Zeitschriftenartikel zum Thema „Exploit testing“
Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an
Machen Sie sich mit Top-50 Zeitschriftenartikel für die Forschung zum Thema "Exploit testing" bekannt.
Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.
Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.
Sehen Sie die Zeitschriftenartikel für verschiedene Spezialgebieten durch und erstellen Sie Ihre Bibliographie auf korrekte Weise.
Boyanov, Petar. "VULNERABILITY PENETRATION TESTING THE COMPUTER AND NETWORK RESOURCES OF WINDOWS BASED OPERATING SYSTEMS." Journal scientific and applied research 5, no. 1 (2014): 85–92. http://dx.doi.org/10.46687/jsar.v5i1.113.
Der volle Inhalt der QuelleWang, Yu, Yipeng Zhang, and Zhoujun Li. "AAHEG: Automatic Advanced Heap Exploit Generation Based on Abstract Syntax Tree." Symmetry 15, no. 12 (2023): 2197. http://dx.doi.org/10.3390/sym15122197.
Der volle Inhalt der QuelleDeng, Fenglei, Jian Wang, Bin Zhang, Chao Feng, Zhiyuan Jiang, and Yunfei Su. "A Pattern-Based Software Testing Framework for Exploitability Evaluation of Metadata Corruption Vulnerabilities." Scientific Programming 2020 (September 27, 2020): 1–21. http://dx.doi.org/10.1155/2020/8883746.
Der volle Inhalt der QuelleGomathy, Dr C. K., Dr V. Geetha, Mr D. Sri Datta Vallabh, and Mr Y. Yagn Sai Praneesh Reddy. "Ethical Hacking and Vulnerability Testing: Navigating Legal and Moral Boundaries." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 09 (2024): 1–5. http://dx.doi.org/10.55041/ijsrem37503.
Der volle Inhalt der QuelleBogdanova, Elizaveta, Larysa Pavlova, and Karina Pohorila. "A concise overview of the specific features of using exployts." Computer Science and Cybersecurity, no. 1 (November 11, 2022): 16–20. http://dx.doi.org/10.26565/2519-2310-2022-1-02.
Der volle Inhalt der QuelleNarayana Rao, T. Venkat, and Vemula Shravan. "Metasploit Unleashed Tool for Penetration Testing." International Journal on Recent and Innovation Trends in Computing and Communication 7, no. 4 (2019): 16–20. http://dx.doi.org/10.17762/ijritcc.v7i4.5285.
Der volle Inhalt der QuelleLaipaka, Robertus, and Theresia Widji Astuti. "Exploit Windows XP Menggunakan Parrot OS." Jurnal Pengabdian ILUNG (Inovasi Lahan Basah Unggul) 4, no. 3 (2025): 159. https://doi.org/10.20527/ilung.v4i3.14741.
Der volle Inhalt der QuelleK Royce Richi Daniel and Dr. Lipsa Nayak. "Wireless Network Penetration Testing." International Journal of Latest Technology in Engineering Management & Applied Science 14, no. 4 (2025): 543–46. https://doi.org/10.51583/ijltemas.2025.140400056.
Der volle Inhalt der QuelleGomathy, Dr CK, Dr V. Geetha, Mr P. V. Sri Ram, and Surya Prakash L N. "NOVEL STUDY ON ETHICAL HACKING AND VULNERABILITY TESTING." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 09 (2024): 1–6. http://dx.doi.org/10.55041/ijsrem37510.
Der volle Inhalt der QuelleMason, G. J. "CONTRAFREELOADING IN STARLINGS: TESTING THE INFORMATION HYPOTHESIS." Behaviour 136, no. 10-11 (1999): 1267–82. http://dx.doi.org/10.1163/156853999500712.
Der volle Inhalt der QuelleNilesh, Bhingardeve, and Franklin Seeza. "A Comparison Study of Open Source Penetration Testing Tools." International Journal of Trend in Scientific Research and Development 2, no. 4 (2018): 2595–97. https://doi.org/10.31142/ijtsrd15662.
Der volle Inhalt der QuelleBergström, Gunnar, Jonas Christoffersson, Kristin Schwanke, Robert Zweigerdt, and Carl-Fredrik Mandenius. "Stem cell derived in vivo-like human cardiac bodies in a microfluidic device for toxicity testing by beating frequency imaging." Lab on a Chip 15, no. 15 (2015): 3242–49. http://dx.doi.org/10.1039/c5lc00449g.
