Author:
Negi Vipul Singh,Kar Nirmalya
Publisher
Springer International Publishing
Reference17 articles.
1. Dawson, M., Antonio Cárdenas-Haro, J.: Tails Linux operating system: remaining anonymous with the assistance of an incognito system in times of high surveillance. Int. J. Hyperconnectivity Internet Things (IJHIoT) 1(1), 47–55 (2017)
2. Hassan, N.A., Hijazi, R.: Windows security. In: Digital Privacy and Security Using Windows, pp. 103–122. Apress, Berkeley (2017)
3. Ko, J., Lee, S., Lee, C.: Real-time mandatory access control on SELinux for Internet of Things. In: 2019 IEEE International Conference on Consumer Electronics (ICCE), Las Vegas, NV, USA, pp. 1–6 (2019). https://doi.org/10.1109/ICCE.2019.8662112
4. Gregory, M., Loscocco, P.: Using the flask security architecture to facilitate risk adaptable access controls. SELinux Documentation; Published in the Proceedings of the 2007 SELinux Symposium (2007)
5. González-Barahona, J.M., Perez, M.O., de las Heras Quirós, P., González, J.C., Olivera, V.M.: Counting potatoes: the size of Debian 2.2. Upgrade Mag. 2(6), 60–66 (2001)
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Exploring the Use of Tails Operating System in Cybercrime and its Impact on Law Enforcement Investigations;2024 11th International Conference on Computing for Sustainable Global Development (INDIACom);2024-02-28