Academic literature on the topic 'Exploit testing'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Exploit testing.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Exploit testing"

1

Boyanov, Petar. "VULNERABILITY PENETRATION TESTING THE COMPUTER AND NETWORK RESOURCES OF WINDOWS BASED OPERATING SYSTEMS." Journal scientific and applied research 5, no. 1 (2014): 85–92. http://dx.doi.org/10.46687/jsar.v5i1.113.

Full text
Abstract:
In this paper a vulnerability penetration testing for several hosts in WLAN is made. The exploited operating systems were Microsoft Windows 7Enterprise and Microsoft Windows 8. It has been used an exploit named “Java storeImageArray () Invalid Array Index-ing Vulnerability”. Thanks to the open source penetration testing platform - Metasploit Framework the exploit was executed on the target hosts. The most important and critical rea-son the attack being successfully executed is connected with the human factor and interven-tion. Thereby, some security professionals and network administrators can
APA, Harvard, Vancouver, ISO, and other styles
2

Wang, Yu, Yipeng Zhang, and Zhoujun Li. "AAHEG: Automatic Advanced Heap Exploit Generation Based on Abstract Syntax Tree." Symmetry 15, no. 12 (2023): 2197. http://dx.doi.org/10.3390/sym15122197.

Full text
Abstract:
Automatic Exploit Generation (AEG) involves automatically discovering paths in a program that trigger vulnerabilities, thereby generating exploits. While there is considerable research on heap-related vulnerability detection, such as detecting Heap Overflow and Use After Free (UAF) vulnerabilities, among contemporary heap-automated exploit techniques, only certain automated exploit techniques can hijack program control flow to the shellcode. An important limitation of this approach is that it cannot effectively bypass Linux’s protection mechanisms. To solve this problem, we introduced Automati
APA, Harvard, Vancouver, ISO, and other styles
3

Deng, Fenglei, Jian Wang, Bin Zhang, Chao Feng, Zhiyuan Jiang, and Yunfei Su. "A Pattern-Based Software Testing Framework for Exploitability Evaluation of Metadata Corruption Vulnerabilities." Scientific Programming 2020 (September 27, 2020): 1–21. http://dx.doi.org/10.1155/2020/8883746.

Full text
Abstract:
In recent years, increased attention is being given to software quality assurance and protection. With considerable verification and protection schemes proposed and deployed, today’s software unfortunately still fails to be protected from cyberattacks, especially in the presence of insecure organization of heap metadata. In this paper, we aim to explore whether heap metadata could be corrupted and exploited by cyberattackers, in an attempt to assess the exploitability of vulnerabilities and ensure software quality. To this end, we propose RELAY, a software testing framework to simulate human e
APA, Harvard, Vancouver, ISO, and other styles
4

Gomathy, Dr C. K., Dr V. Geetha, Mr D. Sri Datta Vallabh, and Mr Y. Yagn Sai Praneesh Reddy. "Ethical Hacking and Vulnerability Testing: Navigating Legal and Moral Boundaries." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 09 (2024): 1–5. http://dx.doi.org/10.55041/ijsrem37503.

Full text
Abstract:
In today's interconnected world, cybersecurity is of paramount importance, with organizations facing ever-evolving threats from malicious actors seeking to exploit vulnerabilities in their digital infrastructure. Ethical hacking and vulnerability testing have emerged as crucial tools in the fight against cyber threats, enabling organizations to proactively identify and address security weaknesses before they can be exploited by attackers. However, the practice of ethical hacking raises complex ethical and legal considerations, as practitioners navigate the delicate balance between security imp
APA, Harvard, Vancouver, ISO, and other styles
5

Bogdanova, Elizaveta, Larysa Pavlova, and Karina Pohorila. "A concise overview of the specific features of using exployts." Computer Science and Cybersecurity, no. 1 (November 11, 2022): 16–20. http://dx.doi.org/10.26565/2519-2310-2022-1-02.