Der volle Inhalt der QuelleLakshmiSupraja, K. "Sneaking into Mobile." International Journal for Research in Applied Science and Engineering Technology 9, no. VI (2021): 5107–17. http://dx.doi.org/10.22214/ijraset.2021.36042.
Der volle Inhalt der QuelleMohamed Mohideen, Mohamed Azarudheen, Muhammad Shahroz Nadeem, James Hardy, et al. "Behind the Code: Identifying Zero-Day Exploits in WordPress." Future Internet 16, no. 7 (2024): 256. http://dx.doi.org/10.3390/fi16070256.
Der volle Inhalt der QuelleBarone, Guglielmo, Francesco D'Acunto, and Gaia Narciso. "Telecracy: Testing for Channels of Persuasion." American Economic Journal: Economic Policy 7, no. 2 (2015): 30–60. http://dx.doi.org/10.1257/pol.20130318.
Der volle Inhalt der QuelleBooij, Tijmen H., Chiara M. Cattaneo, and Christian K. Hirt. "Tumor Organoids as a Research Tool: How to Exploit Them." Cells 11, no. 21 (2022): 3440. http://dx.doi.org/10.3390/cells11213440.
Der volle Inhalt der QuelleSLOAN, JOHN C., and TAGHI M. KHOSHGOFTAAR. "TESTING AND FORMAL VERIFICATION OF SERVICE ORIENTED ARCHITECTURES." International Journal of Reliability, Quality and Safety Engineering 16, no. 02 (2009): 137–62. http://dx.doi.org/10.1142/s0218539309003332.
Der volle Inhalt der QuelleMusa, Doris, and Ivan Markić. "Achieving Successful Software Penetration Testing." International Journal of Innovative Solutions in Engineering 1, no. 1 (2025): 1–9. https://doi.org/10.47960/3029-3200.2025.1.1.1.
Der volle Inhalt der QuelleParáda, István, and András Tóth. "Possible Scenario for Malware Exploit Investigation with Data-Driven Architecture." Hadmérnök 17, no. 4 (2022): 153–74. http://dx.doi.org/10.32567/hm.2022.4.10.
Der volle Inhalt der QuelleThapaliya, Suman, and Saroj Dhital. "AI-Augmented Penetration Testing: A New Frontier in Ethical Hacking." International Journal of Atharva 3, no. 2 (2025): 28–37. https://doi.org/10.3126/ija.v3i2.80099.
Der volle Inhalt der QuellePedersen, Rasmus Søndergaard, and Anders Rahbek. "TESTING GARCH-X TYPE MODELS." Econometric Theory 35, no. 05 (2018): 1012–47. http://dx.doi.org/10.1017/s026646661800035x.
Der volle Inhalt der QuelleRobertson, John, Vivin Paliath, Jana Shakarian, Amanda Thart, and Paulo Shakarian. "Data Driven Game Theoretic Cyber Threat Mitigation." Proceedings of the AAAI Conference on Artificial Intelligence 30, no. 2 (2016): 4041–46. http://dx.doi.org/10.1609/aaai.v30i2.19082.
Der volle Inhalt der QuelleSeong, Jin-Taek. "Group Testing-Based Robust Algorithm for Diagnosis of COVID-19." Diagnostics 10, no. 6 (2020): 396. http://dx.doi.org/10.3390/diagnostics10060396.
Der volle Inhalt der QuelleArvind, Nain Sandeep B. Ukey Anuradha Bhat Sneha Chobitkar Govinda Rajle Mr. Bishwa Ghosh. "Exploitation of Different Network Services Using Metasploit Framework." International Journal of Research in Computer & Information Technology 7, no. 2 (2022): 1–7. https://doi.org/10.5281/zenodo.6675688.
Der volle Inhalt der QuelleSebrina, Aida Fitriya, Achmad Junaidi, and Andreas Nugroho Sihananto. "Testing posketanmu website with google penetration testing and OWASP Top 10." Jurnal Mantik 8, no. 1 (2024): 636–45. http://dx.doi.org/10.35335/mantik.v8i1.5204.
Der volle Inhalt der QuelleBernhofen, Daniel M., and John C. Brown. "Testing the General Validity of the Heckscher-Ohlin Theorem." American Economic Journal: Microeconomics 8, no. 4 (2016): 54–90. http://dx.doi.org/10.1257/mic.20130126.
Der volle Inhalt der QuelleMaitra, Arpita, Bibhas Adhikari, and Satyabrata Adhikari. "Proposal for dimensionality testing in QPQ." Quantum Information and Computation 18, no. 13&14 (2018): 1125–42. http://dx.doi.org/10.26421/qic18.13-14-4.
Der volle Inhalt der QuelleAndria, Andria, and Ridho Pamungkas. "Penetration Testing Database Menggunakan Metode SQL Injection Via SQLMap di Termux." Indonesian Journal of Applied Informatics 5, no. 1 (2021): 1. http://dx.doi.org/10.20961/ijai.v5i1.40845.
Der volle Inhalt der QuelleSingh, Mandeep, Sunny Kumar, Tushant Garg, and Niranjan Pandey. "Penetration Testing on Metasploitable 2." International Journal of Engineering and Computer Science 9, no. 05 (2020): 25014–22. http://dx.doi.org/10.18535/ijecs/v9i05.4476.
Der volle Inhalt der QuelleKaraki, Youmna Shawki, Halina Kaubasa, and Nick Ivanov. "Normality Testing for Vectors on Perceptron Layers." European Journal of Engineering Research and Science 5, no. 9 (2020): 1085–88. http://dx.doi.org/10.24018/ejers.2020.5.9.2090.
Der volle Inhalt der QuelleKaraki, Youmna Shawki, Halina Kaubasa, and Nick Ivanov. "Normality Testing for Vectors on Perceptron Layers." European Journal of Engineering and Technology Research 5, no. 9 (2020): 1085–88. http://dx.doi.org/10.24018/ejeng.2020.5.9.2090.
Der volle Inhalt der QuelleFærøy, Fartein Lemjan, Muhammad Mudassar Yamin, Ankur Shukla, and Basel Katt. "Automatic Verification and Execution of Cyber Attack on IoT Devices." Sensors 23, no. 2 (2023): 733. http://dx.doi.org/10.3390/s23020733.
Der volle Inhalt der QuelleChen, Jia-Wei, Rongfang Wang, Fan Ding, Bo Liu, Licheng Jiao, and Jie Zhang. "A Convolutional Neural Network with Parallel Multi-Scale Spatial Pooling to Detect Temporal Changes in SAR Images." Remote Sensing 12, no. 10 (2020): 1619. http://dx.doi.org/10.3390/rs12101619.
Der volle Inhalt der QuelleZaveri, Ayesha Anees, Ramsha Mashood, Nabiha Faisal, et al. "MobiTest – A Software for Mobile-Based Testing." Journal of Informatics and Web Engineering 3, no. 3 (2024): 1–20. http://dx.doi.org/10.33093/jiwe.2024.3.3.1.
Der volle Inhalt der QuelleLuo, Feng, Xuan Zhang, Zhenyu Yang, et al. "Cybersecurity Testing for Automotive Domain: A Survey." Sensors 22, no. 23 (2022): 9211. http://dx.doi.org/10.3390/s22239211.
Der volle Inhalt der QuelleTasi’u, Jamila, Jude Umole, and Farida Abdulrashid Ashiru. "DESIGN, CONSTRUCTION AND TESTING OF CELLPHONE DETECTOR." International Journal of Science for Global Sustainability 9, no. 4 (2023): 47–52. http://dx.doi.org/10.57233/ijsgs.v9i4.551.
Der volle Inhalt der QuelleDevlin, Michael-John, and Rowan Miller. "Genomic testing in high-grade serous ovarian cancer: current options and future development." International Journal of Gynecologic Cancer 33, no. 3 (2023): 358–63. http://dx.doi.org/10.1136/ijgc-2022-003702.
Der volle Inhalt der QuelleLohano, Heman D., Fateh M. Mari, and Rajab A. Memon. "Testing Onion Market Integration in Pakistan." Pakistan Development Review 44, no. 4II (2005): 717–28. http://dx.doi.org/10.30541/v44i4iipp.717-728.
Der volle Inhalt der QuelleWang, Changqian, Shangshang Yang, Siyu Song, et al. "Explicit and Implicit Examinee-Question Relation Exploiting for Efficient Computerized Adaptive Testing." Proceedings of the AAAI Conference on Artificial Intelligence 39, no. 12 (2025): 12685–93. https://doi.org/10.1609/aaai.v39i12.33383.
