operating system design
Recently Published Documents


TOTAL DOCUMENTS

60
(FIVE YEARS 3)

H-INDEX

10
(FIVE YEARS 0)

2021 ◽  
Vol 11 (20) ◽  
pp. 9509
Author(s):  
Tiago Cruz ◽  
Paulo Simões

Prior experience from the authors has shown that a heavily theoretical approach for cybersecurity training has multiple shortcomings, mostly due to the demanding and diversified nature of the prerequisites, often involving concepts about operating system design, networking and computer architecture, among others. In such circumstances, the quest for trainee engagement often turns into a delicate balancing act between managing their expectations and providing an adequate progression path. In this perspective, hands-on exercises and contact with high-fidelity environments play a vital part in fostering interest and promoting a rewarding learning experience. Making this possible requires having the ability to design and deploy different use case training scenarios in a flexible way, tailored to the specific needs of classroom-based, blended or e-learning teaching models. This paper presents a flexible framework for the creation of laboratory and cyber range environments for training purposes, detailing the development, implementation and exploration of a cyber range scenario, within the scope of a course on cyber-physical systems security. Moreover, the course structure, curricular aspects and teaching methods are also detailed, as well as the feedback obtained from the students.


2020 ◽  
pp. 107780122092373
Author(s):  
Diarmaid Harkin ◽  
Adam Molnar

Spyware products sold to general consumer audiences are a greater threat to those who own Android devices than those who own iPhones. This is a consequence of the Android operating system being more permissive of software functionality, allowing third-party developers greater latitude to build programs of less-restrained capability. Such risks, however, are disproportionately carried by victims of family violence who are significantly threatened by the rise of spyware. This article reflects on the connections between coding choices and personal security risks, and the implications for responding to the use of spyware in the context of family violence.


2019 ◽  
Author(s):  
Kavitha V ◽  
Bhuvanesh A ◽  
Joshuva Arputharaj J ◽  
Joshua Mani M ◽  
Ajay Subbiah K

2015 ◽  
Author(s):  
Douglas Comer ◽  
Douglas Comer

2014 ◽  
Vol 7 (1) ◽  
pp. 16-29
Author(s):  
Taqwa Flayyih Hasan

Scheduling is a key concept in computer multitasking and multiprocessing operating system design, and in real-time operating system design. CPU scheduling is the basis of multiprogramming operating systems by switching the CPU among process; the operating system can make the computer more productive, scheduling algorithms are widely used in communications networks and in operating systems to allocate resources to competing tasks. In this paper, visual interfaces for CPU scheduling algorithms were designed by using Visual Basic6 language. They may use to learn users about this algorithms and how they work


2013 ◽  
Author(s):  
Leva ◽  
Terraneo ◽  
Maggio ◽  
Papadopoulos

Sign in / Sign up

Export Citation Format

Share Document