Full text
Abstract:
The issue of exploiting the software vulnerabilities is considered in the article. Particular attention has been paid to the two aspects of the practical usage of exploits, as an attack tool and as a means of testing protected information systems. It is stressed that integrating exploits into a single exploit-kit, increases the efficiency of searching for existing vulnerabilities of the modern information systems. The scheme of the exploit kit operation in the target information system is presented. Analysis of the known incidents related to the use of exploits, al-lows us to assert the existe
APA, Harvard, Vancouver, ISO, and other styles
6

Narayana Rao, T. Venkat, and Vemula Shravan. "Metasploit Unleashed Tool for Penetration Testing." International Journal on Recent and Innovation Trends in Computing and Communication 7, no. 4 (2019): 16–20. http://dx.doi.org/10.17762/ijritcc.v7i4.5285.

Full text
Abstract:
In the recent era as the technology is growing rapidly, the use of internet has grown at an exponential rate. The growth has started increasing in between the years 1995-2000.The success of internet has brought great change to the world as we know; however, the problems are common as an obstacle to every productive growth. As the thousands of sites are launching daily and lakhs of people using it ,with limited sources of internet available to monitor the security and credibility of these sites. The security issues are growing rapidly and the existence of vulnerabilities are inevitable. As a re
APA, Harvard, Vancouver, ISO, and other styles
7

Laipaka, Robertus, and Theresia Widji Astuti. "Exploit Windows XP Menggunakan Parrot OS." Jurnal Pengabdian ILUNG (Inovasi Lahan Basah Unggul) 4, no. 3 (2025): 159. https://doi.org/10.20527/ilung.v4i3.14741.

Full text
Abstract:
This research discusses the exploitation process of the Windows XP operating system using Parrot OS by leveraging the MS17-010 vulnerability found in the SMBv1 protocol. This vulnerability has become a serious concern as it can be exploited to gain full access to the target system through remote attacks. The exploitation involves systematic steps, including network scanning to identify connected devices, analysis of open ports and services, and configuring the exploitation using the Metasploit Framework. Once the exploitation succeeds, the selected payload will be executed, enabling full contr
APA, Harvard, Vancouver, ISO, and other styles
8

K Royce Richi Daniel and Dr. Lipsa Nayak. "Wireless Network Penetration Testing." International Journal of Latest Technology in Engineering Management & Applied Science 14, no. 4 (2025): 543–46. https://doi.org/10.51583/ijltemas.2025.140400056.

Full text
Abstract:
Abstract: Wireless networks are a fundamental part of modern communication, offering convenience and flexibility. However, they also present unique security challenges due to their broadcast nature and vulnerability to unauthorized access. This project focuses on the process of wireless network penetration testing — a method used to evaluate the security posture of Wi-Fi networks through ethical hacking techniques. The objective of this project is to identify potential vulnerabilities in wireless networks and demonstrate how attackers might exploit these flaws. Techniques such as passive scann
APA, Harvard, Vancouver, ISO, and other styles
9

Gomathy, Dr CK, Dr V. Geetha, Mr P. V. Sri Ram, and Surya Prakash L N. "NOVEL STUDY ON ETHICAL HACKING AND VULNERABILITY TESTING." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 09 (2024): 1–6. http://dx.doi.org/10.55041/ijsrem37510.

Full text
Abstract:
Ethical hacking and vulnerability testing represent critical components of modern cybersecurity strategies, aimed at proactively identifying and mitigating potential security threats within organizational systems and networks. Ethical hacking, also known as penetration testing, involves authorized attempts to exploit vulnerabilities in systems, applications, or networks, mirroring the tactics of malicious actors. This proactive approach allows organizations to uncover weaknesses before they are exploited by cybercriminals, thereby strengthening overall security posture. Vulnerability testing c
APA, Harvard, Vancouver, ISO, and other styles
10

Mason, G. J. "CONTRAFREELOADING IN STARLINGS: TESTING THE INFORMATION HYPOTHESIS." Behaviour 136, no. 10-11 (1999): 1267–82. http://dx.doi.org/10.1163/156853999500712.

Full text
Abstract:
AbstractContrafreeloading (CFL) behaviour, in which animals forage persistently in patches that require effort to exploit when patches containing ad lib. food are easily available, seems to contradict the predictions of optimal foraging theory. However, it has been proposed that contrafreeloaders are in fact exploiting a hidden resource, namely information about patches that may be useful in future foraging attempts. We performed two experiments on starlings Sturnus vulgaris to test this hypothesis by determining the circumstances in which CFL occurs and assessing whether any useful informatio
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Exploit testing"

1

Flansburg, Kevin. "A framework for automated management of exploit testing environments." Thesis, Georgia Institute of Technology, 2015. http://hdl.handle.net/1853/54912.

