Inhaltsverzeichnis
Auswahl der wissenschaftlichen Literatur zum Thema „Exploit testing“
Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an
Machen Sie sich mit den Listen der aktuellen Artikel, Bücher, Dissertationen, Berichten und anderer wissenschaftlichen Quellen zum Thema "Exploit testing" bekannt.
Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.
Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.
Zeitschriftenartikel zum Thema "Exploit testing"
Deng, Fenglei, Jian Wang, Bin Zhang, Chao Feng, Zhiyuan Jiang, and Yunfei Su. "A Pattern-Based Software Testing Framework for Exploitability Evaluation of Metadata Corruption Vulnerabilities." Scientific Programming 2020 (September 27, 2020): 1–21. http://dx.doi.org/10.1155/2020/8883746.
Der volle Inhalt der QuelleNarayana Rao, T. Venkat, and Vemula Shravan. "Metasploit Unleashed Tool for Penetration Testing." International Journal on Recent and Innovation Trends in Computing and Communication 7, no. 4 (2019): 16–20. http://dx.doi.org/10.17762/ijritcc.v7i4.5285.
Der volle Inhalt der QuelleMason, G. J. "CONTRAFREELOADING IN STARLINGS: TESTING THE INFORMATION HYPOTHESIS." Behaviour 136, no. 10-11 (1999): 1267–82. http://dx.doi.org/10.1163/156853999500712.
Der volle Inhalt der QuelleBarone, Guglielmo, Francesco D'Acunto, and Gaia Narciso. "Telecracy: Testing for Channels of Persuasion." American Economic Journal: Economic Policy 7, no. 2 (2015): 30–60. http://dx.doi.org/10.1257/pol.20130318.
Der volle Inhalt der QuelleBin Khalid, Hasnan, and Budi Saesar Luhur. "Kinematic-Dynamic Modeling and Test Control of Tracked Drive Vehicle for Indoor Mapping." Applied Mechanics and Materials 148-149 (December 2011): 1510–13. http://dx.doi.org/10.4028/www.scientific.net/amm.148-149.1510.
Der volle Inhalt der QuelleBergström, Gunnar, Jonas Christoffersson, Kristin Schwanke, Robert Zweigerdt, and Carl-Fredrik Mandenius. "Stem cell derived in vivo-like human cardiac bodies in a microfluidic device for toxicity testing by beating frequency imaging." Lab on a Chip 15, no. 15 (2015): 3242–49. http://dx.doi.org/10.1039/c5lc00449g.
Der volle Inhalt der QuellePedersen, Rasmus Søndergaard, and Anders Rahbek. "TESTING GARCH-X TYPE MODELS." Econometric Theory 35, no. 05 (2018): 1012–47. http://dx.doi.org/10.1017/s026646661800035x.
Der volle Inhalt der QuelleLakshmiSupraja, K. "Sneaking into Mobile." International Journal for Research in Applied Science and Engineering Technology 9, no. VI (2021): 5107–17. http://dx.doi.org/10.22214/ijraset.2021.36042.
Der volle Inhalt der QuelleSLOAN, JOHN C., and TAGHI M. KHOSHGOFTAAR. "TESTING AND FORMAL VERIFICATION OF SERVICE ORIENTED ARCHITECTURES." International Journal of Reliability, Quality and Safety Engineering 16, no. 02 (2009): 137–62. http://dx.doi.org/10.1142/s0218539309003332.
Der volle Inhalt der QuelleSeong, Jin-Taek. "Group Testing-Based Robust Algorithm for Diagnosis of COVID-19." Diagnostics 10, no. 6 (2020): 396. http://dx.doi.org/10.3390/diagnostics10060396.
Der volle Inhalt der QuelleDissertationen zum Thema "Exploit testing"
Flansburg, Kevin. "A framework for automated management of exploit testing environments." Thesis, Georgia Institute of Technology, 2015. http://hdl.handle.net/1853/54912.
Der volle Inhalt der QuelleVernersson, Susanne. "Penetration Testing in a Web Application Environment." Thesis, Linnéuniversitetet, Institutionen för datavetenskap, fysik och matematik, DFM, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-8934.
Der volle Inhalt der QuelleKahlström, Joakim, and Johan Hedlin. "Automating software installation for cyber security research and testing public exploits in CRATE." Thesis, Linköpings universitet, Databas och informationsteknik, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-177401.
Der volle Inhalt der QuelleAndersson, Gustaf, and Fredrik Andersson. "Android Environment Security." Thesis, Linnéuniversitetet, Institutionen för datavetenskap, fysik och matematik, DFM, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-20512.
Der volle Inhalt der QuelleBahabanian, Olivier. "Explicit deconvolution of wellbore storage distorted well test data." Texas A&M University, 2006. http://hdl.handle.net/1969.1/4811.
Der volle Inhalt der QuelleMcNiel, Patrick D. "Implicit and explicit measures." Thesis, Atlanta, Ga. : Georgia Institute of Technology, 2009. http://hdl.handle.net/1853/28132.
Der volle Inhalt der QuelleCollier, Benjamin Lee. "DOES OPTIMISM EXPLAIN HOW RELIGIOUSNESS AFFECTS ALCOHOL USE AMONG COLLEGE STUDENTS?" UKnowledge, 2006. http://uknowledge.uky.edu/gradschool_theses/398.
Der volle Inhalt der QuelleAndersson, Daniel, and Fredrik Saliba. "Virtual testing of self-piercing rivet connections." Thesis, Luleå tekniska universitet, Institutionen för teknikvetenskap och matematik, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-79405.
Der volle Inhalt der QuelleLiang, Yuli. "Contributions to Estimation and Testing Block Covariance Structures in Multivariate Normal Models." Doctoral thesis, Stockholms universitet, Statistiska institutionen, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:su:diva-115347.
Der volle Inhalt der QuellePillai, Anil Ph D. "Retreating from the Nuclear Path Testing the theory of Prudential Realism to explain Nuclear Forbearance." University of Cincinnati / OhioLINK, 2012. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1342103267.
Der volle Inhalt der QuelleBücher zum Thema "Exploit testing"
Maynor, David. Metasploit toolkit for penetration testing, exploit development, and vulnerability research. Syngress, 2007.
Den vollen Inhalt der Quelle findenMaynor, David. Metasploit toolkit for penetration testing, exploit development, and vulnerability research. Syngress, 2007.
Den vollen Inhalt der Quelle findenImplicit and explicit knowledge in second language learning, testing and teaching. Multilingual Matters, 2009.
Den vollen Inhalt der Quelle findenACT, PLAN, EXPLORE: Mathematics victory : Classroom text. 3rd ed. Cambridge Publishing, 2008.
Den vollen Inhalt der Quelle findenBlau, Francine D. Do cognitive test scores explain higher US wage inequality? National Bureau of Economic Research, 2001.
Den vollen Inhalt der Quelle findenUnited States. Office of Educational Research and Improvement., National Center for Education Statistics., and National Assessment of Educational Progress (Project), eds. Using HLM and NAEP data to explore school correlates of 1990 mathematics and geometry achievement in grades 4, 8, and 12: Methodology and results. U.S. Dept. of Education, Office of Educational Research and Improvement, 1995.
Den vollen Inhalt der Quelle findenMaugeri, Giuseppe. L’insegnamento dell’italiano a stranieri Alcune coordinate di riferimento per gli anni Venti. Fondazione Università Ca’ Foscari, 2021. http://dx.doi.org/10.30687/978-88-6969-523-0.
Der volle Inhalt der QuelleMetasploit Toolkit for Penetration Testing, Exploit Development, and Vulnerability Research. Elsevier, 2007. http://dx.doi.org/10.1016/b978-1-59749-074-0.x5000-4.
