نتایج جستجو برای: api call

تعداد نتایج: 110138  

2016
Markus Raab

Configuration files, command-line arguments and environment variables are the dominant tools for local configuration management today. When accessing such program execution environments, however, most applications do not take context, e.g. the system they run on, into account. The aim of this paper is to integrate unmodified applications into a coherent and context-aware system by instrumenting...

2014
Ana Gualdina Almeida Matos José Fragoso Santos Tamara Rezk

We propose and prove sound a novel, purely dynamic, flowsensitive monitor for securing information flow in an imperative language extended with DOM-like tree operations, that we call Core DOM. In Core DOM, as in the DOM API, tree nodes are treated as first-class values. We take advantage of this feature in order to implement an information flow control mechanism that is finer-grained than previ...

2010
Craig Valli

In this paper, we propose a five-step approach to detect obfuscated malware by investigating the structural and behavioural features of API calls. We have developed a fully automated system to disassemble and extract API call features effectively from executables. Using n-gram statistical analysis of binary content, we are able to classify if an executable file is malicious or benign. Our exper...

1999
Stephen Blott José Brustoloni

NetTap is a new platform for prototyping, fieldtesting, and deploying network services. NetTap is based on a PC running FreeBSD. NetTap can be configured as a bridge, router, or host. NetTap’s API allows user-level network applications to send or receive packets, on standard network adapters, without copying or system call overheads. NetTap’s watchdog timer and simple bypass switch can be confi...

2010
Mamoun Alazab Robert Layton Sitalakshmi Venkataraman Paul Watters

In this paper, we propose a five-step approach to detect obfuscated malware by investigating the structural and behavioural features of API calls. We have developed a fully automated system to disassemble and extract API call features effectively from executables. Using n-gram statistical analysis of binary content, we are able to classify if an executable file is malicious or benign. Our exper...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه شهید چمران اهواز - دانشکده ادبیات و زبانهای خارجی 1394

توسع? سریع فناوری های مدرن، محققان، و معلمین زبان را بر آن داشته است که به دنبال روش های جدیدتری برای استفاده از این فناوری ها در محیط کلاس درس باشند، و محیطی عاری از استرس برای یادگیری زبان ایجاد کنند. هدف از این مطالعه بررسی تفاوت های بین دو شیو? تدریس درک مطلب شنیداری، یعنی «یادگیری زبان به کمک کامپیوتر» (call) و «روش سنتی»، به دانش آموزان دوره اول متوسطه در ایران است. همچنین، این مطالعه قصد...

2013

A ny a fi nd s a de ad b od y an d a ne w b es t fr ie nd — a gh os t na m ed E m ily . A t fi rs t A ny a an d Em ily a re c lo se , bu t A ny a re al iz es t ha t so m e pa rt s of t he s to ry E m ily t ol d ab ou t he r de at h do n’ t ad d up . A s A ny a st ru gg le s to s or t ou t fa ct f ro m fi ct io n, s he m us t al so fi gu re o ut l if e in h ig h sc ho ol . Em ily b eg in s to p ...

1997
Udo Nink Norbert Ritter

Database systems as basis for CAD frameworks have to provide data management as well as transaction management facilities meeting the requirements of design applications. One of the most important features is an application programming interface (API) supporting design tool implementation as well as integration of design tools into the CAD framework by integrating a database language into a hos...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید