Academic literature on the topic 'Exploit testing'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Exploit testing.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Exploit testing"
Boyanov, Petar. "VULNERABILITY PENETRATION TESTING THE COMPUTER AND NETWORK RESOURCES OF WINDOWS BASED OPERATING SYSTEMS." Journal scientific and applied research 5, no. 1 (2014): 85–92. http://dx.doi.org/10.46687/jsar.v5i1.113.
Full textWang, Yu, Yipeng Zhang, and Zhoujun Li. "AAHEG: Automatic Advanced Heap Exploit Generation Based on Abstract Syntax Tree." Symmetry 15, no. 12 (2023): 2197. http://dx.doi.org/10.3390/sym15122197.
Full textDeng, Fenglei, Jian Wang, Bin Zhang, Chao Feng, Zhiyuan Jiang, and Yunfei Su. "A Pattern-Based Software Testing Framework for Exploitability Evaluation of Metadata Corruption Vulnerabilities." Scientific Programming 2020 (September 27, 2020): 1–21. http://dx.doi.org/10.1155/2020/8883746.
Full textGomathy, Dr C. K., Dr V. Geetha, Mr D. Sri Datta Vallabh, and Mr Y. Yagn Sai Praneesh Reddy. "Ethical Hacking and Vulnerability Testing: Navigating Legal and Moral Boundaries." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 09 (2024): 1–5. http://dx.doi.org/10.55041/ijsrem37503.
Full textBogdanova, Elizaveta, Larysa Pavlova, and Karina Pohorila. "A concise overview of the specific features of using exployts." Computer Science and Cybersecurity, no. 1 (November 11, 2022): 16–20. http://dx.doi.org/10.26565/2519-2310-2022-1-02.
Full textNarayana Rao, T. Venkat, and Vemula Shravan. "Metasploit Unleashed Tool for Penetration Testing." International Journal on Recent and Innovation Trends in Computing and Communication 7, no. 4 (2019): 16–20. http://dx.doi.org/10.17762/ijritcc.v7i4.5285.
Full textLaipaka, Robertus, and Theresia Widji Astuti. "Exploit Windows XP Menggunakan Parrot OS." Jurnal Pengabdian ILUNG (Inovasi Lahan Basah Unggul) 4, no. 3 (2025): 159. https://doi.org/10.20527/ilung.v4i3.14741.
Full textK Royce Richi Daniel and Dr. Lipsa Nayak. "Wireless Network Penetration Testing." International Journal of Latest Technology in Engineering Management & Applied Science 14, no. 4 (2025): 543–46. https://doi.org/10.51583/ijltemas.2025.140400056.
Full textGomathy, Dr CK, Dr V. Geetha, Mr P. V. Sri Ram, and Surya Prakash L N. "NOVEL STUDY ON ETHICAL HACKING AND VULNERABILITY TESTING." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 09 (2024): 1–6. http://dx.doi.org/10.55041/ijsrem37510.
Full textMason, G. J. "CONTRAFREELOADING IN STARLINGS: TESTING THE INFORMATION HYPOTHESIS." Behaviour 136, no. 10-11 (1999): 1267–82. http://dx.doi.org/10.1163/156853999500712.
Full textDissertations / Theses on the topic "Exploit testing"
Flansburg, Kevin. "A framework for automated management of exploit testing environments." Thesis, Georgia Institute of Technology, 2015. http://hdl.handle.net/1853/54912.
Full textVernersson, Susanne. "Penetration Testing in a Web Application Environment." Thesis, Linnéuniversitetet, Institutionen för datavetenskap, fysik och matematik, DFM, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-8934.
Full textKahlström, Joakim, and Johan Hedlin. "Automating software installation for cyber security research and testing public exploits in CRATE." Thesis, Linköpings universitet, Databas och informationsteknik, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-177401.
Full textAndersson, Gustaf, and Fredrik Andersson. "Android Environment Security." Thesis, Linnéuniversitetet, Institutionen för datavetenskap, fysik och matematik, DFM, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-20512.
Full textBahabanian, Olivier. "Explicit deconvolution of wellbore storage distorted well test data." Texas A&M University, 2006. http://hdl.handle.net/1969.1/4811.
Full textMcNiel, Patrick D. "Implicit and explicit measures." Thesis, Atlanta, Ga. : Georgia Institute of Technology, 2009. http://hdl.handle.net/1853/28132.
Full textCollier, Benjamin Lee. "DOES OPTIMISM EXPLAIN HOW RELIGIOUSNESS AFFECTS ALCOHOL USE AMONG COLLEGE STUDENTS?" UKnowledge, 2006. http://uknowledge.uky.edu/gradschool_theses/398.
Full textAndersson, Daniel, and Fredrik Saliba. "Virtual testing of self-piercing rivet connections." Thesis, Luleå tekniska universitet, Institutionen för teknikvetenskap och matematik, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-79405.
Full textLiang, Yuli. "Contributions to Estimation and Testing Block Covariance Structures in Multivariate Normal Models." Doctoral thesis, Stockholms universitet, Statistiska institutionen, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:su:diva-115347.
Full textPillai, Anil Ph D. "Retreating from the Nuclear Path Testing the theory of Prudential Realism to explain Nuclear Forbearance." University of Cincinnati / OhioLINK, 2012. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1342103267.
Full textBooks on the topic "Exploit testing"
Maynor, David. Metasploit toolkit for penetration testing, exploit development, and vulnerability research. Syngress, 2007.
Find full textMaynor, David. Metasploit toolkit for penetration testing, exploit development, and vulnerability research. Syngress, 2007.
Find full textCenter, Turner-Fairbank Highway Research, ed. Videotapes explain the how and why of LTPP's revised resilient modulus laboratory tests and procedures. [U.S. Dept. of Transportation, Federal Highway Administration], Research, Development, and Technology, Turner-Fairbank Highway Research Center, 1999.
Find full texteditor, Rope Susan, ed. The rogue colonel: Exploits of "Daddy" Thyson and his aircraft testing unit during World War II. Outskirts Press, 2016.
Find full textBlau, Francine D. Do cognitive test scores explain higher US wage inequality? National Bureau of Economic Research, 2001.
Find full textBarnes, David Milller. Depression and Distress in Blacks and Whites in the US: Testing a Hypothesis to Explain a Double Paradox. [publisher not identified], 2015.
Find full textMaugeri, Giuseppe. L’insegnamento dell’italiano a stranieri Alcune coordinate di riferimento per gli anni Venti. Fondazione Università Ca’ Foscari, 2021. http://dx.doi.org/10.30687/978-88-6969-523-0.
Full textMetasploit Toolkit for Penetration Testing, Exploit Development, and Vulnerability Research. Elsevier, 2007. http://dx.doi.org/10.1016/b978-1-59749-074-0.x5000-4.
Full textFoster, James. Metasploit Toolkit for Penetration Testing, Exploit Development, and Vulnerability Research. Syngress, 2007.
Find full textMaynor, David. Metasploit Toolkit for Penetration Testing, Exploit Development, and Vulnerability Research. Elsevier Science & Technology Books, 2011.
Find full textBook chapters on the topic "Exploit testing"
Kayacık, Hilmi G., A. Nur Zincir-Heywood, Malcolm I. Heywood, and Stefan Burschka. "Testing Detector Parameterization Using Evolutionary Exploit Generation." In Lecture Notes in Computer Science. Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-01129-0_13.
Full textRigaki, Maria, Ondřej Lukáš, Carlos Catania, and Sebastian Garcia. "Prompt. Exploit. Repeat: Automating Network Security Testing with LLMs." In Lecture Notes in Computer Science. Springer Nature Switzerland, 2025. https://doi.org/10.1007/978-3-031-87330-0_2.
