نتایج جستجو برای: boot strop

تعداد نتایج: 3036  

2009
Yuki Ashino Keisuke Fujita Maiko Furusawa Tetsutaro Uehara Ryôichi Sasaki

A digital forensic logging system must prevent the booting of unauthorized programs and the modification of evidence. Our previous research developed Dig-Force2, a boot control system for Windows XP platforms that employs API hooking and a trusted platform module. However, Dig-Force2 cannot be used for Windows Vista systems because the hooked API cannot monitor booting programs in user accounts...

2005
P. Sarkar D. Missimer

Internet Small Computer System Interface (iSCSI) is a proposed transport protocol for Small Computer Systems Interface (SCSI) that operates on top of TCP. This memo describes a standard mechanism for enabling clients to bootstrap themselves using the iSCSI protocol. The goal of this standard is to enable iSCSI boot clients to obtain the information to open an iSCSI session with the iSCSI boot s...

2009
Kevin Butler Stephen McLaughlin Thomas Moyer Joshua Schiffman Patrick McDaniel

Secure boot mechanisms aim to provide guarantees of integrity of a system as it loads. It ensures that if a system is running, all of its process will satisfy integrity verification requirements. While secure boot has been available for a long time, it is not available in commodity systems due to the high cost of secure hardware. In this paper, we describe Firma, an architecture that provides s...

Journal: :Mechanical Engineering 2010

2013
Bruna Suelen Raymundo Luz Cristina Souza Araujo Dênia Amélia Novato Castelli Von Atzingen Adriana Rodrigues dos Anjos Mendonça Marcos Mesquita Filho Mauricéia Lins de Medeiros

BACKGROUND Lower limb ulcers are a serious medical and socioeconomic problem throughout the world. One type of chronic wound of the lower extremities is the venous ulcer. Therapeutic methods for treating venous ulcer include the use of the Unna boot. OBJECTIVES To evaluate the effectiveness of the customized Unna boot in the treatment of venous ulcers and to monitor the subsequent development...

2001
Brent B. Benda

The authors conducted a study of recidivism of 480 male graduates, aged 16 to 40 years, of a boot camp in the South. Discriminant analysis was used to determine what factors discriminated between three outcomes in a 3-year follow-up: (a) nonrecidivists, (b) recidivists who had committed additional crime after graduation from boot camp, and (c) parole violators. Analyses indicated that present a...

2006
Douglas S. Lange

The Defense Advanced Research Projects Agency (DARPA) has implemented a program to build the first instance of a complete cognitive agent. The program, called Personalized Assistant that Learns (PAL), is expected to yield new cognitive technology of significant value not only to the military, but also to the business and academic sectors. (Gunning 2004) With traditional engineering projects, ev...

2009
Sven Türpe Andreas Poller Jan Steffan Jan-Peter Stotz Jan Trukenmüller

We discuss five attack strategies against BitLocker, which target the way BitLocker is using the TPM sealing mechanism. BitLocker is a disk encryption feature included in some versions of Microsoft Windows. It represents a state-of-the-art design, enhanced with TPM support for improved security. We show that, under certain assumptions, a dedicated attacker can circumvent the protection and brea...

Journal: :IEICE Electronic Express 2005
Chia-Chen Chang Zuyuan He Gregory Senft Nasir Ahmad Erin Sahinci Waqar Mahmood

A novel test methodology is established to evaluate the strain relief boot on optoelectronic components and optical fiber components by measuring the fiber bend radius in side pull test. The technique is developed for qualifying the boot design rather than for lot testing. The criterion and process are provided.

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید