Um die anderen Arten von Veröffentlichungen zu diesem Thema anzuzeigen, folgen Sie diesem Link: Exploit testing.

Zeitschriftenartikel zum Thema „Exploit testing“

Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an

Wählen Sie eine Art der Quelle aus:

Machen Sie sich mit Top-50 Zeitschriftenartikel für die Forschung zum Thema "Exploit testing" bekannt.

Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.

Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.

Sehen Sie die Zeitschriftenartikel für verschiedene Spezialgebieten durch und erstellen Sie Ihre Bibliographie auf korrekte Weise.

1

Boyanov, Petar. "VULNERABILITY PENETRATION TESTING THE COMPUTER AND NETWORK RESOURCES OF WINDOWS BASED OPERATING SYSTEMS." Journal scientific and applied research 5, no. 1 (2014): 85–92. http://dx.doi.org/10.46687/jsar.v5i1.113.

Der volle Inhalt der Quelle
Annotation:
In this paper a vulnerability penetration testing for several hosts in WLAN is made. The exploited operating systems were Microsoft Windows 7Enterprise and Microsoft Windows 8. It has been used an exploit named “Java storeImageArray () Invalid Array Index-ing Vulnerability”. Thanks to the open source penetration testing platform - Metasploit Framework the exploit was executed on the target hosts. The most important and critical rea-son the attack being successfully executed is connected with the human factor and interven-tion. Thereby, some security professionals and network administrators can
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Wang, Yu, Yipeng Zhang, and Zhoujun Li. "AAHEG: Automatic Advanced Heap Exploit Generation Based on Abstract Syntax Tree." Symmetry 15, no. 12 (2023): 2197. http://dx.doi.org/10.3390/sym15122197.

Der volle Inhalt der Quelle
Annotation:
Automatic Exploit Generation (AEG) involves automatically discovering paths in a program that trigger vulnerabilities, thereby generating exploits. While there is considerable research on heap-related vulnerability detection, such as detecting Heap Overflow and Use After Free (UAF) vulnerabilities, among contemporary heap-automated exploit techniques, only certain automated exploit techniques can hijack program control flow to the shellcode. An important limitation of this approach is that it cannot effectively bypass Linux’s protection mechanisms. To solve this problem, we introduced Automati
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Deng, Fenglei, Jian Wang, Bin Zhang, Chao Feng, Zhiyuan Jiang, and Yunfei Su. "A Pattern-Based Software Testing Framework for Exploitability Evaluation of Metadata Corruption Vulnerabilities." Scientific Programming 2020 (September 27, 2020): 1–21. http://dx.doi.org/10.1155/2020/8883746.

Der volle Inhalt der Quelle
Annotation:
In recent years, increased attention is being given to software quality assurance and protection. With considerable verification and protection schemes proposed and deployed, today’s software unfortunately still fails to be protected from cyberattacks, especially in the presence of insecure organization of heap metadata. In this paper, we aim to explore whether heap metadata could be corrupted and exploited by cyberattackers, in an attempt to assess the exploitability of vulnerabilities and ensure software quality. To this end, we propose RELAY, a software testing framework to simulate human e
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Gomathy, Dr C. K., Dr V. Geetha, Mr D. Sri Datta Vallabh, and Mr Y. Yagn Sai Praneesh Reddy. "Ethical Hacking and Vulnerability Testing: Navigating Legal and Moral Boundaries." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 09 (2024): 1–5. http://dx.doi.org/10.55041/ijsrem37503.

Der volle Inhalt der Quelle
Annotation:
In today's interconnected world, cybersecurity is of paramount importance, with organizations facing ever-evolving threats from malicious actors seeking to exploit vulnerabilities in their digital infrastructure. Ethical hacking and vulnerability testing have emerged as crucial tools in the fight against cyber threats, enabling organizations to proactively identify and address security weaknesses before they can be exploited by attackers. However, the practice of ethical hacking raises complex ethical and legal considerations, as practitioners navigate the delicate balance between security imp
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Bogdanova, Elizaveta, Larysa Pavlova, and Karina Pohorila. "A concise overview of the specific features of using exployts." Computer Science and Cybersecurity, no. 1 (November 11, 2022): 16–20. http://dx.doi.org/10.26565/2519-2310-2022-1-02.

Der volle Inhalt der Quelle
Annotation:
The issue of exploiting the software vulnerabilities is considered in the article. Particular attention has been paid to the two aspects of the practical usage of exploits, as an attack tool and as a means of testing protected information systems. It is stressed that integrating exploits into a single exploit-kit, increases the efficiency of searching for existing vulnerabilities of the modern information systems. The scheme of the exploit kit operation in the target information system is presented. Analysis of the known incidents related to the use of exploits, al-lows us to assert the existe
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Narayana Rao, T. Venkat, and Vemula Shravan. "Metasploit Unleashed Tool for Penetration Testing." International Journal on Recent and Innovation Trends in Computing and Communication 7, no. 4 (2019): 16–20. http://dx.doi.org/10.17762/ijritcc.v7i4.5285.

Der volle Inhalt der Quelle
Annotation:
In the recent era as the technology is growing rapidly, the use of internet has grown at an exponential rate. The growth has started increasing in between the years 1995-2000.The success of internet has brought great change to the world as we know; however, the problems are common as an obstacle to every productive growth. As the thousands of sites are launching daily and lakhs of people using it ,with limited sources of internet available to monitor the security and credibility of these sites. The security issues are growing rapidly and the existence of vulnerabilities are inevitable. As a re
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Laipaka, Robertus, and Theresia Widji Astuti. "Exploit Windows XP Menggunakan Parrot OS." Jurnal Pengabdian ILUNG (Inovasi Lahan Basah Unggul) 4, no. 3 (2025): 159. https://doi.org/10.20527/ilung.v4i3.14741.

Der volle Inhalt der Quelle
Annotation:
This research discusses the exploitation process of the Windows XP operating system using Parrot OS by leveraging the MS17-010 vulnerability found in the SMBv1 protocol. This vulnerability has become a serious concern as it can be exploited to gain full access to the target system through remote attacks. The exploitation involves systematic steps, including network scanning to identify connected devices, analysis of open ports and services, and configuring the exploitation using the Metasploit Framework. Once the exploitation succeeds, the selected payload will be executed, enabling full contr
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

K Royce Richi Daniel and Dr. Lipsa Nayak. "Wireless Network Penetration Testing." International Journal of Latest Technology in Engineering Management & Applied Science 14, no. 4 (2025): 543–46. https://doi.org/10.51583/ijltemas.2025.140400056.

Der volle Inhalt der Quelle
Annotation:
Abstract: Wireless networks are a fundamental part of modern communication, offering convenience and flexibility. However, they also present unique security challenges due to their broadcast nature and vulnerability to unauthorized access. This project focuses on the process of wireless network penetration testing — a method used to evaluate the security posture of Wi-Fi networks through ethical hacking techniques. The objective of this project is to identify potential vulnerabilities in wireless networks and demonstrate how attackers might exploit these flaws. Techniques such as passive scann
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Gomathy, Dr CK, Dr V. Geetha, Mr P. V. Sri Ram, and Surya Prakash L N. "NOVEL STUDY ON ETHICAL HACKING AND VULNERABILITY TESTING." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 09 (2024): 1–6. http://dx.doi.org/10.55041/ijsrem37510.

Der volle Inhalt der Quelle
Annotation:
Ethical hacking and vulnerability testing represent critical components of modern cybersecurity strategies, aimed at proactively identifying and mitigating potential security threats within organizational systems and networks. Ethical hacking, also known as penetration testing, involves authorized attempts to exploit vulnerabilities in systems, applications, or networks, mirroring the tactics of malicious actors. This proactive approach allows organizations to uncover weaknesses before they are exploited by cybercriminals, thereby strengthening overall security posture. Vulnerability testing c
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

Mason, G. J. "CONTRAFREELOADING IN STARLINGS: TESTING THE INFORMATION HYPOTHESIS." Behaviour 136, no. 10-11 (1999): 1267–82. http://dx.doi.org/10.1163/156853999500712.

Der volle Inhalt der Quelle
Annotation:
AbstractContrafreeloading (CFL) behaviour, in which animals forage persistently in patches that require effort to exploit when patches containing ad lib. food are easily available, seems to contradict the predictions of optimal foraging theory. However, it has been proposed that contrafreeloaders are in fact exploiting a hidden resource, namely information about patches that may be useful in future foraging attempts. We performed two experiments on starlings Sturnus vulgaris to test this hypothesis by determining the circumstances in which CFL occurs and assessing whether any useful informatio
APA, Harvard, Vancouver, ISO und andere Zitierweisen
11

Nilesh, Bhingardeve, and Franklin Seeza. "A Comparison Study of Open Source Penetration Testing Tools." International Journal of Trend in Scientific Research and Development 2, no. 4 (2018): 2595–97. https://doi.org/10.31142/ijtsrd15662.

Der volle Inhalt der Quelle
Annotation:
Penetration testing also known as Pen Test is a series of activities which is performed by authorized simulated attack on computer system, network or web application to find vulnerabilities that an attacker could exploit. It helps confirm the efficiency and effectiveness of the various security measures that have been implemented. In the world of Open Source Software, even Penetration Testing is not untouched. The purpose of this pilot study was to compare various the open source penetration testing tools. Nilesh Bhingardeve | Seeza Franklin "A Comparison Study of Open Source Penetration
APA, Harvard, Vancouver, ISO und andere Zitierweisen
12

Bergström, Gunnar, Jonas Christoffersson, Kristin Schwanke, Robert Zweigerdt, and Carl-Fredrik Mandenius. "Stem cell derived in vivo-like human cardiac bodies in a microfluidic device for toxicity testing by beating frequency imaging." Lab on a Chip 15, no. 15 (2015): 3242–49. http://dx.doi.org/10.1039/c5lc00449g.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
13

LakshmiSupraja, K. "Sneaking into Mobile." International Journal for Research in Applied Science and Engineering Technology 9, no. VI (2021): 5107–17. http://dx.doi.org/10.22214/ijraset.2021.36042.

Der volle Inhalt der Quelle
Annotation:
As the numbers of android mobiles are increasing day by day and are used to store sensitive information. So, maintaining security is becoming a difficult thing. Here comes the role of penetration testing. The process of performing a penetration test is to verify that mobile devices are vulnerable to security risk or not. We will exploit the mobile devices by preparing and performing the penetration test using Metasploit. It is a framework for developing and executing exploit code against a remote target machine. The main goal is to provide an understanding of mobile device penetration testing
APA, Harvard, Vancouver, ISO und andere Zitierweisen
14

Mohamed Mohideen, Mohamed Azarudheen, Muhammad Shahroz Nadeem, James Hardy, et al. "Behind the Code: Identifying Zero-Day Exploits in WordPress." Future Internet 16, no. 7 (2024): 256. http://dx.doi.org/10.3390/fi16070256.

