Vetting new technologies

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

The Food Crisis and New Technologies

The present crisis in global economy, the issue of cli mate change and the fast-growing world population, <span style="font-variant: normal; font-s...

متن کامل

Visible skepticism: Community vetting after Hurricane Irene

Social media enable rapid, peer-to-peer information flow during crisis events, affordances that have both positive and negative consequences. The potential for spreading misinformation is a significant concern. Drawing on an empirical study of information-sharing practices in a crisis-affected community in the Catskill Mountains after Hurricane Irene, this paper describes how an ad hoc group of...

متن کامل

VEX: Vetting Browser Extensions for Security Vulnerabilities

The browser has become the de facto platform for everyday computation. Among the many potential attacks that target or exploit browsers, vulnerabilities in browser extensions have received relatively little attention. Currently, extensions are vetted by manual inspection, which does not scale well and is subject to human error. In this paper, we present VEX, a framework for highlighting potenti...

متن کامل

New technologies.

Erin Schuman is a professor and director of Synaptic Plasticity at the Max Planck Institute for Brain Research in Frankfurt. Her group is interested in the molecular and cellular mechanisms that underlie information storage in neuronal networks. Her research uses electrophysiology, imaging, molecular biology, and biochemistry to understand the cell biological processes that control synaptic fun...

متن کامل

Finding Unknown Malice in 10 Seconds: Mass Vetting for New Threats at the Google-Play Scale

An app market’s vetting process is expected to be scalable and effective. However, today’s vetting mechanisms are slow and less capable of catching new threats. In our research, we found that a more powerful solution can be found by exploiting the way Android malware is constructed and disseminated, which is typically through repackaging legitimate apps with similar malicious components. As a r...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: BMJ

سال: 1996

ISSN: 0959-8138,1468-5833

DOI: 10.1136/bmj.313.7056.508