Full textTavazzi, Erica, Camille L. Gerard, Olivier Michielin, Alexandre Wicky, Roberto Gatta, and Michel A. Cuendet. "A Process Mining Approach to Statistical Analysis: Application to a Real-World Advanced Melanoma Dataset." In Lecture Notes in Business Information Processing. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-72693-5_22.
Full textLi, Jianwen, Shufang Zhu, Geguang Pu, and Moshe Y. Vardi. "SAT-Based Explicit LTL Reasoning." In Hardware and Software: Verification and Testing. Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-26287-1_13.
Full textKühn, Johannes Maximilian, Oliver Bringmann, and Wolfgang Rosenstiel. "Increasing Reliability Using Adaptive Cross-Layer Techniques in DRPs: Just-Safe-Enough Responses to Reliability Threats." In Dependable Embedded Systems. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-52017-5_5.
Full textMuduli, Sujit Kumar, Rohan Ravikumar Padulkar, and Subhajit Roy. "Interactive Theorem Proving Modulo Fuzzing." In Computer Aided Verification. Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-65627-9_24.
Full textBrucker, Achim D., and Burkhart Wolff. "Monadic Sequence Testing and Explicit Test-Refinements." In Tests and Proofs. Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-41135-4_2.
Full textChristakis, Maria, Peter Müller, and Valentin Wüstholz. "Collaborative Verification and Testing with Explicit Assumptions." In FM 2012: Formal Methods. Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-32759-9_13.
Full textPorat, Ely, and Amir Rothschild. "Explicit Non-adaptive Combinatorial Group Testing Schemes." In Automata, Languages and Programming. Springer Berlin Heidelberg, 2008. http://dx.doi.org/10.1007/978-3-540-70575-8_61.
Full textRozier, Kristin Yvonne, and Moshe Y. Vardi. "Deterministic Compilation of Temporal Safety Properties in Explicit State Model Checking." In Hardware and Software: Verification and Testing. Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-39611-3_23.
Full textConference papers on the topic "Exploit testing"
Kremel, Sabine, Greg Chitwood, Martin Wöls, and Luciana Intiso. "High Strength N07718 with Improved Resistance to Cracking in H2S-Containing Environments." In CORROSION 2018. NACE International, 2018. https://doi.org/10.5006/c2018-11478.
Full textPeltomäki, Jarkko, Jesper Winsten, Maxime Methais, and Ivan Porres. "Testing cyber-physical systems with explicit output coverage." In 2024 IEEE International Conference on Software Testing, Verification and Validation Workshops (ICSTW). IEEE, 2024. http://dx.doi.org/10.1109/icstw60967.2024.00036.
Full textOlianas, Dario, Maurizio Leotta, and Filippo Ricca. "Leveraging Large Language Models for Explicit Wait Management in End-to-End Web Testing." In 2025 IEEE Conference on Software Testing, Verification and Validation (ICST). IEEE, 2025. https://doi.org/10.1109/icst62969.2025.10988981.
Full textSalem, Maher, and Mohammad Mrian. "AI-Driven Penetration Testing: Automating Exploits with LLMs and Metasploit-A VSFTPD Case Study." In 2025 International Conference on New Trends in Computing Sciences (ICTCS). IEEE, 2025. https://doi.org/10.1109/ictcs65341.2025.10989363.
Full textSweigert, Devin, Md Minhaz Chowdhury, and Nafiz Rifat. "Exploit Security Vulnerabilities by Penetration Testing." In 2022 IEEE International Conference on Electro Information Technology (eIT). IEEE, 2022. http://dx.doi.org/10.1109/eit53891.2022.9813929.
Full textDarmaillacq, Vianney. "Security policy testing using vulnerability exploit chaining." In 2008 IEEE International Conference on Software Testing Verification and Validation Workshop. IEEE, 2008. http://dx.doi.org/10.1109/icstw.2008.37.
Full textRodrigues, Gennaro S., Fernanda L. Kastensmidt, Vincent Pouget, and Alberto Bosio. "Performances VS Reliability: how to exploit Approximate Computing for Safety-Critical applications." In 2018 IEEE 24th International Symposium on On-Line Testing And Robust System Design (IOLTS). IEEE, 2018. http://dx.doi.org/10.1109/iolts.2018.8474122.
Full textIliopoulos, Athanasios, John G. Michopoulos, and John C. Hermanson. "Composite Material Testing Data Reduction to Adjust for the Systematic 6-DoF Testing Machine Aberrations." In ASME 2012 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference. American Society of Mechanical Engineers, 2012. http://dx.doi.org/10.1115/detc2012-71119.
Full textValdmanis, J. A., and S. S. Pei. "A Non-Contact Picosecond Prober for Integrated Circuit Testing." In Picosecond Electronics and Optoelectronics. Optica Publishing Group, 1987. http://dx.doi.org/10.1364/peo.1987.wa1.
Full textJohn, Shaju, Jin-Hyeong Yoo, and Norman M. Wereley. "A Magnetorheological Actuation System: Part I — Testing." In ASME 2007 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference. ASMEDC, 2007. http://dx.doi.org/10.1115/detc2007-35646.
Full textReports on the topic "Exploit testing"
Zanker. PR-343-06604-R02 Smart USM Diagnostics - Phase 2. Pipeline Research Council International, Inc. (PRCI), 2009. http://dx.doi.org/10.55274/r0010758.
Full textTanksley, Steven D., and Dani Zamir. Development and Testing of a Method for the Systematic Discovery and Utilization of Novel QTLs in the Production of Improved Crop Varieties: Tomato as a Model System. United States Department of Agriculture, 1995. http://dx.doi.org/10.32747/1995.7570570.bard.
Full textSen, Koushik, and Gul Agha. CUTE and jCUTE: Concolic Unit Testing and Explicit Path Model-Checking Tools (Tools Paper). Defense Technical Information Center, 2006. http://dx.doi.org/10.21236/ada484701.
Full textAngrist, Noam, Amanda Beatty, Claire Cullen, and Moitshepi Matsheng. A/B testing in education: rapid experimentation to optimise programme cost-effectiveness. What Works Hub for Global Education, 2024. http://dx.doi.org/10.35489/bsg-whatworkshubforglobaleducation-ri_2024/06.
Full textOrbán, Levente. Lecture Short Notes: Introduction to Probability, Effect Size, and Hypothesis Testing. Orban Foundation, 2025. https://doi.org/10.69642/4593.
Full textMaksymov, Oleksandr S., Julia O. Maksymova, and Oleksandr O. Maksymov. Integrated Control of Students Competencies in Educational Programs. Innovative Modeling Using an Ontology Approach. Publishing House - Vilnius Business College, 2023. http://dx.doi.org/10.57005/ab.2023.1.4.
Full textAndré, Karin, Mathilda Englund, and Åsa Gerger Swartling. Testing the Impact Chain Model: Exploring Social Vulnerability to Multiple Hazards and Cascading Effects. Stockholm Environment Institute, 2022. http://dx.doi.org/10.51414/sei2022.041.
Full textDecroux, Agnes, Kassem Kalo, and Keith Swinden. PR-393-205100-R01 IRIS X-Ray CT Qualification for Flexible Pipe Inspection (Phase 1). Pipeline Research Council International, Inc. (PRCI), 2021. http://dx.doi.org/10.55274/r0012068.
Full textPerez-Rivera, Anthony, Jonathan Trovillion, Peter Stynoski, and Jeffrey Ryan. Simulated barge impacts on fiber-reinforced polymers (FRP) composite sandwich panels : dynamic finite element analysis (FEA) to develop force time histories to be used on experimental testing. Engineer Research and Development Center (U.S.), 2024. http://dx.doi.org/10.21079/11681/48080.
Full textRosenfeld and Munoz. PR-218-104503-R01 Field-Expanded Line Pipe Causes Effects on Pipeline Safety and Appropriate Responses. Pipeline Research Council International, Inc. (PRCI), 2012. http://dx.doi.org/10.55274/r0010785.
Full text