Der volle Inhalt der Quelle
Annotation:
The rising awareness of cybersecurity among governments and the public underscores the importance of effectively managing security incidents, especially zero-day attacks that exploit previously unknown software vulnerabilities. These zero-day attacks are particularly challenging because they exploit flaws that neither the public nor developers are aware of. In our study, we focused on dynamic application security testing (DAST) to investigate cross-site scripting (XSS) attacks. We closely examined 23 popular WordPress plugins, especially those requiring user or admin interactions, as these are
APA, Harvard, Vancouver, ISO und andere Zitierweisen
15

Barone, Guglielmo, Francesco D'Acunto, and Gaia Narciso. "Telecracy: Testing for Channels of Persuasion." American Economic Journal: Economic Policy 7, no. 2 (2015): 30–60. http://dx.doi.org/10.1257/pol.20130318.

Der volle Inhalt der Quelle
Annotation:
We consider the long-lived slant towards Berlusconi in political information on Italian television (TV ). We exploit a shock to the slanted exposure of viewers: idiosyncratic deadlines to switch to digital TV from 2008 to 2012, which increased the number of freeview channels tenfold. The switch caused a drop in the vote share of Berlusconi's coalition by between 5.5 and 7.5 percentage points. The effect was stronger in towns with older and less educated voters. At least 20 percent of digital users changed their voting behavior after the introduction of digital TV. Our evidence is consistent wi
APA, Harvard, Vancouver, ISO und andere Zitierweisen
16

Booij, Tijmen H., Chiara M. Cattaneo, and Christian K. Hirt. "Tumor Organoids as a Research Tool: How to Exploit Them." Cells 11, no. 21 (2022): 3440. http://dx.doi.org/10.3390/cells11213440.

Der volle Inhalt der Quelle
Annotation:
Organoid models allow for the study of key pathophysiological processes such as cancer biology in vitro. They offer insights into all aspects covering tumor development, progression and response to the treatment of tissue obtained from individual patients. Tumor organoids are therefore not only a better tumor model than classical monolayer cell cultures but can be used as personalized avatars for translational studies. In this review, we discuss recent developments in using organoid models for cancer research and what kinds of advanced models, testing procedures and readouts can be considered.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
17

SLOAN, JOHN C., and TAGHI M. KHOSHGOFTAAR. "TESTING AND FORMAL VERIFICATION OF SERVICE ORIENTED ARCHITECTURES." International Journal of Reliability, Quality and Safety Engineering 16, no. 02 (2009): 137–62. http://dx.doi.org/10.1142/s0218539309003332.

Der volle Inhalt der Quelle
Annotation:
We examine two open engineering problems in the area of testing and formal verification of internet-enabled service oriented architectures (SOA). The first involves deciding when to formally and exhaustively verify versus when to informally and non-exhaustively test. The second concerns scalability limitations associated with formal verification, to which we propose a semi-formal technique that uses software agents. Finally, we assess how these findings can improve current software quality assurance practices. Addressing the first problem, we present and explain two classes of tradeoffs. Exter
APA, Harvard, Vancouver, ISO und andere Zitierweisen
18

Musa, Doris, and Ivan Markić. "Achieving Successful Software Penetration Testing." International Journal of Innovative Solutions in Engineering 1, no. 1 (2025): 1–9. https://doi.org/10.47960/3029-3200.2025.1.1.1.

Der volle Inhalt der Quelle
Annotation:
In today’s digital environment, where society faces cyber threats, security is a key component of any organization. Penetration testing is crucial in detecting and eliminating security weaknesses before real attackers can use them. In reality, software penetration testing mimics real-world attacks on software applications to detect vulnerabilities, i.e., security vulnerabilities that real attackers could exploit. The testing requires careful planning, precise performance, and a thorough analysis of the results. This paper deals with successful penetration testing, starting with the basic steps
APA, Harvard, Vancouver, ISO und andere Zitierweisen
19

Paráda, István, and András Tóth. "Possible Scenario for Malware Exploit Investigation with Data-Driven Architecture." Hadmérnök 17, no. 4 (2022): 153–74. http://dx.doi.org/10.32567/hm.2022.4.10.

Der volle Inhalt der Quelle
Annotation:
In this article, the authors present a data-driven architecture-based malware exploit analysis as the next part of the Penetration Testing article series. The analysis contributes greatly to investigating malicious attacks, which are becoming increasingly sophisticated in cyberspace, thus posing a significant threat to the information and communication networks of state and non-state actors. To achieve their research objectives, the authors use analytical evaluation methods to define the principles, modular elements and procedures of the data-driven architecture to be applied, where decisions
APA, Harvard, Vancouver, ISO und andere Zitierweisen
20

Thapaliya, Suman, and Saroj Dhital. "AI-Augmented Penetration Testing: A New Frontier in Ethical Hacking." International Journal of Atharva 3, no. 2 (2025): 28–37. https://doi.org/10.3126/ija.v3i2.80099.

Der volle Inhalt der Quelle
Annotation:
The accelerating sophistication of cyber threats has outpaced the capabilities of traditional, manual penetration testing approaches. This paper proposes an AI-augmented penetration testing framework that leverages machine learning and reinforcement learning to enhance the efficiency, scalability, and adaptability of ethical hacking efforts. We detail the integration of AI in key phases of the penetration testing lifecycle, including automated reconnaissance via NLP-based parsing of open-source intelligence, vulnerability prediction through supervised learning models trained on historical expl
APA, Harvard, Vancouver, ISO und andere Zitierweisen
21

Pedersen, Rasmus Søndergaard, and Anders Rahbek. "TESTING GARCH-X TYPE MODELS." Econometric Theory 35, no. 05 (2018): 1012–47. http://dx.doi.org/10.1017/s026646661800035x.

