共 50 条
- [41] Scaling a file system to many cores using an operation log PROCEEDINGS OF THE TWENTY-SIXTH ACM SYMPOSIUM ON OPERATING SYSTEMS PRINCIPLES (SOSP '17), 2017, : 69 - 86
- [42] Cryptographic security for a high-performance distributed file system 24TH IEEE CONFERENCE ON MASS STORAGE SYSTEMS AND TECHNOLOGIES, PROCEEDINGS, 2007, : 227 - +
- [43] CONCEPTUAL VIEW OF MS-DOS FILE SYSTEM SECURITY WIRTSCHAFTSINFORMATIK, 1991, 33 (06): : 526 - 531
- [44] Research on file synchronization backup system based on security policy IEEE Int. Conf. Commun. Softw. Networks, ICCSN, 2011, (246-249):
- [45] Anomaly detection in computer security and an application to file system accesses FOUNDATIONS OF INTELLIGENT SYSTEMS, PROCEEDINGS, 2005, 3488 : 14 - 28
- [46] A file transfer method and system for crossing security isolation gateways PROCEEDINGS OF INTERNATIONAL CONFERENCE ON ALGORITHMS, SOFTWARE ENGINEERING, AND NETWORK SECURITY, ASENS 2024, 2024, : 665 - 670
- [47] File Transparent Encryption System Design Based on Security Directory ADVANCES IN MECHATRONICS AND CONTROL ENGINEERING II, PTS 1-3, 2013, 433-435 : 1742 - 1746
- [48] Research on the Security Problem in Windows 7 Operating System PROCEEDINGS 2016 EIGHTH INTERNATIONAL CONFERENCE ON MEASURING TECHNOLOGY AND MECHATRONICS AUTOMATION ICMTMA 2016, 2016, : 568 - 571
- [50] Power system operation and security monitoring simulation system Zhongguo Dianji Gongcheng Xuebao/Proceedings of the Chinese Society of Electrical Engineering, 2011, 31 (28): : 80 - 86