Full text
Abstract:
To demonstrate working exploits or vulnerabilities, people often share their findings as a form of proof-of-concept (PoC) prototype. Such practices are particularly useful to learn about real vulnerabilities and state-of-the-art exploitation techniques. Unfortunately, the shared PoC exploits are seldom reproducible; in part because they are often not thoroughly tested, but largely because authors lack a formal way to specify the tested environment or its dependencies. Although exploit writers attempt to overcome such problems by describing their dependencies or testing environments using comm
APA, Harvard, Vancouver, ISO, and other styles
2

Vernersson, Susanne. "Penetration Testing in a Web Application Environment." Thesis, Linnéuniversitetet, Institutionen för datavetenskap, fysik och matematik, DFM, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-8934.

Full text
Abstract:
As the use of web applications is increasing among a number of different industries, many companies turn to online applications to promote their services. Companies see the great advantages with web applications such as convenience, low costs and little need of additional hardware or software configuration. Meanwhile, the threats against web applications are scaling up where the attacker is not in need of much experience or knowledge to hack a poorly secured web application as the service easily can be accessed over the Internet. While common attacks such as cross-site scripting and SQL inject
APA, Harvard, Vancouver, ISO, and other styles
3

Kahlström, Joakim, and Johan Hedlin. "Automating software installation for cyber security research and testing public exploits in CRATE." Thesis, Linköpings universitet, Databas och informationsteknik, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-177401.

Full text
Abstract:
As cyber attacks are an ever-increasing threat to many organizations, the need for controlled environments where cyber security defenses can be tested against real-world attacks is increasing. These environments, called cyber ranges, exist across the world for both military and academic purposes of various scales. As the function of a cyber range involves having a set of computers, virtual or physical, that can be configured to replicate a corporate network or an industrial control system, having an automated method of configuring these can streamline the process of performing different exerci
APA, Harvard, Vancouver, ISO, and other styles
4

Andersson, Gustaf, and Fredrik Andersson. "Android Environment Security." Thesis, Linnéuniversitetet, Institutionen för datavetenskap, fysik och matematik, DFM, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-20512.

Full text
Abstract:
In modern times mobile devices are a increasing technology and malicious users are increasing as well. On a mobile device it often exist valuable private information that a malicious user is interested in and it often has lower security features implemented compared to computers. It is therefore important to be aware of the security risks that exist when using a mobile device in order to stay protected.In this thesis information about what security risks and attacks that are possible to execute towards a mobile device running Android will be presented. Possible attack scenarios are attacking t
APA, Harvard, Vancouver, ISO, and other styles
5

Bahabanian, Olivier. "Explicit deconvolution of wellbore storage distorted well test data." Texas A&M University, 2006. http://hdl.handle.net/1969.1/4811.

Full text
Abstract:
The analysis/interpretation of wellbore storage distorted pressure transient test data remains one of the most significant challenges in well test analysis. Deconvolution (i.e., the "conversion" of a variable-rate distorted pressure profile into the pressure profile for an equivalent constant rate production sequence) has been in limited use as a "conversion" mechanism for the last 25 years. Unfortunately, standard deconvolution techniques require accurate measurements of flow-rate and pressure — at downhole (or sandface) conditions. While accurate pressure measurements are commonplace, t
APA, Harvard, Vancouver, ISO, and other styles
6

McNiel, Patrick D. "Implicit and explicit measures." Thesis, Atlanta, Ga. : Georgia Institute of Technology, 2009. http://hdl.handle.net/1853/28132.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Collier, Benjamin Lee. "DOES OPTIMISM EXPLAIN HOW RELIGIOUSNESS AFFECTS ALCOHOL USE AMONG COLLEGE STUDENTS?" UKnowledge, 2006. http://uknowledge.uky.edu/gradschool_theses/398.

Full text
Abstract:
Alcohol use, because of its many negative consequences, is the number one health problem facing college students. Because of this, researchers have looked for factors associated with reduced drinking. Religiousness is one such factor. Religiousness is a complex, multidimensional construct, and while it tends to be negatively associated with alcohol use, research progress has been slow due to the tendency of researchers to poorly operationalize this construct and to design studies that fail to go beyond the bivariate relationship of religiousness and alcohol use. In order to address these short
APA, Harvard, Vancouver, ISO, and other styles
8

Andersson, Daniel, and Fredrik Saliba. "Virtual testing of self-piercing rivet connections." Thesis, Luleå tekniska universitet, Institutionen för teknikvetenskap och matematik, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-79405.

Full text
Abstract:
The automotive industry is currently trying to replace the conventional steels to lightweight materials such as aluminum or carbon fiber to meet all stricter emission targets. When using such materials, traditional joining methods, such as spot welds, could be difficult to use. Therefore, more focus has been put on self-piercing rivets (SPR).In whole car models used in crash simulations, substitution models are used to model SPR joints. It is important to calibrate these models for different load cases. Volvo Cars Corporation (VCC) are currently calibrating using time-consuming physical tests
APA, Harvard, Vancouver, ISO, and other styles
9

Liang, Yuli. "Contributions to Estimation and Testing Block Covariance Structures in Multivariate Normal Models." Doctoral thesis, Stockholms universitet, Statistiska institutionen, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:su:diva-115347.

Full text
Abstract:
This thesis concerns inference problems in balanced random effects models with a so-called block circular Toeplitz covariance structure. This class of covariance structures describes the dependency of some specific multivariate two-level data when both compound symmetry and circular symmetry appear simultaneously. We derive two covariance structures under two different invariance restrictions. The obtained covariance structures reflect both circularity and exchangeability present in the data. In particular, estimation in the balanced random effects with block circular covariance matrices is co
APA, Harvard, Vancouver, ISO, and other styles
10

Pillai, Anil Ph D. "Retreating from the Nuclear Path Testing the theory of Prudential Realism to explain Nuclear Forbearance." University of Cincinnati / OhioLINK, 2012. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1342103267.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Exploit testing"

1

Maynor, David. Metasploit toolkit for penetration testing, exploit development, and vulnerability research. Syngress, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Maynor, David. Metasploit toolkit for penetration testing, exploit development, and vulnerability research. Syngress, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Center, Turner-Fairbank Highway Research, ed. Videotapes explain the how and why of LTPP's revised resilient modulus laboratory tests and procedures. [U.S. Dept. of Transportation, Federal Highway Administration], Research, Development, and Technology, Turner-Fairbank Highway Research Center, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

editor, Rope Susan, ed. The rogue colonel: Exploits of "Daddy" Thyson and his aircraft testing unit during World War II. Outskirts Press, 2016.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Blau, Francine D. Do cognitive test scores explain higher US wage inequality? National Bureau of Economic Research, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Barnes, David Milller. Depression and Distress in Blacks and Whites in the US: Testing a Hypothesis to Explain a Double Paradox. [publisher not identified], 2015.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Maugeri, Giuseppe. L’insegnamento dell’italiano a stranieri Alcune coordinate di riferimento per gli anni Venti. Fondazione Università Ca’ Foscari, 2021. http://dx.doi.org/10.30687/978-88-6969-523-0.

Full text
Abstract:
This book develops the theme of teaching Italian abroad, starting from the awareness of the motivations for foreign students to study the Italian language and the different methodological procedures in order to teach it.For this purpose, the book focuses on the problems concerning the training of teachers of Italian to foreigners and on the many aspects of teaching Italian in order to propose both a methodological reflection on the edulinguistic project and educational solutions aimed at improving the quality of the students’ learning.Part 1The first part focuses on edulinguistic teaching visi
APA, Harvard, Vancouver, ISO, and other styles
8

Metasploit Toolkit for Penetration Testing, Exploit Development, and Vulnerability Research. Elsevier, 2007. http://dx.doi.org/10.1016/b978-1-59749-074-0.x5000-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Foster, James. Metasploit Toolkit for Penetration Testing, Exploit Development, and Vulnerability Research. Syngress, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Maynor, David. Metasploit Toolkit for Penetration Testing, Exploit Development, and Vulnerability Research. Elsevier Science & Technology Books, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Exploit testing"

1

Kayacık, Hilmi G., A. Nur Zincir-Heywood, Malcolm I. Heywood, and Stefan Burschka. "Testing Detector Parameterization Using Evolutionary Exploit Generation." In Lecture Notes in Computer Science. Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-01129-0_13.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Rigaki, Maria, Ondřej Lukáš, Carlos Catania, and Sebastian Garcia. "Prompt. Exploit. Repeat: Automating Network Security Testing with LLMs." In Lecture Notes in Computer Science. Springer Nature Switzerland, 2025. https://doi.org/10.1007/978-3-031-87330-0_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Tavazzi, Erica, Camille L. Gerard, Olivier Michielin, Alexandre Wicky, Roberto Gatta, and Michel A. Cuendet. "A Process Mining Approach to Statistical Analysis: Application to a Real-World Advanced Melanoma Dataset." In Lecture Notes in Business Information Processing. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-72693-5_22.

Full text
Abstract:
AbstractThanks to its ability to offer a time-oriented perspective on the clinical events that define the patient’s path of care, Process Mining (PM) is assuming an emerging role in clinical data analytics. PM’s ability to exploit time-series data and to build processes without any a priori knowledge suggests interesting synergies with the most common statistical analyses in healthcare, in particular survival analysis. In this work we demonstrate contributions of our process-oriented approach in analyzing a real-world retrospective dataset of patients treated for advanced melanoma at the Lausa
APA, Harvard, Vancouver, ISO, and other styles
4

Li, Jianwen, Shufang Zhu, Geguang Pu, and Moshe Y. Vardi. "SAT-Based Explicit LTL Reasoning." In Hardware and Software: Verification and Testing. Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-26287-1_13.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Kühn, Johannes Maximilian, Oliver Bringmann, and Wolfgang Rosenstiel. "Increasing Reliability Using Adaptive Cross-Layer Techniques in DRPs: Just-Safe-Enough Responses to Reliability Threats." In Dependable Embedded Systems. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-52017-5_5.

Full text
Abstract:
AbstractThe developments in the semiconductor industry as predicted by institutions such as the ITRS present a difficult question to hardware and software developers alike: How to implement increasingly complex, power hungry, and critical applications reliably in today’s and tomorrow’s semiconductor technology? The present trend of semiconductor technology is characterized by a sharp increase in complexity, cost, and delicacy. Also, it does not scale along the demands which are still based on and often exceed Moore’s Law. In this chapter, we propose to exploit the architectural redundancies pr
APA, Harvard, Vancouver, ISO, and other styles
6

Muduli, Sujit Kumar, Rohan Ravikumar Padulkar, and Subhajit Roy. "Interactive Theorem Proving Modulo Fuzzing." In Computer Aided Verification. Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-65627-9_24.

Full text
Abstract:
AbstractInteractive theorem provers (ITPs) exploit the collaboration between humans and computers, enabling proof of complex theorems. Further, ITPs allow extraction of provably correct implementations from proofs. However, often, the extracted code interface with external libraries containing real-life complexities—proprietary library calls, remote/cloud APIs, complex models like ML models, inline assembly, highly non-linear arithmetic, vector instructions etc. We refer to such functions/operations as closed-box components. For such components, the user has to provide appropriate assumed lemm
APA, Harvard, Vancouver, ISO, and other styles
7

Brucker, Achim D., and Burkhart Wolff. "Monadic Sequence Testing and Explicit Test-Refinements." In Tests and Proofs. Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-41135-4_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Christakis, Maria, Peter Müller, and Valentin Wüstholz. "Collaborative Verification and Testing with Explicit Assumptions." In FM 2012: Formal Methods. Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-32759-9_13.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Porat, Ely, and Amir Rothschild. "Explicit Non-adaptive Combinatorial Group Testing Schemes." In Automata, Languages and Programming. Springer Berlin Heidelberg, 2008. http://dx.doi.org/10.1007/978-3-540-70575-8_61.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Rozier, Kristin Yvonne, and Moshe Y. Vardi. "Deterministic Compilation of Temporal Safety Properties in Explicit State Model Checking." In Hardware and Software: Verification and Testing. Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-39611-3_23.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Exploit testing"

1

Kremel, Sabine, Greg Chitwood, Martin Wöls, and Luciana Intiso. "High Strength N07718 with Improved Resistance to Cracking in H2S-Containing Environments." In CORROSION 2018. NACE International, 2018. https://doi.org/10.5006/c2018-11478.

Full text
Abstract:
Abstract This paper describes the development of an alternative heat treatment designed to increase the strength of 718 (UNS N07718) above the current level, which is bound by the 40 HRC limit of NACE MR01751 and the heat treatment requirements of API 6ACRA.2 The investigation was triggered by hydrogen embrittlement failures reported for PH Ni-base alloys, where unfavorable microstructure was reported to be a contributing factor. Increased strength was also suspected, but this comes at a time when the industry needs to push strength higher to exploit future high-pressure/high-temperature (HP/H
APA, Harvard, Vancouver, ISO, and other styles
2

Peltomäki, Jarkko, Jesper Winsten, Maxime Methais, and Ivan Porres. "Testing cyber-physical systems with explicit output coverage." In 2024 IEEE International Conference on Software Testing, Verification and Validation Workshops (ICSTW). IEEE, 2024. http://dx.doi.org/10.1109/icstw60967.2024.00036.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Olianas, Dario, Maurizio Leotta, and Filippo Ricca. "Leveraging Large Language Models for Explicit Wait Management in End-to-End Web Testing." In 2025 IEEE Conference on Software Testing, Verification and Validation (ICST). IEEE, 2025. https://doi.org/10.1109/icst62969.2025.10988981.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Salem, Maher, and Mohammad Mrian. "AI-Driven Penetration Testing: Automating Exploits with LLMs and Metasploit-A VSFTPD Case Study." In 2025 International Conference on New Trends in Computing Sciences (ICTCS). IEEE, 2025. https://doi.org/10.1109/ictcs65341.2025.10989363.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Sweigert, Devin, Md Minhaz Chowdhury, and Nafiz Rifat. "Exploit Security Vulnerabilities by Penetration Testing." In 2022 IEEE International Conference on Electro Information Technology (eIT). IEEE, 2022. http://dx.doi.org/10.1109/eit53891.2022.9813929.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Darmaillacq, Vianney. "Security policy testing using vulnerability exploit chaining." In 2008 IEEE International Conference on Software Testing Verification and Validation Workshop. IEEE, 2008. http://dx.doi.org/10.1109/icstw.2008.37.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Rodrigues, Gennaro S., Fernanda L. Kastensmidt, Vincent Pouget, and Alberto Bosio. "Performances VS Reliability: how to exploit Approximate Computing for Safety-Critical applications." In 2018 IEEE 24th International Symposium on On-Line Testing And Robust System Design (IOLTS). IEEE, 2018. http://dx.doi.org/10.1109/iolts.2018.8474122.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Iliopoulos, Athanasios, John G. Michopoulos, and John C. Hermanson. "Composite Material Testing Data Reduction to Adjust for the Systematic 6-DoF Testing Machine Aberrations." In ASME 2012 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference. American Society of Mechanical Engineers, 2012. http://dx.doi.org/10.1115/detc2012-71119.

Full text
Abstract:
This paper describes a data reduction methodology for eliminating the systematic aberrations introduced by the unwanted behavior of a multiaxial testing machine, into the massive amounts of experimental data collected from testing of composite material coupons. The machine in reference is a custom made 6-DoF system called NRL66.3 and developed at the NAval Research Laboratory, that consists of multiple sets of hexapod configurations essentially forming a recursive synthesis of multiple parallel mechanisms. Hexapod linkages, the grips, and other deformable parts of the machine absorb energy. Th
APA, Harvard, Vancouver, ISO, and other styles
9

Valdmanis, J. A., and S. S. Pei. "A Non-Contact Picosecond Prober for Integrated Circuit Testing." In Picosecond Electronics and Optoelectronics. Optica Publishing Group, 1987. http://dx.doi.org/10.1364/peo.1987.wa1.

Full text
Abstract:
Electro-optic sampling has been used extensively for the charaterization of picosecond electronic devices such as photodetectors, transistors, and diodes [1,2]. For the large part, these studies have been with discrete devices coupled to specialized electro-optic modulators in a hybrid electrode geometry. However, there is great interest in being able to probe internal points on integrated circuits. Recently, a specialized embodiment of electro-optic sampling [3] was developed to exploit the electro-optic properties of GaAs and perform sampling directly in the substrate of GaAs integrated circ
APA, Harvard, Vancouver, ISO, and other styles
10

John, Shaju, Jin-Hyeong Yoo, and Norman M. Wereley. "A Magnetorheological Actuation System: Part I — Testing." In ASME 2007 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference. ASMEDC, 2007. http://dx.doi.org/10.1115/detc2007-35646.

Full text
Abstract:
There is a demand for compact hybrid actuation systems which combines actuation and valving systems in a compact package. Such self-contained actuation systems have potential applications in the field of rotorcraft (as active pitch links) and automotive engineering (as active vibration control devices). Hybrid hydraulic actuation systems, based on frequency rectification of the high frequency motion of an active material, can be used to exploit the high bandwidth of smart material to design devices with high force and stroke. Magnetorheological (MR) fluids are active fluids whose viscosity can
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Exploit testing"

1

Zanker. PR-343-06604-R02 Smart USM Diagnostics - Phase 2. Pipeline Research Council International, Inc. (PRCI), 2009. http://dx.doi.org/10.55274/r0010758.

Full text
Abstract:
It has long been known that all ultrasonic flow meters, especially those that exploit multiple paths to achieve higher accuracies, are capable of extensive self-diagnosis. However, each manufacturer of the technology has tended to develop diagnostic tools peculiar to his particular device. This has led to a confusing mix of offerings that are not transportable between meters, and whose interpretations are not always consistent. This report addresses: � Verification of the Phase 1 models against available field data; � Implementation of field-tested methods offered by PRCI users; � Trending the
APA, Harvard, Vancouver, ISO, and other styles
2

Tanksley, Steven D., and Dani Zamir. Development and Testing of a Method for the Systematic Discovery and Utilization of Novel QTLs in the Production of Improved Crop Varieties: Tomato as a Model System. United States Department of Agriculture, 1995. http://dx.doi.org/10.32747/1995.7570570.bard.

Full text
Abstract:
Modern cultivated varieties carry only a small fraction of the variation present in the gene pool. The narrow genetic basis of modern crop plants is a result of genetic bottlenecks imposed during early domestication and modern plant breeding. The wild ancestors of most crop plants can still be found in their natural habitats and Germplasm Centers have been established to collect and maintain this material. These wild and unadapted resources can potentially fuel crop plant improvement efforts for many years into the future (Tanksley and McCouch 1997). Unfortunately, scientists have been unable
APA, Harvard, Vancouver, ISO, and other styles
3

Sen, Koushik, and Gul Agha. CUTE and jCUTE: Concolic Unit Testing and Explicit Path Model-Checking Tools (Tools Paper). Defense Technical Information Center, 2006. http://dx.doi.org/10.21236/ada484701.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Angrist, Noam, Amanda Beatty, Claire Cullen, and Moitshepi Matsheng. A/B testing in education: rapid experimentation to optimise programme cost-effectiveness. What Works Hub for Global Education, 2024. http://dx.doi.org/10.35489/bsg-whatworkshubforglobaleducation-ri_2024/06.

Full text
Abstract:
A/B testing offers a practical approach to improving education programmes in low-and middle-income countries. This insight note delves into how it allows implementers to quickly, affordably and effectively optimise interventions. Drawing on seven years of A/B testing experience from Youth Impact, the authors explore how this approach differs from traditional Randomised Control Trials (RCTs) by focusing on rapid, iterative programme adjustments that boost impact and scalability. By embracing A/B testing, the social sector can harness its potential to drive data-informed decisions, improve stude
APA, Harvard, Vancouver, ISO, and other styles
5

Orbán, Levente. Lecture Short Notes: Introduction to Probability, Effect Size, and Hypothesis Testing. Orban Foundation, 2025. https://doi.org/10.69642/4593.

Full text
Abstract:
This lecture introduces fundamental statistical concepts related to probability, effect size, and hypothesis testing. We explore the role of probability in inferential statistics, discuss the trade-offs between Type I and Type II errors, and demonstrate calculations using R programming. The importance of effect size in interpreting statistical significance is also highlighted. This document refines and expands upon the original lecture transcript to enhance coherence and depth.
APA, Harvard, Vancouver, ISO, and other styles
6

Maksymov, Oleksandr S., Julia O. Maksymova, and Oleksandr O. Maksymov. Integrated Control of Students Competencies in Educational Programs. Innovative Modeling Using an Ontology Approach. Publishing House - Vilnius Business College, 2023. http://dx.doi.org/10.57005/ab.2023.1.4.

Full text
Abstract:
For comprehensive testing of students’ knowledge, it is necessary to have two areas of consideration - this is an ontological model of the subject area and formulated, formalized, and described concept of knowledge. A formalized description of concepts from the subject area of knowledge is quite specific and time-consuming. At the same time, already at this stage in the development of research and the use of relevant ontology results, they make a significant contribution to the problems of managing and controlling the knowledge of students of higher educational institutions. This article is an
APA, Harvard, Vancouver, ISO, and other styles
7

André, Karin, Mathilda Englund, and Åsa Gerger Swartling. Testing the Impact Chain Model: Exploring Social Vulnerability to Multiple Hazards and Cascading Effects. Stockholm Environment Institute, 2022. http://dx.doi.org/10.51414/sei2022.041.

Full text
Abstract:
This fact sheet presents an overview of how the impact chain method can be used to explore social vulnerability to multiple hydrometeorological hazards and their cascading effects, in a case study in Halmstad Municipality, Sweden. A particular focus in this case study was the methodological research and innovation (R&I) area of co-production of knowledge, with lessons learned presented here.
APA, Harvard, Vancouver, ISO, and other styles
8

Decroux, Agnes, Kassem Kalo, and Keith Swinden. PR-393-205100-R01 IRIS X-Ray CT Qualification for Flexible Pipe Inspection (Phase 1). Pipeline Research Council International, Inc. (PRCI), 2021. http://dx.doi.org/10.55274/r0012068.

Full text
Abstract:
There are several techniques available to inspect single wall carbon steel pipelines including; Magnetic flux leakage (MFL), ultrasonic testing (UT), Electro-Magnetic Acoustic Transducer (EMAT), Phased Array, guide wave testing (GWT), etc. However, for more complex structures such as flexible pipelines the technology available to inspect them is far more limited. PRCI commissioned a program (SPIM 2-1) under the Subsea TC (2017-2020) to evaluate all known and suspected technologies that could be used to provide a detailed subsea inspection of a flexible riser. PRCI produced four samples of flex
APA, Harvard, Vancouver, ISO, and other styles
9

Perez-Rivera, Anthony, Jonathan Trovillion, Peter Stynoski, and Jeffrey Ryan. Simulated barge impacts on fiber-reinforced polymers (FRP) composite sandwich panels : dynamic finite element analysis (FEA) to develop force time histories to be used on experimental testing. Engineer Research and Development Center (U.S.), 2024. http://dx.doi.org/10.21079/11681/48080.

Full text
Abstract:
The purpose of this study is to evaluate the dynamic response of fiber-reinforced polymer (FRP) composite sandwich panels subjected to typical barge impact masses and velocities to develop force time histories that can be used in controlled experimental testing. Dynamic analyses were performed on FRP composite sandwich panels using the finite element method software Abaqus/Explicit. The “traction-separation” law in the Abaqus software is used to define the cohesive surface interaction properties to evaluate the damage between FRP composite laminate layers as well as the core separation within
APA, Harvard, Vancouver, ISO, and other styles
10

Rosenfeld and Munoz. PR-218-104503-R01 Field-Expanded Line Pipe Causes Effects on Pipeline Safety and Appropriate Responses. Pipeline Research Council International, Inc. (PRCI), 2012. http://dx.doi.org/10.55274/r0010785.

Full text
Abstract:
Several pipeline construction projects executed between 2007 and 2009 experienced observations of pipe expansion following hydrostatic testing in the field to pressure levels produced hoop stresses near or above 100% SMYS. Owing to biaxial strength effects, the test conditions would not have been expected to cause pipe having the specified strength properties to yield during the test. The affected pipes were 36-inch OD and 42-inch OD, specified to meet the requirements of API 5L Grade X70 supplied by several manufacturers, with plate obtained from various sources. Some projects had only a few
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!