Der volle Inhalt der QuelleFoster, James. Metasploit Toolkit for Penetration Testing, Exploit Development, and Vulnerability Research. Syngress, 2007.
Den vollen Inhalt der Quelle findenMegahed, Hamza. Penetration Testing with Shellcode: Detect, exploit, and secure network-level and operating system vulnerabilities. Packt Publishing, 2018.
Den vollen Inhalt der Quelle findenBuchteile zum Thema "Exploit testing"
Kayacık, Hilmi G., A. Nur Zincir-Heywood, Malcolm I. Heywood, and Stefan Burschka. "Testing Detector Parameterization Using Evolutionary Exploit Generation." In Lecture Notes in Computer Science. Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-01129-0_13.
Der volle Inhalt der QuelleTavazzi, Erica, Camille L. Gerard, Olivier Michielin, Alexandre Wicky, Roberto Gatta, and Michel A. Cuendet. "A Process Mining Approach to Statistical Analysis: Application to a Real-World Advanced Melanoma Dataset." In Lecture Notes in Business Information Processing. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-72693-5_22.
Der volle Inhalt der QuelleLi, Jianwen, Shufang Zhu, Geguang Pu, and Moshe Y. Vardi. "SAT-Based Explicit LTL Reasoning." In Hardware and Software: Verification and Testing. Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-26287-1_13.
Der volle Inhalt der QuelleKühn, Johannes Maximilian, Oliver Bringmann, and Wolfgang Rosenstiel. "Increasing Reliability Using Adaptive Cross-Layer Techniques in DRPs: Just-Safe-Enough Responses to Reliability Threats." In Dependable Embedded Systems. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-52017-5_5.
Der volle Inhalt der QuellePorat, Ely, and Amir Rothschild. "Explicit Non-adaptive Combinatorial Group Testing Schemes." In Automata, Languages and Programming. Springer Berlin Heidelberg, 2008. http://dx.doi.org/10.1007/978-3-540-70575-8_61.
Der volle Inhalt der QuelleChristakis, Maria, Peter Müller, and Valentin Wüstholz. "Collaborative Verification and Testing with Explicit Assumptions." In FM 2012: Formal Methods. Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-32759-9_13.
Der volle Inhalt der QuelleBrucker, Achim D., and Burkhart Wolff. "Monadic Sequence Testing and Explicit Test-Refinements." In Tests and Proofs. Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-41135-4_2.
Der volle Inhalt der QuelleBeckert, Bernhard, Sarah Grebing, and Mattias Ulbrich. "An Interaction Concept for Program Verification Systems with Explicit Proof Object." In Hardware and Software: Verification and Testing. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-70389-3_11.
Der volle Inhalt der QuelleRozier, Kristin Yvonne, and Moshe Y. Vardi. "Deterministic Compilation of Temporal Safety Properties in Explicit State Model Checking." In Hardware and Software: Verification and Testing. Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-39611-3_23.
Der volle Inhalt der QuelleIsbell, Daniel R., and John Rogers. "Measuring Implicit and Explicit Learning and Knowledge." In The Routledge Handbook of Second Language Acquisition and Language Testing. Routledge, 2020. http://dx.doi.org/10.4324/9781351034784-33.
Der volle Inhalt der QuelleKonferenzberichte zum Thema "Exploit testing"
Darmaillacq, Vianney. "Security policy testing using vulnerability exploit chaining." In 2008 IEEE International Conference on Software Testing Verification and Validation Workshop. IEEE, 2008. http://dx.doi.org/10.1109/icstw.2008.37.
Der volle Inhalt der QuelleRodrigues, Gennaro S., Fernanda L. Kastensmidt, Vincent Pouget, and Alberto Bosio. "Performances VS Reliability: how to exploit Approximate Computing for Safety-Critical applications." In 2018 IEEE 24th International Symposium on On-Line Testing And Robust System Design (IOLTS). IEEE, 2018. http://dx.doi.org/10.1109/iolts.2018.8474122.