Der volle Inhalt der QuelleAwdeh, Ali. "Monetary Policy and Economic Growth in Lebanon." Journal of Central Banking Theory and Practice 8, no. 2 (2019): 147–71. http://dx.doi.org/10.2478/jcbtp-2019-0018.
Der volle Inhalt der QuelleKuswara, Rio, and Fahmi Facrhi. "ANALISIS KEAMANAN WEBSITE DI SMK WONGSOREJO GOMBONG TERHADAP SERANGAN CROSS-SITE SCRIPTING (XSS) MENGGUNAKAN PENETRATION TESTING." JATI (Jurnal Mahasiswa Teknik Informatika) 9, no. 2 (2025): 2700–2707. https://doi.org/10.36040/jati.v9i2.13158.
Der volle Inhalt der QuelleSiva Prasad, K., Dr K. Raja Sekhar, and Dr P. Rajarajeswari. "An Integrated Approach Towards Vulnerability Assessment & Penetration Testing for a Web Application." International Journal of Engineering & Technology 7, no. 2.32 (2018): 431. http://dx.doi.org/10.14419/ijet.v7i2.32.15733.
Der volle Inhalt der QuelleHilbig, Benjamin E., Pascal J. Kieslich, Felix Henninger, Isabel Thielmann, and Ingo Zettler. "Lead Us (Not) into Temptation: Testing the Motivational Mechanisms Linking Honesty–Humility to Cooperation." European Journal of Personality 32, no. 2 (2018): 116–27. http://dx.doi.org/10.1002/per.2149.
Der volle Inhalt der QuelleTesárek, Pavel, Lukáš Novák, Jaroslav Topič, Zdeněk Prošek, Václav Nežerka, and Martin Lidmila. "Compression Testing of Gypsum-Based Composite Reinforced by Recycled Wires from Automobile Tires." Applied Mechanics and Materials 732 (February 2015): 393–96. http://dx.doi.org/10.4028/www.scientific.net/amm.732.393.
Der volle Inhalt der QuelleBin Khalid, Hasnan, and Budi Saesar Luhur. "Kinematic-Dynamic Modeling and Test Control of Tracked Drive Vehicle for Indoor Mapping." Applied Mechanics and Materials 148-149 (December 2011): 1510–13. http://dx.doi.org/10.4028/www.scientific.net/amm.148-149.1510.
Der volle Inhalt der QuellePeng, Xiang Hua, Ying She Luo, Jing Ye Zhou, Min Yu, and Tao Luo. "Research on Creep Constitutive Model of TC11 Titanium Alloy Based on RBFNN." Materials Science Forum 575-578 (April 2008): 1050–55. http://dx.doi.org/10.4028/www.scientific.net/msf.575-578.1050.
Der volle Inhalt der QuelleLucchesi, David, Luciano Anselmo, Massimo Bassan, et al. "Testing General Relativity vs. Alternative Theories of Gravitation with the SaToR-G Experiment." Physical Sciences Forum 2, no. 1 (2021): 52. http://dx.doi.org/10.3390/ecu2021-09274.
Der volle Inhalt der QuelleGUO, PENGFEI, and ALWELL JULIUS OYET. "ON WAVELET METHODS FOR TESTING EQUALITY OF MEAN RESPONSE CURVES." International Journal of Wavelets, Multiresolution and Information Processing 07, no. 03 (2009): 357–73. http://dx.doi.org/10.1142/s0219691309002969.
Der volle Inhalt der QuelleD'Ambrosio, Fabio, Francesco Gozzini, Lavinia Heisenberg, Henri Inchauspé, David Maibach, and Jann Zosso. "Testing gravitational waveforms in full General Relativity." Journal of Cosmology and Astroparticle Physics 2025, no. 02 (2025): 060. https://doi.org/10.1088/1475-7516/2025/02/060.
Der volle Inhalt der QuelleTabitha Fransisca Romauli Nababan and Shevanna Putri Cantiqa. "Mengoptimalkan Implementasi UU No. 27 Tahun 2022 Dengan Penetration Test Dan Vulnerability Assessment Pada Kasus Pembobolan Data Aplikasi Dana." JURNAL HUKUM, POLITIK DAN ILMU SOSIAL 3, no. 3 (2024): 155–61. http://dx.doi.org/10.55606/jhpis.v3i3.3900.
Der volle Inhalt der Quelle