نتایج جستجو برای: sandbox model
تعداد نتایج: 2104952 فیلتر نتایج به سال:
This study reports on a new false belief measure in a sample of 124 children and adolescents with or without high functioning autism (HFASD). In the classic paradigm, a participant predicts in which of two discrete locations a deceived protagonist will look for an object. In the current Sandbox task, the object is buried and reburied in a sandbox, thus creating a continuum between locations. Co...
A malware is a program that has a malicious intent. Nowadays, attack from malwares is rising in alarming fashion and thousands of malwares are injected to the Internet. Malware authors use many techniques like obfuscation and packing to avoid detection. A number of techniques for malware detection are available and none of them able to detect all types of malwares. In this paper, a more efficie...
Our model of shaken sand, presented in earlier work, has been extended to include a more realistic ‘glassy’ state, i.e., when the sandbox is shaken at very low intensities of vibration. We revisit some of our earlier results, and compare them with our new results on the revised model. Our analysis of the glassy dynamics in our model shows that a variety of ground states is obtained; these fall ...
There is a kind of seemingly nonsensical play behavior found in the simulation sandbox game genre. This behavior is very spontaneous and impulsive and associated with self-initiated learning, and here the author seeks to better understand what it is, and why it seems associated with simulation sandbox games. That is: What purpose does it serve, and what might provoke it? This requires a review ...
Sandbox applications can be used as anti-forensics techniques to hide important evidence in the digital forensics investigation. There is limited research on sandboxing technologies, and existing researches are focusing technology itself. The impact of sandbox
iOS is Apple’s mobile operating system, which is used on iPhone, iPad and iPod touch. Any third-party applications developed for iOS devices are required to go through Apple’s application vetting process and appear on the official iTunes App Store upon approval. When an application is downloaded from the store and installed on an iOS device, it is given a limited set of privileges, which are en...
This paper describes the new security architec ture that has been implemented as part of JDK the forthcoming Java Development Kit In going beyond the sandbox security model in the original release of Java JDK provides ne grained ac cess control via an easily con gurable security pol icy Moreover JDK introduces the concept of protection domain and a few related security prim itives that help to ...
This debate was conceived by Carl Landwehr, who asked me to serve as moderator. The proposition under discussion was first put forward by Bill Wulf in the JavaSoft Forum 1.1 (http://java.sun.com/forum/securityForum.html). Wulf objects to the JavaSoft security model, which aims to protect user files, network connections! and other resources from malicious applets by restricting applets to execut...
A malware is a program that has a malicious intent. Nowadays, attack from malwares is rising in alarming fashion and thousands of malwares are injected to the Internet. Malware authors use many techniques like obfuscation and packing to avoid detection. A number of techniques for malware detection are available and none of them able to detect all types of malwares. In this paper, a more efficie...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید