-
441
Open source systems for business rules repository development
Published 2005-12-01Get full text
Article -
442
Calculation Program Design of the Involute Spline Geometric Parameter
Published 2017-01-01Get full text
Article -
443
-
444
-
445
INTERNAL FORMATION MECHANISM OF CONSTRUCTION COMPANY INNOVATION MODELING DEVELOPMENT
Published 2016-10-01Get full text
Article -
446
-
447
Research of the Influence Law of the CVT Speed Ratio Changing Rate on the Vehicle Acceleration
Published 2015-01-01Get full text
Article -
448
-
449
STUDY OF MAGNETOSTRICTIVE PROPERTIES OF MATERIALS BY MEANS OF METHOD OF ATOMIC FORCE MICROSCOPY
Published 2015-03-01Get full text
Article -
450
Application of integrating VC cross-connecting function with OTN system
Published 2018-02-01Get full text
Article -
451
-
452
Determinación de la energía libre superficial del líquido sinovial humano en biomateriales
Published 2021-01-01Get full text
Article -
453
El Rol de la Escuela en la Comunidad Indígena.
Published 2024-06-01“…Y es que los objetivos de ambas no son coincidentes, y mejor dicho son conflictivas, por provenir de culturas, ideologías, sistemas económicos, concepción del mundo muy opuestos. …”
Get full text
Article -
454
Privacy protection system based on Hook for Android
Published 2018-04-01“…A privacy protection system based on Hook technology was designed and implemented to address the problem of user privacy leakage caused by malicious applications in Android.The system consists of three modules:application classification module,privacy information management module and collusion attack management module.The application classification module constructs classification model by using permission feature vectors and then classifies mobile applications into malicious applications and normal applications.The privacy information management module hooks all privacy-related application programming interfaces (API) based on Hook technology and then intercepts malicious applications by returning false data or empty data.The collusion attack management module hooks all inter-application communication channels and then intercepts corresponding communication contents by using the permission rules of collusion attack.Finally,the proposed privacy protection scheme on Android virtual machine was implemented to prove and its feasibility and effectiveness were proved.In addition,the system can intercept application behaviors of breaching privacy in real time with less memory,which does not need to modify Android system and applications.…”
Get full text
Article -
455
-
456
Polyfactoriality as a Defining Criterion of Formulaic Speech
Published 2020-12-01Get full text
Article -
457
-
458
Green Worlds: Shakespeare’s Plays and Early Modern Imagery
Published 2015-06-01Get full text
Article -
459
Information sets as permutation cycles for quadratic residue codes
Published 1982-01-01Get full text
Article -
460