共 50 条
- [41] 20 years operating experience with brackish water RO - A case study WATER SUPPLY PUZZLE: HOW DOES DESALTING FIT IN?, 1996, : 71 - +
- [42] Intelligent computer-aided design systems: Past 20 years and future 20 years AI EDAM-ARTIFICIAL INTELLIGENCE FOR ENGINEERING DESIGN ANALYSIS AND MANUFACTURING, 2007, 21 (01): : 27 - 29
- [44] Proposals of low cost and high security international business operating systems WMSCI 2005: 9th World Multi-Conference on Systemics, Cybernetics and Informatics, Vol 2, 2005, : 89 - 94
- [47] A security architecture for adapting multiple access control models to operating systems COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2006, PT 5, 2006, 3984 : 922 - 931
- [48] Security Deficiencies in the Architecture and Overview of Android and iOS Mobile Operating Systems PROCEEDINGS OF THE 10TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY (ICCWS-2015), 2015, : 153 - 161
- [49] BlackBox: A Container Security Monitor for Protecting Containers on Untrusted Operating Systems PROCEEDINGS OF THE 16TH USENIX SYMPOSIUM ON OPERATING SYSTEMS DESIGN AND IMPLEMENTATION, OSDI 2022, 2022, : 683 - 700
- [50] AN APPROACH FOR DETECTING SECURITY VULNERABILITIES IN WEB BROWSERS FOR MOBILE OPERATING SYSTEMS MATHEMATICS AND INFORMATICS, 2024, 67 (05): : 475 - 488