Der volle Inhalt der Quelle
Annotation:
We present novel theory for testing for reduction of GARCH-X type models with an exogenous (X) covariate to standard GARCH type models. To deal with the problems of potential nuisance parameters on the boundary of the parameter space as well as lack of identification under the null, we exploit a noticeable property of specific zero-entries in the inverse information of the GARCH-X type models. Specifically, we consider sequential testing based on two likelihood ratio tests and as demonstrated the structure of the inverse information implies that the proposed test neither depends on whether the
APA, Harvard, Vancouver, ISO und andere Zitierweisen
22

Robertson, John, Vivin Paliath, Jana Shakarian, Amanda Thart, and Paulo Shakarian. "Data Driven Game Theoretic Cyber Threat Mitigation." Proceedings of the AAAI Conference on Artificial Intelligence 30, no. 2 (2016): 4041–46. http://dx.doi.org/10.1609/aaai.v30i2.19082.

Der volle Inhalt der Quelle
Annotation:
Penetration testing is regarded as the gold-standard for understanding how well an organization can withstand sophisticated cyber-attacks. However, the recent prevalence of markets specializing in zero-day exploits on the darknet make exploits widely available to potential attackers. The cost associated with these sophisticated kits generally precludes penetration testers from simply obtaining such exploits – so an alternative approach is needed to understand what exploits an attacker will most likely purchase and how to defend against them. In this paper, we introduce a data-driven security g
APA, Harvard, Vancouver, ISO und andere Zitierweisen
23

Seong, Jin-Taek. "Group Testing-Based Robust Algorithm for Diagnosis of COVID-19." Diagnostics 10, no. 6 (2020): 396. http://dx.doi.org/10.3390/diagnostics10060396.

Der volle Inhalt der Quelle
Annotation:
At the time of writing, the COVID-19 infection is spreading rapidly. Currently, there is no vaccine or treatment, and researchers around the world are attempting to fight the infection. In this paper, we consider a diagnosis method for COVID-19, which is characterized by a very rapid rate of infection and is widespread. A possible method for avoiding severe infections is to stop the spread of the infection in advance by the prompt and accurate diagnosis of COVID-19. To this end, we exploit a group testing (GT) scheme, which is used to find a small set of confirmed cases out of a large populati
APA, Harvard, Vancouver, ISO und andere Zitierweisen
24

Arvind, Nain Sandeep B. Ukey Anuradha Bhat Sneha Chobitkar Govinda Rajle Mr. Bishwa Ghosh. "Exploitation of Different Network Services Using Metasploit Framework." International Journal of Research in Computer & Information Technology 7, no. 2 (2022): 1–7. https://doi.org/10.5281/zenodo.6675688.

Der volle Inhalt der Quelle
Annotation:
This paper gives an overview of the methodology of penetration testing and the tools used. This authorized attempt to evaluate the security of a network or an infrastructure by safely attempting to exploit the vulnerabilities helps in finding the loopholes in the network. These loopholes may allow an attacker to intrude and exploit the vulnerabilities. Penetration tests can have serious consequences for the network on which they are run. If it is being badly conducted it can cause congestion and systems crashing. In the worst-case scenario, it can result in exactly the thing it is intended to
APA, Harvard, Vancouver, ISO und andere Zitierweisen
25

Sebrina, Aida Fitriya, Achmad Junaidi, and Andreas Nugroho Sihananto. "Testing posketanmu website with google penetration testing and OWASP Top 10." Jurnal Mantik 8, no. 1 (2024): 636–45. http://dx.doi.org/10.35335/mantik.v8i1.5204.

Der volle Inhalt der Quelle
Annotation:
Data integrity has become vital in the quickly evolving digital era, pushing cybersecurity to a critical concern. Securing cybersecurity is crucial for systems such as the Posketanmu website in Mojokerto Regency, as it is responsible for safeguarding sensitive personal information. The objective of this research is to detect, evaluate, and exploit on any security weaknesses present on the Posketanmu website. The methodology combines the Google Penetration Testing strategy with the latest OWASP Top 10 2021 criteria. The penetration testing procedure comprises five distinct steps: Initially, the
APA, Harvard, Vancouver, ISO und andere Zitierweisen
26

Bernhofen, Daniel M., and John C. Brown. "Testing the General Validity of the Heckscher-Ohlin Theorem." American Economic Journal: Microeconomics 8, no. 4 (2016): 54–90. http://dx.doi.org/10.1257/mic.20130126.

Der volle Inhalt der Quelle
Annotation:
We exploit Japan's mid-nineteenth century transition from autarky to open trade to test Alan Deardorff's (1982) seminal and parsimonious autarky price formulation of the Heckscher-Ohlin theorem. Factor price data from Japan's late autarky period impose a refutable restriction on Japan's factor content of trade. Our data are constructed from many historical sources, including a major Japanese survey of agricultural techniques and a rich set of nineteenth century comparative cost studies. Evaluating Japan's factor content of trade during 1865–1876 under alternative theoretical assumptions about
APA, Harvard, Vancouver, ISO und andere Zitierweisen
27

Maitra, Arpita, Bibhas Adhikari, and Satyabrata Adhikari. "Proposal for dimensionality testing in QPQ." Quantum Information and Computation 18, no. 13&14 (2018): 1125–42. http://dx.doi.org/10.26421/qic18.13-14-4.

Der volle Inhalt der Quelle
Annotation:
Recently, dimensionality testing of a quantum state has received extensive attention (Ac{\'i}n et al. Phys. Rev. Letts. 2006, Scarani et al. Phys. Rev. Letts. 2006). Security proofs of existing quantum information processing protocols rely on the assumption about the dimension of quantum states in which logical bits are encoded. However, removing such assumption may cause security loophole. In the present paper, we show that this is indeed the case. We choose two players' quantum private query protocol by Yang et al. (Quant. Inf. Process. 2014) as an example and show how one player can gain an
APA, Harvard, Vancouver, ISO und andere Zitierweisen
28

Andria, Andria, and Ridho Pamungkas. "Penetration Testing Database Menggunakan Metode SQL Injection Via SQLMap di Termux." Indonesian Journal of Applied Informatics 5, no. 1 (2021): 1. http://dx.doi.org/10.20961/ijai.v5i1.40845.

Der volle Inhalt der Quelle
Annotation:
<p class="infAbstract"><em>Abstrak : </em></p><p class="infAbstract">Penetration testing (Pentesting) merupakan sebuah metode evaluasi terhadap keamanan pada suatu sistem dan jaringan komputer dengan melakukan suatu pengujian, salah satu metode pengujian yang dapat digunakan adalah SQL Injection. SQL Injection merupakan suatu teknik hacking dengan fokus pengujian pada database sebagai media penyimpanan data pada sistem. Tool yang digunakan pada penelitian ini ialah SQLMap yang merupakan tool open source yang dapat menganalisa, mendeteksi dan melakukan exploit (seb
APA, Harvard, Vancouver, ISO und andere Zitierweisen
29

Singh, Mandeep, Sunny Kumar, Tushant Garg, and Niranjan Pandey. "Penetration Testing on Metasploitable 2." International Journal of Engineering and Computer Science 9, no. 05 (2020): 25014–22. http://dx.doi.org/10.18535/ijecs/v9i05.4476.

Der volle Inhalt der Quelle
Annotation:
Abstract— In this paper, we will discuss how to perform a penetration test on Metasploitable 2 using Metasploit. Metasploitable 2 is a vulnerable system that we decide to use, as using some other system to do the same it would be considered as hacking and could have awful results. The primary purpose of this research is to tell about the various tools used when someone trying to find possible vulnerabilities in a system. By using the Metasploit system to test a system, we can find possible vulnerabilities that need to be fixed to protect and make the system better. Different areas like firewal
APA, Harvard, Vancouver, ISO und andere Zitierweisen
30

Karaki, Youmna Shawki, Halina Kaubasa, and Nick Ivanov. "Normality Testing for Vectors on Perceptron Layers." European Journal of Engineering Research and Science 5, no. 9 (2020): 1085–88. http://dx.doi.org/10.24018/ejers.2020.5.9.2090.

Der volle Inhalt der Quelle
Annotation:
Designing optimal topology of network graph is one of the most prevalent issues in neural network applications. Number of hidden layers, number of nodes in layers, activation functions, and other parameters of neural networks must suit the given data set and the prevailing problem. Massive learning datasets prompt a researcher to exploit probability methods in an attempt to find optimal structure of a neural network. Classic Bayesian estimation of network hyperparameters assumes distribution of specific random parameters to be Gaussian. Multivariate Normality Analysis methods are widespread in
APA, Harvard, Vancouver, ISO und andere Zitierweisen
31

Karaki, Youmna Shawki, Halina Kaubasa, and Nick Ivanov. "Normality Testing for Vectors on Perceptron Layers." European Journal of Engineering and Technology Research 5, no. 9 (2020): 1085–88. http://dx.doi.org/10.24018/ejeng.2020.5.9.2090.

Der volle Inhalt der Quelle
Annotation:
Designing optimal topology of network graph is one of the most prevalent issues in neural network applications. Number of hidden layers, number of nodes in layers, activation functions, and other parameters of neural networks must suit the given data set and the prevailing problem. Massive learning datasets prompt a researcher to exploit probability methods in an attempt to find optimal structure of a neural network. Classic Bayesian estimation of network hyperparameters assumes distribution of specific random parameters to be Gaussian. Multivariate Normality Analysis methods are widespread in
APA, Harvard, Vancouver, ISO und andere Zitierweisen
32

Færøy, Fartein Lemjan, Muhammad Mudassar Yamin, Ankur Shukla, and Basel Katt. "Automatic Verification and Execution of Cyber Attack on IoT Devices." Sensors 23, no. 2 (2023): 733. http://dx.doi.org/10.3390/s23020733.

Der volle Inhalt der Quelle
Annotation:
Internet of Things (IoT) devices are becoming a part of our daily life; from health monitors to critical infrastructure, they are used everywhere. This makes them ideal targets for malicious actors to exploit for nefarious purposes. Recent attacks like the Mirai botnet are just examples in which default credentials were used to exploit thousands of devices. This raises major concerns about IoT device security. In this work, we aimed to investigate security of IoT devices through performing automatic penetration test on IoT devices. A penetration test is a way of detecting security problems, bu
APA, Harvard, Vancouver, ISO und andere Zitierweisen
33

Chen, Jia-Wei, Rongfang Wang, Fan Ding, Bo Liu, Licheng Jiao, and Jie Zhang. "A Convolutional Neural Network with Parallel Multi-Scale Spatial Pooling to Detect Temporal Changes in SAR Images." Remote Sensing 12, no. 10 (2020): 1619. http://dx.doi.org/10.3390/rs12101619.

Der volle Inhalt der Quelle
Annotation:
In synthetic aperture radar (SAR) image change detection, it is quite challenging to exploit the changing information from the noisy difference image subject to the speckle. In this paper, we propose a multi-scale spatial pooling (MSSP) network to exploit the changed information from the noisy difference image. Being different from the traditional convolutional network with only mono-scale pooling kernels, in the proposed method, multi-scale pooling kernels are equipped in a convolutional network to exploit the spatial context information on changed regions from the difference image. Furthermo
APA, Harvard, Vancouver, ISO und andere Zitierweisen
34

Zaveri, Ayesha Anees, Ramsha Mashood, Nabiha Faisal, et al. "MobiTest – A Software for Mobile-Based Testing." Journal of Informatics and Web Engineering 3, no. 3 (2024): 1–20. http://dx.doi.org/10.33093/jiwe.2024.3.3.1.

Der volle Inhalt der Quelle
Annotation:
MobiTest is an application that serves as a valuable tool in the fast-growing field of software testing. Efficiency is crucial in this industry, where testers, quality assurance teams, and others must meticulously test each application, avoiding the need to repeat the entire cycle to identify bugs. This application is a breeze thanks to its intuitive features and educational content. Thanks to continuous integration, testers can easily keep up with the fast-paced development cycle and start automating tasks as soon as the user interface development is completed. This saves valuable time and en
APA, Harvard, Vancouver, ISO und andere Zitierweisen
35

Luo, Feng, Xuan Zhang, Zhenyu Yang, et al. "Cybersecurity Testing for Automotive Domain: A Survey." Sensors 22, no. 23 (2022): 9211. http://dx.doi.org/10.3390/s22239211.

Der volle Inhalt der Quelle
Annotation:
Modern vehicles are more complex and interconnected than ever before, which also means that attack surfaces for vehicles have increased significantly. Malicious cyberattacks will not only exploit personal privacy and property, but also affect the functional safety of electrical/electronic (E/E) safety-critical systems by controlling the driving functionality, which is life-threatening. Therefore, it is necessary to conduct cybersecurity testing on vehicles to reveal and address relevant security threats and vulnerabilities. Cybersecurity standards and regulations issued in recent years, such a
APA, Harvard, Vancouver, ISO und andere Zitierweisen
36

Tasi’u, Jamila, Jude Umole, and Farida Abdulrashid Ashiru. "DESIGN, CONSTRUCTION AND TESTING OF CELLPHONE DETECTOR." International Journal of Science for Global Sustainability 9, no. 4 (2023): 47–52. http://dx.doi.org/10.57233/ijsgs.v9i4.551.

Der volle Inhalt der Quelle
Annotation:
A cell phone detector is a device specifically designed to detect and locate the presence of a cell phone in a specific area. Cell phone detection has been studied for a long time. Techniques have been developed or proposed on how to detect cell phones. Most of them are trying to exploit features such as audio systems, RF systems, and common materials in phones and study how these can be used as the basis for cell phone detection. This study uses the cell phone's RF system as a function to detect the presence of a cell phone. Using relatively inexpensive and available electronic components, a
APA, Harvard, Vancouver, ISO und andere Zitierweisen
37

Devlin, Michael-John, and Rowan Miller. "Genomic testing in high-grade serous ovarian cancer: current options and future development." International Journal of Gynecologic Cancer 33, no. 3 (2023): 358–63. http://dx.doi.org/10.1136/ijgc-2022-003702.

Der volle Inhalt der Quelle
Annotation:
Understanding the genomic complexity of high-grade serous ovarian cancer is now essential in guiding patient management, particularly in the first-line setting. Our knowledge in this area has expanded rapidly in recent years, with biomarkers developing in parallel to agents designed to exploit cancer-associated genetic aberrations. In this review we will take stock of the current landscape of genetic testing and look towards the future with developments that aim to refine personalized treatment paradigms and track treatment resistance in real time.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
38

Lohano, Heman D., Fateh M. Mari, and Rajab A. Memon. "Testing Onion Market Integration in Pakistan." Pakistan Development Review 44, no. 4II (2005): 717–28. http://dx.doi.org/10.30541/v44i4iipp.717-728.

Der volle Inhalt der Quelle
Annotation:
Spatial market integration of agricultural products has been widely used to indicate overall market performance [Faminow and Benson (1990)]. In spatially integrated markets, competition among arbitragers will ensure that a unique equilibrium is achieved where local prices in regional markets differ by no more than transportation and transaction costs. Information of spatial market integration, thus, provides indication of competitiveness, the effectiveness of arbitrage, and the efficiency of pricing [Sexton, et al. (1991)]. If price changes in one market are fully reflected in alternative mark
APA, Harvard, Vancouver, ISO und andere Zitierweisen
39

Wang, Changqian, Shangshang Yang, Siyu Song, et al. "Explicit and Implicit Examinee-Question Relation Exploiting for Efficient Computerized Adaptive Testing." Proceedings of the AAAI Conference on Artificial Intelligence 39, no. 12 (2025): 12685–93. https://doi.org/10.1609/aaai.v39i12.33383.

Der volle Inhalt der Quelle
Annotation:
Computerized adaptive testing(CAT) is a crucial task in computer-aided education, which aims to adaptively select suitable question to diagnose examinees' ability status. Existing CAT approaches enhance selection performance by exploring examinee-question(E-Q) relation. These approaches either exclusively utilize explicit E-Q relation. For instance, policy-based approaches determine question selection based on predefined criteria. While effective in adapting to changes in question banks, these methods often entail significant computational costs in searching for suitable questions. Conversely,
APA, Harvard, Vancouver, ISO und andere Zitierweisen
40

Awdeh, Ali. "Monetary Policy and Economic Growth in Lebanon." Journal of Central Banking Theory and Practice 8, no. 2 (2019): 147–71. http://dx.doi.org/10.2478/jcbtp-2019-0018.

Der volle Inhalt der Quelle
Annotation:
Abstract The central bank of Lebanon adopted exchange rate targeting in 1994 and it has exploited several instruments (particularly interest rate) since then to stimulate foreign financial inflows. This study aims at testing the impact of this strategy on economic performance and welfare in both the short- and long-run. In this regard, we exploit monthly data covering the period January 2002-June 2017 and implement cointegration analysis and VEC model. The empirical results suggest that monetary tools exploited by the central bank of Lebanon depress economic growth in the long-run. Moreover, d
APA, Harvard, Vancouver, ISO und andere Zitierweisen
41

Kuswara, Rio, and Fahmi Facrhi. "ANALISIS KEAMANAN WEBSITE DI SMK WONGSOREJO GOMBONG TERHADAP SERANGAN CROSS-SITE SCRIPTING (XSS) MENGGUNAKAN PENETRATION TESTING." JATI (Jurnal Mahasiswa Teknik Informatika) 9, no. 2 (2025): 2700–2707. https://doi.org/10.36040/jati.v9i2.13158.

Der volle Inhalt der Quelle
Annotation:
Penelitian ini menganalisis keamanan website SMK Wongsorejo Gombong terhadap serangan Cross-Site Scripting (XSS) menggunakan metode Penetration Testing, yang mencakup tahapan Information Gathering, Vulnerability Assessment, Exploit, dan Reporting. Meskipun era digital memudahkan akses informasi, hal ini juga membawa tantangan baru, terutama terkait ancaman terhadap keamanan data dan privasi pengguna. Website SMK Wongsorejo Gombong, yang hingga kini belum pernah menjalani analisis keamanan, sehingga berpotensi menjadi target serangan siber. Hasil penelitian menampilkan bahwa terdapat empat kele
APA, Harvard, Vancouver, ISO und andere Zitierweisen
42

Siva Prasad, K., Dr K. Raja Sekhar, and Dr P. Rajarajeswari. "An Integrated Approach Towards Vulnerability Assessment & Penetration Testing for a Web Application." International Journal of Engineering & Technology 7, no. 2.32 (2018): 431. http://dx.doi.org/10.14419/ijet.v7i2.32.15733.

Der volle Inhalt der Quelle
Annotation:
Current digitized world has surpassed the days of mere existence of internet. Furnishing the services through web has become the most often element to be implemented by almost every sector. These ever-changing technologies has also brought about, devastating evading techniques compromising the fragility of the web application. Assessing the existing vulnerabilities of a web application and testing all possible penetrations would be tedious if the tools used are bearing a cost factor. This paper suggests an integrated approach of assessing the vulnerabilities in any web application using free a
APA, Harvard, Vancouver, ISO und andere Zitierweisen
43

Hilbig, Benjamin E., Pascal J. Kieslich, Felix Henninger, Isabel Thielmann, and Ingo Zettler. "Lead Us (Not) into Temptation: Testing the Motivational Mechanisms Linking Honesty–Humility to Cooperation." European Journal of Personality 32, no. 2 (2018): 116–27. http://dx.doi.org/10.1002/per.2149.

Der volle Inhalt der Quelle
Annotation:
Over the past decades, there has been considerable interest in individual differences in cooperative behaviour and how these can be explained. Whereas the Honesty–Humility dimension from the HEXACO model of personality has been identified as a consistent predictor of cooperation, the underlying motivational mechanisms of this association have remained unclear—especially given the confound between the temptation to exploit others and the fear of being exploited as motivational drivers of defection in social dilemmas. In a reanalysis and a new experiment, we tease apart these mechanisms by manip
APA, Harvard, Vancouver, ISO und andere Zitierweisen
44

Tesárek, Pavel, Lukáš Novák, Jaroslav Topič, Zdeněk Prošek, Václav Nežerka, and Martin Lidmila. "Compression Testing of Gypsum-Based Composite Reinforced by Recycled Wires from Automobile Tires." Applied Mechanics and Materials 732 (February 2015): 393–96. http://dx.doi.org/10.4028/www.scientific.net/amm.732.393.

Der volle Inhalt der Quelle
Annotation:
The use of recycled materials is nowadays greatly promoted and these are exploited in many industries, including construction and civil engineering. It is advantageous and efficient to exploit mainly those materials that cannot find their use in any other application. The steel wires from old automobile tires are a perfect example – they can be used as a dispersed reinforcement to stabilize subsoil in railway construction. In order to test the structural performance of the recycled wires as well as the composite behavior, gypsum was chosen a model matrix material. Such approach resulted in a r
APA, Harvard, Vancouver, ISO und andere Zitierweisen
45

Bin Khalid, Hasnan, and Budi Saesar Luhur. "Kinematic-Dynamic Modeling and Test Control of Tracked Drive Vehicle for Indoor Mapping." Applied Mechanics and Materials 148-149 (December 2011): 1510–13. http://dx.doi.org/10.4028/www.scientific.net/amm.148-149.1510.

