Search Results

Results (4)

Search Parameters:

Keyword: Operating systems
Order results
Results per page
Open AccessArticle
6 Pages, 2,622 KB Download PDF

Operating Systems Vulnerability – An Examination of Windows 10, macOS, and Ubuntu from 2015 to 2021

Advances in Science, Technology and Engineering Systems Journal, Volume 7, Issue 6, Page # 230–235, 2022; DOI: 10.25046/aj070625
Abstract:

This study investigated the vulnerabilities of three operating systems: Windows 10, macOS, and Ubuntu. The analysis of secondary data obtained from the CVE and NVD databases for the study period demonstrates varying OS vulnerability. Quantitative assessment of the vulnerability (using the vulnerability score) for the investigated operating systems found consistent results in the security vulnerability…

Read More
(This article belongs to Section Information Systems in Computer Science (CIS))
Open AccessArticle
12 Pages, 1,139 KB Download PDF

Using TOST in Teaching Operating Systems and Concurrent Programming Concepts

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 6, Page # 96–107, 2020; DOI: 10.25046/aj050610
Abstract:

The paper is aimed as a concise and relatively self-contained description of the educational environment TOST, used in teaching and learning Operating Systems basics such as Processes, Multiprogramming, Timesharing, Scheduling strategies, and Memory management. TOST also aids education in some important IT concepts such as Deadlock, Mutual exclusion, and Concurrent processes synchronization. The presented integrated…

Read More
(This article belongs to the SP9 (Special Issue on Multidisciplinary Innovation in Engineering Science & Technology 2020) & Section Information Systems in Computer Science (CIS))
Open AccessArticle
7 Pages, 689 KB Download PDF

Virtualization in Cloud Environment: Bandwidth Management

Advances in Science, Technology and Engineering Systems Journal, Volume 4, Issue 2, Page # 221–227, 2019; DOI: 10.25046/aj040229
Abstract:

Cloud computing recently emerged as an interesting model that enables computing and other related internet activities to take place anywhere, anytime. Cloud service providers centralize all servers, networks, and applications to allow their users’ access at any time and from any location. Cloud computing uses already existing resources like server, CPU and storage memory but…

Read More
(This article belongs to the SP7 (Special Issue on Advancement in Engineering and Computer Science 2019) & Section Software Engineering in Computer Science (CSE))
Open AccessArticle
5 Pages, 744 KB Download PDF

Virtual Memory Introspection Framework for Cyber Threat Detection in Virtual Environment

Advances in Science, Technology and Engineering Systems Journal, Volume 3, Issue 1, Page # 25–29, 2018; DOI: 10.25046/aj030104
Abstract:

In today’s information based world, it is increasingly important to safeguard the data owned by any organization, be it intellectual property or personal information. With ever increasing sophistication of malware, it is imperative to come up with an automated and advanced methods of attack vector recognition and isolation. Existing methods are not dynamic enough to…

Read More
(This article belongs to the SP4 (Special issue on Advancement in Engineering Technology 2017-18) & Section Interdisciplinary Applications of Computer Science (CSI))

Journal Menu

Journal Browser


Special Issues

Special Issue on Digital Frontiers of Entrepreneurship: Integrating AI, Gender Equity, and Sustainable Futures
Guest Editors: Dr. Muhammad Nawaz Tunio, Dr. Aamir Rashid, Dr. Imamuddin Khoso
Deadline: 30 May 2026

Special Issue on Sustainable Technologies for a Resilient Future
Guest Editors: Dr. Debasis Mitra, Dr. Sourav Chattaraj, Dr. Addisu Assefa
Deadline: 30 April 2026