patent 7,779,034, 2010 - Google Patents
(54) METHOD AND SYSTEM FOR ACCESSINGA 5,321,841 A 6/1994 East et a1. REMOTE
FILE IN A DIRECTORY 5,341,478 A 8/1994 Travis, Jr. et a1. STRUCTURE ASSOCIATED …
FILE IN A DIRECTORY 5,341,478 A 8/1994 Travis, Jr. et a1. STRUCTURE ASSOCIATED …