Der volle Inhalt der Quelle
Annotation:
This paper presents one approach in designing and testing an unmanned ground vehicle (UGV) for indoor mapping. The approach makes use of computer real-time simulation and animation direct with the testing in real environment. Novel control architecture was proposed, by exploit the communication between two laptop installed Matlab/Simulink and telemetry data collected from it. The parameter values between real performance and model can be easily evaluated and also from its ladar scanning result, then researcher can explore more variation of modeling aspect, parameter and sensor-actuator configu
APA, Harvard, Vancouver, ISO und andere Zitierweisen
46

Peng, Xiang Hua, Ying She Luo, Jing Ye Zhou, Min Yu, and Tao Luo. "Research on Creep Constitutive Model of TC11 Titanium Alloy Based on RBFNN." Materials Science Forum 575-578 (April 2008): 1050–55. http://dx.doi.org/10.4028/www.scientific.net/msf.575-578.1050.

Der volle Inhalt der Quelle
Annotation:
The paper is aimed to exploit a creep constitutive mode of TC11 titanium alloy based on RBF neural network. Creep testing data of TC11 titanium alloy obtained under the same temperature and different stress are considered as knowledge base and the characteristics of rheological forming of materials and radial basis function neural network (RBFNN) are also combined when exploiting the model. A part of data extracted from knowledge base is divided into two groups: one is learning sample and the other testing sample, which are being performed training, learning and simulating. Then predicting val
APA, Harvard, Vancouver, ISO und andere Zitierweisen
47

Lucchesi, David, Luciano Anselmo, Massimo Bassan, et al. "Testing General Relativity vs. Alternative Theories of Gravitation with the SaToR-G Experiment." Physical Sciences Forum 2, no. 1 (2021): 52. http://dx.doi.org/10.3390/ecu2021-09274.

Der volle Inhalt der Quelle
Annotation:
A new experiment in the field of gravitation, SaToR-G, is presented. The experiment aims to compare the predictions of different theories of gravitation in the limit of weak field and slow motion. The ultimate goal of the experiment is to look for possible "new physics" beyond the current standard model of gravitation based on the predictions of general relativity. A key role in the above perspective is the theoretical and experimental framework within which to confine our work. To this end, we make our best efforts to exploit the framework suggested by Dicke over 50 years ago.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
48

GUO, PENGFEI, and ALWELL JULIUS OYET. "ON WAVELET METHODS FOR TESTING EQUALITY OF MEAN RESPONSE CURVES." International Journal of Wavelets, Multiresolution and Information Processing 07, no. 03 (2009): 357–73. http://dx.doi.org/10.1142/s0219691309002969.

Der volle Inhalt der Quelle
Annotation:
In this article, we exploit the adaptive properties of wavelets to develop some procedures for testing the equality of nonlinear and nonparametric mean response curves which are assumed by an experimenter to be the underlying functions generating several groups of data with possibly hetereoscedastic errors. The essential feature of the techniques is the transformation of the problem from the domain of the input variable to the wavelet domain through an orthogonal discrete wavelet transformation or a multiresolution expansion. We shall see that this greatly simplifies the testing problem into e
APA, Harvard, Vancouver, ISO und andere Zitierweisen
49

D'Ambrosio, Fabio, Francesco Gozzini, Lavinia Heisenberg, Henri Inchauspé, David Maibach, and Jann Zosso. "Testing gravitational waveforms in full General Relativity." Journal of Cosmology and Astroparticle Physics 2025, no. 02 (2025): 060. https://doi.org/10.1088/1475-7516/2025/02/060.

Der volle Inhalt der Quelle
Annotation:
Abstract We perform a comprehensive analysis of state-of-the-art waveform models, focusing on their predictions concerning kick velocity and inferred gravitational wave memory. Recent advancements in gravitational wave instrumentation have established new benchmarks for the precision of future measurements. To fully exploit the potential of upcoming gravitational wave surveys, it is crucial to concurrently enhance both semi-analytical and numerical waveform models used for analyzing interferometer data. In this work, we establish a pathway towards achieving this goal by developing and implemen
APA, Harvard, Vancouver, ISO und andere Zitierweisen
50

Tabitha Fransisca Romauli Nababan and Shevanna Putri Cantiqa. "Mengoptimalkan Implementasi UU No. 27 Tahun 2022 Dengan Penetration Test Dan Vulnerability Assessment Pada Kasus Pembobolan Data Aplikasi Dana." JURNAL HUKUM, POLITIK DAN ILMU SOSIAL 3, no. 3 (2024): 155–61. http://dx.doi.org/10.55606/jhpis.v3i3.3900.

Der volle Inhalt der Quelle
Annotation:
Data security in digital financial applications such as mobile banking, e-wallets, and online payment services is very important. However, there are many security risks lurking. Irresponsible parties can exploit security gaps to steal personal information. The ITE Law regulates the limitations, obligations, and responsibilities of parties involved in electronic systems, including service providers, data managers, and users as well as sanctions for cybercriminals. One of the main weaknesses in a financial application is the lack of strict and consistent security standards. Due to the many acts
APA, Harvard, Vancouver, ISO und andere Zitierweisen
Wir bieten Rabatte auf alle Premium-Pläne für Autoren, deren Werke in thematische Literatursammlungen aufgenommen wurden. Kontaktieren Sie uns, um einen einzigartigen Promo-Code zu erhalten!