[PDF][PDF] Typical and atypical presentations of appendicitis and their implications for diagnosis and treatment: a literature review

S Echevarria, F Rauf, N Hussain, H Zaka, N Ahsan… - Cureus, 2023 - cureus.com
Appendicitis, an acute inflammation of the appendix, affects all demographic groups and
exhibits various incidences and clinical manifestations. While acute appendicitis typically …

A survey on hypervisor-based monitoring: approaches, applications, and evolutions

E Bauman, G Ayoade, Z Lin - ACM Computing Surveys (CSUR), 2015 - dl.acm.org
When designing computer monitoring systems, one goal has always been to have a
complete view of the monitored target and at the same time stealthily protect the monitor …

The global, regional, and national burden of appendicitis in 204 countries and territories, 1990–2019: a systematic analysis from the Global Burden of Disease Study …

L Guan, Z Liu, G Pan, B Zhang, Y Wu, T Gan… - BMC …, 2023 - Springer
Background Appendicitis is the most common abdominal surgical emergency worldwide,
and its burden has been changing. We report the level and trends of appendicitis …

S2E: A platform for in-vivo multi-path analysis of software systems

V Chipounov, V Kuznetsov, G Candea - Acm Sigplan Notices, 2011 - dl.acm.org
This paper presents S2E, a platform for analyzing the properties and behavior of software
systems. We demonstrate S2E's use in develo** practical tools for comprehensive …

Hypervision across worlds: Real-time kernel protection from the arm trustzone secure world

AM Azab, P Ning, J Shah, Q Chen, R Bhutkar… - Proceedings of the …, 2014 - dl.acm.org
TrustZone-based Real-time Kernel Protection (TZ-RKP) is a novel system that provides real-
time protection of the OS kernel using the ARM TrustZone secure world. TZ-RKP is more …

Methods, systems, and media for detecting covert malware

BM Bowen, PV Prabhu, VP Kemerlis… - US Patent …, 2013 - Google Patents
Methods, systems, and media for detecting covert malware are provided. In accordance with
some embodiments, a method for detecting covert malware in a computing environ ment is …

Malware detection appliance architecture

OA Ismael - US Patent 9,934,376, 2018 - Google Patents
(57) ABSTRACT A threat-aware virtualization module may be deployed in a malware
detection appliance architecture and execute on a malware detection system (MDS) …

Technique for implementing memory views using a layered virtualization architecture

U Steinberg, OA Ismael - US Patent 10,191,861, 2019 - Google Patents
ABSTRACT A technique implements memory views using a virtualiza tion layer of a
virtualization architecture executing on a node of a network environment. The virtualization …

Methods, systems, and media for baiting inside attackers

SJ Stolfo, AD Keromytis, BM Bowen… - US Patent …, 2015 - Google Patents
2009-12-05 Assigned to THE TRUSTEES OF COLUMBIA UNIVERSITY IN THE CITY OF
NEW YORK reassignment THE TRUSTEES OF COLUMBIA UNIVERSITY IN THE CITY OF …

Inktag: Secure applications on an untrusted operating system

OS Hofmann, S Kim, AM Dunn, MZ Lee… - Proceedings of the …, 2013 - dl.acm.org
InkTag is a virtualization-based architecture that gives strong safety guarantees to high-
assurance processes even in the presence of a malicious operating system. InkTag …