Der volle Inhalt der QuelleIliopoulos, Athanasios, John G. Michopoulos, and John C. Hermanson. "Composite Material Testing Data Reduction to Adjust for the Systematic 6-DoF Testing Machine Aberrations." In ASME 2012 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference. American Society of Mechanical Engineers, 2012. http://dx.doi.org/10.1115/detc2012-71119.
Der volle Inhalt der QuelleJohn, Shaju, Jin-Hyeong Yoo, and Norman M. Wereley. "A Magnetorheological Actuation System: Part I — Testing." In ASME 2007 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference. ASMEDC, 2007. http://dx.doi.org/10.1115/detc2007-35646.
Der volle Inhalt der QuelleSchwartz, Christian J., and Shyam Bahadur. "Development of a Novel Wear Testing Device for the Investigation of Articular Cartilage and Compliant Polymers for Use in Biomedical Implants." In World Tribology Congress III. ASMEDC, 2005. http://dx.doi.org/10.1115/wtc2005-63370.
Der volle Inhalt der QuelleGerber, Andrew G., Kevin W. Wilcox, and Jian T. Zhang. "Benchmarking of a Massively Parallel Hybrid CFD Solver for Ocean Applications." In ASME 2013 32nd International Conference on Ocean, Offshore and Arctic Engineering. American Society of Mechanical Engineers, 2013. http://dx.doi.org/10.1115/omae2013-10999.
Der volle Inhalt der QuelleZhang, Meishan, Guohong Fu, and Nan Yu. "Segmenting Chinese Microtext: Joint Informal-Word Detection and Segmentation with Neural Networks." In Twenty-Sixth International Joint Conference on Artificial Intelligence. International Joint Conferences on Artificial Intelligence Organization, 2017. http://dx.doi.org/10.24963/ijcai.2017/591.
Der volle Inhalt der QuelleSeely, Brian J., Karl M. Kapp, Larraine A. Kapka, and Steven Wendel. "Enhancing Interpretation of Learned Concepts Through an Online Tensile Strength Simulation." In ASME 2017 International Mechanical Engineering Congress and Exposition. American Society of Mechanical Engineers, 2017. http://dx.doi.org/10.1115/imece2017-70445.
Der volle Inhalt der QuelleYang, Bozhi, and Qiao Lin. "Planar Microfabricated Check Valves Utilizing Large Compliance of PDMS." In ASME 2005 International Mechanical Engineering Congress and Exposition. ASMEDC, 2005. http://dx.doi.org/10.1115/imece2005-81958.
Der volle Inhalt der QuelleEmam, Samir A., Jared Hobeck, and Daniel J. Inman. "Experimental Study of Nonlinear Vibration Energy Harvesting of a Bistable Composite Laminate." In ASME 2017 Conference on Smart Materials, Adaptive Structures and Intelligent Systems. American Society of Mechanical Engineers, 2017. http://dx.doi.org/10.1115/smasis2017-3717.
Der volle Inhalt der QuelleBerichte der Organisationen zum Thema "Exploit testing"
Sen, Koushik, and Gul Agha. CUTE and jCUTE: Concolic Unit Testing and Explicit Path Model-Checking Tools (Tools Paper). Defense Technical Information Center, 2006. http://dx.doi.org/10.21236/ada484701.
Der volle Inhalt der QuelleClausen, Jay, D. Moore, L. Cain, and K. Malinowski. VI preferential pathways : rule or exception. Engineer Research and Development Center (U.S.), 2021. http://dx.doi.org/10.21079/11681/41305.
Der volle Inhalt der QuelleChornodon, Myroslava. FEAUTURES OF GENDER IN MODERN MASS MEDIA. Ivan Franko National University of Lviv, 2021. http://dx.doi.org/10.30970/vjo.2021.49.11064.
Der volle Inhalt der Quelle