نتایج جستجو برای: sandbox model

تعداد نتایج: 2104952  

Journal: :Autism : the international journal of research and practice 2012
Sander Begeer Daniel M Bernstein Jonas van Wijhe Anke M Scheeren Hans M Koot

This study reports on a new false belief measure in a sample of 124 children and adolescents with or without high functioning autism (HFASD). In the classic paradigm, a participant predicts in which of two discrete locations a deceived protagonist will look for an object. In the current Sandbox task, the object is buried and reburied in a sandbox, thus creating a continuum between locations. Co...

2017
Andrew Honig

A malware is a program that has a malicious intent. Nowadays, attack from malwares is rising in alarming fashion and thousands of malwares are injected to the Internet. Malware authors use many techniques like obfuscation and packing to avoid detection. A number of techniques for malware detection are available and none of them able to detect all types of malwares. In this paper, a more efficie...

Journal: :Advances in Complex Systems 2001
Peter F. Stadler Anita Mehta Jean-Marc Luck

Our model of shaken sand, presented in earlier work, has been extended to include a more realistic ‘glassy’ state, i.e., when the sandbox is shaken at very low intensities of vibration. We revisit some of our earlier results, and compare them with our new results on the revised model. Our analysis of the glassy dynamics in our model shows that a variety of ground states is obtained; these fall ...

Journal: :IJGBL 2014
Dominicus Tornqvist

There is a kind of seemingly nonsensical play behavior found in the simulation sandbox game genre. This behavior is very spontaneous and impulsive and associated with self-initiated learning, and here the author seeks to better understand what it is, and why it seems associated with simulation sandbox games. That is: What purpose does it serve, and what might provoke it? This requires a review ...

Journal: :EAI Endorsed Transactions on Security and Safety 2021

Sandbox applications can be used as anti-forensics techniques to hide important evidence in the digital forensics investigation. There is limited research on sandboxing technologies, and existing researches are focusing technology itself. The impact of sandbox

2013
Jin Han Su Mon Kywe Qiang Yan Feng Bao Robert H. Deng Debin Gao Yingjiu Li Jianying Zhou

iOS is Apple’s mobile operating system, which is used on iPhone, iPad and iPod touch. Any third-party applications developed for iOS devices are required to go through Apple’s application vetting process and appear on the official iTunes App Store upon approval. When an application is downloaded from the store and installed on an iOS device, it is given a limited set of privileges, which are en...

1997
Li Gong Marianne Mueller Hemma Prafullchandra Roland Schemers JavaSoft Sun

This paper describes the new security architec ture that has been implemented as part of JDK the forthcoming Java Development Kit In going beyond the sandbox security model in the original release of Java JDK provides ne grained ac cess control via an easily con gurable security pol icy Moreover JDK introduces the concept of protection domain and a few related security prim itives that help to ...

1997
John D. McLean

This debate was conceived by Carl Landwehr, who asked me to serve as moderator. The proposition under discussion was first put forward by Bill Wulf in the JavaSoft Forum 1.1 (http://java.sun.com/forum/securityForum.html). Wulf objects to the JavaSoft security model, which aims to protect user files, network connections! and other resources from malicious applets by restricting applets to execut...

2017

A malware is a program that has a malicious intent. Nowadays, attack from malwares is rising in alarming fashion and thousands of malwares are injected to the Internet. Malware authors use many techniques like obfuscation and packing to avoid detection. A number of techniques for malware detection are available and none of them able to detect all types of malwares. In this paper, a more efficie...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید