scholarly journals WPA2 security-bandwith trade-off in 802.11n peer-peer WLAN for IPv4 and IPv6 using Windows XP and Windows 7 operating systems

Author(s):  
Samad Salehi Kolahi ◽  
Peng Li ◽  
Mulugeta Argawe ◽  
Mustafa Safdari
2020 ◽  
Author(s):  
Vaisualua Posese-Okesene

This paper reviews writings already done and published on the topic. The Operating systems covered are Windows Vista, Windows XP, Windows 7 Professional and Windows 8. The categories of Vulnerabilities and Threats are discussed with mechanisms implemented and solutions known.


2020 ◽  
Vol 2020 (1) ◽  
pp. 195-215
Author(s):  
Daniel Smullen ◽  
Yuanyuan Feng ◽  
Shikun Aerin Zhang ◽  
Norman Sadeh

AbstractIn today’s data-centric economy, data flows are increasingly diverse and complex. This is best exemplified by mobile apps, which are given access to an increasing number of sensitive APIs. Mobile operating systems have attempted to balance the introduction of sensitive APIs with a growing collection of permission settings, which users can grant or deny. The challenge is that the number of settings has become unmanageable. Yet research also shows that existing settings continue to fall short when it comes to accurately capturing people’s privacy preferences. An example is the inability to control mobile app permissions based on the purpose for which an app is requesting access to sensitive data. In short, while users are already overwhelmed, accurately capturing their privacy preferences would require the introduction of an even greater number of settings. A promising approach to mitigating this trade-off lies in using machine learning to generate setting recommendations or bundle some settings. This article is the first of its kind to offer a quantitative assessment of how machine learning can help mitigate this trade-off, focusing on mobile app permissions. Results suggest that it is indeed possible to more accurately capture people’s privacy preferences while also reducing user burden.


2017 ◽  
Vol 59 (5) ◽  
Author(s):  
Timo Sandmann ◽  
Andre Richter ◽  
Johann Heyszl ◽  
Enno Lübbers

AbstractVirtualization plays an important role for embedded systems where hardware support can prove beneficial, but these systems also pose a challenge due to power, resource constraints; reliability, safety, real-time requirements; diversity of devices, and operating systems. Therefore a trade-off between flexibility, determinism and performance exists in the embedded application domain. As virtualization in software always incurs overhead due to context switching, interrupt handling, etc. the aim is to minimize the overhead and make execution more deterministic using hardware support.


2020 ◽  
Author(s):  
Vaisualua Posese-Okesene

This paper reviews writings already done and published on the topic. The Operating systems covered are Windows Vista, Windows XP, Windows 7 Professional and Windows 8. The categories of Vulnerabilities and Threats are discussed with mechanisms implemented and solutions known.


2016 ◽  
Vol 8 (3) ◽  
pp. 273-277
Author(s):  
Linas Juozas Jočys

ICMPv6 is the newest version of internet control message protocol, whose main purpose is to send error message indicating packet processing failure. It is know that ICMPv6 is technologically vulnerable. One of those vulnerabilities is the ICMPv6 RA flooding vulnerability, which can lead to systems in Local Area Network slow down or full stop. This paper will discuss Windows (XP, 7, 8.1) and Linux Ubuntu 14 operating systems resistance to RA flooding attack research and countermeasures to minimize this vulnerability. ICMPv6 yra naujausios versijos interneto kontrolės žinučių protokolas, kurio pagrindinis tikslas pranešti apie paketų apdorojimo klaidas IPv6 tinklo mazgams. Analizuojant ICMPv6 protokolą nustatyta, jog šis protokolas yra technologiškai pažeidžiamas. Vienas iš pažeidžiamumų yra ICMPv6 maršrutizatoriaus skelbimo žinučių (RA) atsisakymo aptarnauti pažeidžiamumas, kuris leidžia sulėtinti arba visiškai sutrikdyti operacinių sistemų darbą kompiuteriuose, esančiuose vietiniame tinkle. Straipsnyje aprašomas Windows (XP, 7, 8.1) ir Linux Ubuntu tipų operacinių sistemų atsparumo ICMPv6 protokolo RA žinučių atsisakymo aptarnauti atakai tyrimas. Tyrimo metu nustatytas pasirinktų operacinių sistemų atsparumas RA žinučių atsisakymo aptarnauti atakai, esant skirtingiems techninės įrangos resursams. Straipsnyje taip pat pateiktos prevencinės priemonės ICMPv6 RA žinučių atsisakymo aptarnauti pažeidžiamumui šalinti arba minimizuoti.


Author(s):  
David A. Lee ◽  
Norman Walsh

The efficiency and performance of individual XML operations such as parsing, processing (XSLT, XQuery) and serialization, and the merits of different in-memory document representations, have been widely discussed. However, real world uses cases often involve many operations orchestrated using a scripting environment. The performance of the scripting environment can often overshadow any performance gains in individual operations. In an exploration of real world scripting, we compare performance of several scripting languages and techniques on a set of typical XML operations such as generation of a table of contents and conditionally accessing non-XML files identified in XML documents. Based on performance results, we suggest best practices for scripting XML processes. Scripting languages compared include DOS Shell (CMD.EXE), Linux Shell (bash), XMLSH, and XProc (calabash). These are run (where possible) on multiple operating systems: Windows XP, Linux, and Mac/OS.


1982 ◽  
Vol 14 (2) ◽  
pp. 109-113 ◽  
Author(s):  
Suleyman Tufekci
Keyword(s):  

2012 ◽  
Vol 11 (3) ◽  
pp. 118-126 ◽  
Author(s):  
Olive Emil Wetter ◽  
Jürgen Wegge ◽  
Klaus Jonas ◽  
Klaus-Helmut Schmidt

In most work contexts, several performance goals coexist, and conflicts between them and trade-offs can occur. Our paper is the first to contrast a dual goal for speed and accuracy with a single goal for speed on the same task. The Sternberg paradigm (Experiment 1, n = 57) and the d2 test (Experiment 2, n = 19) were used as performance tasks. Speed measures and errors revealed in both experiments that dual as well as single goals increase performance by enhancing memory scanning. However, the single speed goal triggered a speed-accuracy trade-off, favoring speed over accuracy, whereas this was not the case with the dual goal. In difficult trials, dual goals slowed down scanning processes again so that errors could be prevented. This new finding is particularly relevant for security domains, where both aspects have to be managed simultaneously.


Sign in / Sign up

Export Citation Format

Share Document