Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 227,455,457 papers from all fields of science
Search
Sign In
Create Free Account
Sandbox (computer security)
Known as:
Software fault isolation
, Sandboxed
, Sandbox
Expand
In computer security, a sandbox is a security mechanism for separating running programs. It is often used to execute untested or untrusted programs…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
Acronis True Image
Android
App Store Approval Process
Application firewall
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
IMPLEMENTING AUGMENTED REALITY SANDBOX IN GEODESIGN: A FUTURE
A. Afrooz
,
H. Ballal
,
C. Pettit
ISPRS Annals of the Photogrammetry, Remote…
2018
Corpus ID: 56332966
Abstract. Geodesign method and tools are extensively used for collaborative decision making focused on different fields such as…
Expand
2018
2018
Web Server Load Balancing Based On Memory Utilization Using Docker Swarm
Mochamad Rexa Mei Bella
,
Mahendra Data
,
Widhi Yahya
International Conference on Sustainable…
2018
Corpus ID: 121370843
Recently, container-based virtualization is gaining popularity. It is a lightweight virtualization, which utilizes the…
Expand
2013
2013
ADAM: Automated detection and attribution of malicious webpages
Ahmed E. Kosba
,
Aziz Mohaisen
,
Andrew G. West
,
Trevor Tonn
IEEE Conference on Communications and Network…
2013
Corpus ID: 10098486
Malicious webpages are a prevalent and severe threat in the Internet security landscape. This fact has motivated numerous static…
Expand
2009
2009
Practical Correlation Analysis between Scan and Malware Profiles against Zero-Day Attacks Based on Darknet Monitoring
K. Nakao
,
D. Inoue
,
Masashi Eto
,
K. Yoshioka
IEICE Trans. Inf. Syst.
2009
Corpus ID: 4712504
Considering rapid increase of recent highly organized and sophisticated malwares, practical solutions for the countermeasures…
Expand
2006
2006
Security issues in on-demand grid and cluster computing
Matthew Smith
,
M. Engel
,
T. Friese
,
Bernd Freisleben
,
G. Koenig
,
W. Yurcik
IEEE/ACM International Symposium on Cluster…
2006
Corpus ID: 436994
In this paper, security issues in on-demand grid and cluster computing are analyzed, a corresponding threat model is presented…
Expand
Highly Cited
2004
Highly Cited
2004
Named Entity : History and Future
S. Sekine
2004
Corpus ID: 62782187
The term “Named Entity (NE)”, widely used in Information Extraction (IE), Question Answering (QA) or other Natural Language…
Expand
2003
2003
Potential of sandbox, Hura crepitans L. seed oil for protection of cowpea seeds from Callosobruchus maculatus Fabricius (Coleoptera: Bruchidae) infestation
C. O. Adedire
,
O. Ajayi
2003
Corpus ID: 89274237
Investigations were carried out on the insecticidal activity of Hura crepitans L. (Sandbox seed) oil on oviposition, adult…
Expand
2001
2001
Protecting the Creation of Digital Signatures with Trusted Computing Platform Technology Against Attacks by Trojan Horse Programs
Adrian Spalka
,
A. Cremers
,
Hanno Langweg
IFIP International Information Security…
2001
Corpus ID: 52838399
Digital signatures are a key technology for many Internet-based commercial and administrative applications and, therefore, and…
Expand
1996
1996
Physics in a jumping sandbox
J. Fineberg
Nature
1996
Corpus ID: 30432282
1996
1996
The SpectrumWare approach to wireless signal processing
D. Tennenhouse
,
V. Bose
Wirel. Networks
1996
Corpus ID: 16925977
The SpectrumWare project is applying a software oriented approach to wireless communication and distributed signal processing…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE