期刊文献+
共找到3篇文章
< 1 >
每页显示 20 50 100
Windows 10’s Browser Forensic Analysis for Tracing P2P Networks’Anonymous Attacks
1
作者 Saima Kauser Tauqeer Safdar Malik +2 位作者 Mohd Hilmi Hasan Emelia Akashah P.Akhir Syed Muhammad Husnain Kazmi 《Computers, Materials & Continua》 SCIE EI 2022年第7期1251-1273,共23页
A web browser is the most basic tool for accessing the internet from any of the machines/equipment.Recently,data breaches have been reported frequently from users who are concerned about their personal information,as ... A web browser is the most basic tool for accessing the internet from any of the machines/equipment.Recently,data breaches have been reported frequently from users who are concerned about their personal information,as well as threats from criminal actors.Giving loss of data and information to an innocent user comes under the jurisdiction of cyber-attack.These kinds of cyber-attacks are far more dangerous when it comes to the many types of devices employed in an internet of things(IoT)environment.Continuous surveillance of IoT devices and forensic tools are required to overcome the issues pertaining to secure data and assets.Peer to peer(P2P)applications have been utilized for criminal operations on the web.Therefore,it is a challenge for a forensic investigator to perform forensic analysis of the evolving hardware and software platforms for IoT.For identity concealment and privacy protection,the Onion Router(Tor)and Chrome with the Invisible Internet Project(I2P)as the foundation browser are often used.Confirmation is required to determine whether Tor is truly anonymous and private as they claim.Some people,on the other hand,utilize the Tor browser for evil reasons.Tools and techniques are available for the collection of artifacts,identifying problem areas,further processing and analysis of data on the computer and IoT.Present research tried to explore a few tools for the tracing of I2P activities over computer on windows 10 that reflects IoT devices.According to the results of this research,it leaves an excessive amount of important digital evidence on the operating system that can be exploited to attack the information of users.This research is based on windows operating system and does not support other operating systems. 展开更多
关键词 Cyber-security peer-to-peer invisible internet project(I2P) forensic analysis the onion router(Tor)
下载PDF
如何提升项目代码质量以快速通过功能安全认证
2
作者 Shawn Prestridge 《单片机与嵌入式系统应用》 2022年第3期92-93,共2页
引言在汽车、航空电子、医疗和工业控制等众多行业中,新开发的应用在大多数情况下必须取得相应的功能安全认证。通过所有必要的流程和测试来完成功能安全认证历来是一个非常困难的过程,但有一些方法有助于加快完成认证的速度。当然,选... 引言在汽车、航空电子、医疗和工业控制等众多行业中,新开发的应用在大多数情况下必须取得相应的功能安全认证。通过所有必要的流程和测试来完成功能安全认证历来是一个非常困难的过程,但有一些方法有助于加快完成认证的速度。当然,选择诸如IAR Embedded Workbench这样本身就获得了认证,并在多样化的实际应用中经过验证的开发工具,也是加快从设计到完成认证过程的方法。 展开更多
关键词 代码质量 航空电子 WORKBENCH 认证过程 开发工具 多样化
下载PDF
低效的C++ 真是这样吗?
3
作者 Anders Lundgren 《中国电子商情》 2008年第8期61-64,共4页
C++可以为嵌入式编程人员提供一些优于C语言的显著特点。在刚开始,C++可以简单的作为一个更好的C使用:正如一些C编程者用C++编译器运行代码进行质量检验。这也表明,转向使用C++所带来的利弊并不是绝对的:正如本文所述,你可以... C++可以为嵌入式编程人员提供一些优于C语言的显著特点。在刚开始,C++可以简单的作为一个更好的C使用:正如一些C编程者用C++编译器运行代码进行质量检验。这也表明,转向使用C++所带来的利弊并不是绝对的:正如本文所述,你可以选择一些对应用有用的C++功能,而不要其他功能。相比于C,C++更加强大的类型检验可以在编译时发现更多的错误,实现精确的内存控制和开发出更紧凑的执行代码。 展开更多
关键词 C++ 低效 质量检验 编译器 C语言 嵌入式 编程 代码
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部