نتایج جستجو برای: فولاد api x70

تعداد نتایج: 19080  

Journal: :RFC 2006
Sam Hartman

The Generic Security Services API (GSS-API) provides a naming architecture that supports name-based authorization. GSS-API authenticates two named parties to each other. Names can be stored on access control lists (ACLs) to make authorization decisions. Advances in security mechanisms and the way implementers wish to use GSS-API require this model to be extended for the next version of GSS-API....

Journal: :Journal of Systems and Software 2015
Tiago Espinha Andy Zaidman Hans-Gerhard Groß

Web APIs provide a systematic and extensible approach for application-toapplication interaction. Developers using web APIs are forced to accompany the API providers in their software evolution tasks. In order to understand the distress caused by this imposition on web API client developers we perform a semi-structured interview with six such developers. We also investigate how major web API pro...

Journal: :Chirurgia 2013
G I Popescu O Lupescu M Nagea C Patru

Acute Peripheral Ischemia (API) is the most severe acute complication after both open and closed fractures, as ischemia compromises not only the vitality of the affected limb, but also the patient's life, because metabolic anaerobic changes following ischemia have serious local and general consequences. These explain why early diagnosis of API is very important for the prognosis of the traumati...

2008
Juliana Wahid

The Extensible Markup Language (XML) consists of two Application Programming Interface (API) i.e. Document Object Model (DOM) and Simple Application of XML (SAX). Previous research has used the DOM API in the Leave Application prototype. In this research, the DOM API based code that developed in the prototype will be changed to SAX API based code. The performance measurement then is carried out...

2004
Vinod Ganapathy Sanjit A. Seshia Somesh Jha Thomas W. Reps Randal E. Bryant

A system is vulnerable to an API-level attack if its security can be compromised by invoking an allowed sequence of operations from its API. We present a formal framework to model and analyze APIs, and develop an automatic technique based upon bounded model checking to discover API-level vulnerabilities. If a vulnerability exists, our technique produces a trace of API operations demonstrating a...

Journal: :Computers & Security 2014
Ammar Ahmed E. Elhadi Mohd Aizaini Maarof Bazara I. A. Barry Hentabli Hamza

Malware stands for malicious software. It is software that is designed with a harmful intent. A malware detector is a system that attempts to identify malware using Application Programming Interface (API) call graph technique and/or other techniques. API call graph techniques follow two main steps, namely, transformation of malware samples into an API call graph using API call graph constructio...

2012

An application programming interface (API) is a specification intended to be used as an interface by software components to communicate with each other. An API may include specifications for routines, data structures, object classes, and variables. An API specification can take many forms, including an International Standard such as POSIX or vendor documentation such as the Microsoft Windows AP...

Journal: :CoRR 2018
Vadim Kotov Michael Wojnowicz

A common way to get insight into a malicious program’s functionality is to look at which API functions it calls. To complicate the reverse engineering of their programs, malware authors deploy API obfuscation techniques, hiding them from analysts’ eyes and anti-malware scanners. This problem can be partially addressed by using dynamic analysis; that is, by executing a malware sample in a contro...

2012
Thiago T. Bartolomei

Software developers often encapsulate reusable code as Application Programming Interfaces (APIs). The co-evolution of applications and APIs may motivate an API migration: the replacement of application dependencies to an original API by dependencies to an alternative API that provides similar functionality and abstractions. In this dissertation, we investigate issues associated with API migrati...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید