Inhaltsverzeichnis
Auswahl der wissenschaftlichen Literatur zum Thema „Exploit testing“
Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an
Machen Sie sich mit den Listen der aktuellen Artikel, Bücher, Dissertationen, Berichten und anderer wissenschaftlichen Quellen zum Thema "Exploit testing" bekannt.
Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.
Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.
Zeitschriftenartikel zum Thema "Exploit testing"
Deng, Fenglei, Jian Wang, Bin Zhang, Chao Feng, Zhiyuan Jiang und Yunfei Su. „A Pattern-Based Software Testing Framework for Exploitability Evaluation of Metadata Corruption Vulnerabilities“. Scientific Programming 2020 (27.09.2020): 1–21. http://dx.doi.org/10.1155/2020/8883746.
Der volle Inhalt der QuelleNarayana Rao, T. Venkat, und Vemula Shravan. „Metasploit Unleashed Tool for Penetration Testing“. International Journal on Recent and Innovation Trends in Computing and Communication 7, Nr. 4 (26.04.2019): 16–20. http://dx.doi.org/10.17762/ijritcc.v7i4.5285.
Der volle Inhalt der QuelleMason, G. J. „CONTRAFREELOADING IN STARLINGS: TESTING THE INFORMATION HYPOTHESIS“. Behaviour 136, Nr. 10-11 (1999): 1267–82. http://dx.doi.org/10.1163/156853999500712.
Der volle Inhalt der QuelleBarone, Guglielmo, Francesco D'Acunto und Gaia Narciso. „Telecracy: Testing for Channels of Persuasion“. American Economic Journal: Economic Policy 7, Nr. 2 (01.05.2015): 30–60. http://dx.doi.org/10.1257/pol.20130318.
Der volle Inhalt der QuelleBin Khalid, Hasnan, und Budi Saesar Luhur. „Kinematic-Dynamic Modeling and Test Control of Tracked Drive Vehicle for Indoor Mapping“. Applied Mechanics and Materials 148-149 (Dezember 2011): 1510–13. http://dx.doi.org/10.4028/www.scientific.net/amm.148-149.1510.
Der volle Inhalt der QuelleBergström, Gunnar, Jonas Christoffersson, Kristin Schwanke, Robert Zweigerdt und Carl-Fredrik Mandenius. „Stem cell derived in vivo-like human cardiac bodies in a microfluidic device for toxicity testing by beating frequency imaging“. Lab on a Chip 15, Nr. 15 (2015): 3242–49. http://dx.doi.org/10.1039/c5lc00449g.
Der volle Inhalt der QuellePedersen, Rasmus Søndergaard, und Anders Rahbek. „TESTING GARCH-X TYPE MODELS“. Econometric Theory 35, Nr. 05 (18.10.2018): 1012–47. http://dx.doi.org/10.1017/s026646661800035x.
Der volle Inhalt der QuelleLakshmiSupraja, K. „Sneaking into Mobile“. International Journal for Research in Applied Science and Engineering Technology 9, Nr. VI (30.06.2021): 5107–17. http://dx.doi.org/10.22214/ijraset.2021.36042.
Der volle Inhalt der QuelleSLOAN, JOHN C., und TAGHI M. KHOSHGOFTAAR. „TESTING AND FORMAL VERIFICATION OF SERVICE ORIENTED ARCHITECTURES“. International Journal of Reliability, Quality and Safety Engineering 16, Nr. 02 (April 2009): 137–62. http://dx.doi.org/10.1142/s0218539309003332.
Der volle Inhalt der QuelleSeong, Jin-Taek. „Group Testing-Based Robust Algorithm for Diagnosis of COVID-19“. Diagnostics 10, Nr. 6 (11.06.2020): 396. http://dx.doi.org/10.3390/diagnostics10060396.
Der volle Inhalt der QuelleDissertationen zum Thema "Exploit testing"
Flansburg, Kevin. „A framework for automated management of exploit testing environments“. Thesis, Georgia Institute of Technology, 2015. http://hdl.handle.net/1853/54912.
Der volle Inhalt der QuelleVernersson, Susanne. „Penetration Testing in a Web Application Environment“. Thesis, Linnéuniversitetet, Institutionen för datavetenskap, fysik och matematik, DFM, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-8934.
Der volle Inhalt der QuelleKahlström, Joakim, und Johan Hedlin. „Automating software installation for cyber security research and testing public exploits in CRATE“. Thesis, Linköpings universitet, Databas och informationsteknik, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-177401.
Der volle Inhalt der QuelleAndersson, Gustaf, und Fredrik Andersson. „Android Environment Security“. Thesis, Linnéuniversitetet, Institutionen för datavetenskap, fysik och matematik, DFM, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-20512.
Der volle Inhalt der QuelleBahabanian, Olivier. „Explicit deconvolution of wellbore storage distorted well test data“. Texas A&M University, 2006. http://hdl.handle.net/1969.1/4811.
Der volle Inhalt der QuelleMcNiel, Patrick D. „Implicit and explicit measures“. Thesis, Atlanta, Ga. : Georgia Institute of Technology, 2009. http://hdl.handle.net/1853/28132.
Der volle Inhalt der QuelleCollier, Benjamin Lee. „DOES OPTIMISM EXPLAIN HOW RELIGIOUSNESS AFFECTS ALCOHOL USE AMONG COLLEGE STUDENTS?“ UKnowledge, 2006. http://uknowledge.uky.edu/gradschool_theses/398.
Der volle Inhalt der QuelleAndersson, Daniel, und Fredrik Saliba. „Virtual testing of self-piercing rivet connections“. Thesis, Luleå tekniska universitet, Institutionen för teknikvetenskap och matematik, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-79405.
Der volle Inhalt der QuelleLiang, Yuli. „Contributions to Estimation and Testing Block Covariance Structures in Multivariate Normal Models“. Doctoral thesis, Stockholms universitet, Statistiska institutionen, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:su:diva-115347.
Der volle Inhalt der QuellePillai, Anil Ph D. „Retreating from the Nuclear Path Testing the theory of Prudential Realism to explain Nuclear Forbearance“. University of Cincinnati / OhioLINK, 2012. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1342103267.
Der volle Inhalt der QuelleBücher zum Thema "Exploit testing"
Maynor, David. Metasploit toolkit for penetration testing, exploit development, and vulnerability research. Burlington, MA: Syngress, 2007.
Den vollen Inhalt der Quelle findenMaynor, David. Metasploit toolkit for penetration testing, exploit development, and vulnerability research. Burlington, MA: Syngress, 2007.
Den vollen Inhalt der Quelle findenImplicit and explicit knowledge in second language learning, testing and teaching. Buffalo: Multilingual Matters, 2009.
Den vollen Inhalt der Quelle findenACT, PLAN, EXPLORE: Mathematics victory : Classroom text. 3. Aufl. Des Plaines, Ill: Cambridge Publishing, 2008.
Den vollen Inhalt der Quelle findenBlau, Francine D. Do cognitive test scores explain higher US wage inequality? Cambridge, MA: National Bureau of Economic Research, 2001.
Den vollen Inhalt der Quelle findenUnited States. Office of Educational Research and Improvement., National Center for Education Statistics. und National Assessment of Educational Progress (Project), Hrsg. Using HLM and NAEP data to explore school correlates of 1990 mathematics and geometry achievement in grades 4, 8, and 12: Methodology and results. [Washington, D.C.]: U.S. Dept. of Education, Office of Educational Research and Improvement, 1995.
Den vollen Inhalt der Quelle findenMaugeri, Giuseppe. L’insegnamento dell’italiano a stranieri Alcune coordinate di riferimento per gli anni Venti. Venice: Fondazione Università Ca’ Foscari, 2021. http://dx.doi.org/10.30687/978-88-6969-523-0.
Der volle Inhalt der QuelleMetasploit Toolkit for Penetration Testing, Exploit Development, and Vulnerability Research. Elsevier, 2007. http://dx.doi.org/10.1016/b978-1-59749-074-0.x5000-4.
Der volle Inhalt der QuelleFoster, James. Metasploit Toolkit for Penetration Testing, Exploit Development, and Vulnerability Research. Syngress, 2007.
Den vollen Inhalt der Quelle findenMegahed, Hamza. Penetration Testing with Shellcode: Detect, exploit, and secure network-level and operating system vulnerabilities. Packt Publishing, 2018.
Den vollen Inhalt der Quelle findenBuchteile zum Thema "Exploit testing"
Kayacık, Hilmi G., A. Nur Zincir-Heywood, Malcolm I. Heywood und Stefan Burschka. „Testing Detector Parameterization Using Evolutionary Exploit Generation“. In Lecture Notes in Computer Science, 105–10. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-01129-0_13.
Der volle Inhalt der QuelleTavazzi, Erica, Camille L. Gerard, Olivier Michielin, Alexandre Wicky, Roberto Gatta und Michel A. Cuendet. „A Process Mining Approach to Statistical Analysis: Application to a Real-World Advanced Melanoma Dataset“. In Lecture Notes in Business Information Processing, 291–304. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-72693-5_22.
Der volle Inhalt der QuelleLi, Jianwen, Shufang Zhu, Geguang Pu und Moshe Y. Vardi. „SAT-Based Explicit LTL Reasoning“. In Hardware and Software: Verification and Testing, 209–24. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-26287-1_13.
Der volle Inhalt der QuelleKühn, Johannes Maximilian, Oliver Bringmann und Wolfgang Rosenstiel. „Increasing Reliability Using Adaptive Cross-Layer Techniques in DRPs: Just-Safe-Enough Responses to Reliability Threats“. In Dependable Embedded Systems, 121–38. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-52017-5_5.
Der volle Inhalt der QuellePorat, Ely, und Amir Rothschild. „Explicit Non-adaptive Combinatorial Group Testing Schemes“. In Automata, Languages and Programming, 748–59. Berlin, Heidelberg: Springer Berlin Heidelberg, 2008. http://dx.doi.org/10.1007/978-3-540-70575-8_61.
Der volle Inhalt der QuelleChristakis, Maria, Peter Müller und Valentin Wüstholz. „Collaborative Verification and Testing with Explicit Assumptions“. In FM 2012: Formal Methods, 132–46. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-32759-9_13.
Der volle Inhalt der QuelleBrucker, Achim D., und Burkhart Wolff. „Monadic Sequence Testing and Explicit Test-Refinements“. In Tests and Proofs, 17–36. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-41135-4_2.
Der volle Inhalt der QuelleBeckert, Bernhard, Sarah Grebing und Mattias Ulbrich. „An Interaction Concept for Program Verification Systems with Explicit Proof Object“. In Hardware and Software: Verification and Testing, 163–78. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-70389-3_11.
Der volle Inhalt der QuelleRozier, Kristin Yvonne, und Moshe Y. Vardi. „Deterministic Compilation of Temporal Safety Properties in Explicit State Model Checking“. In Hardware and Software: Verification and Testing, 243–59. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-39611-3_23.
Der volle Inhalt der QuelleIsbell, Daniel R., und John Rogers. „Measuring Implicit and Explicit Learning and Knowledge“. In The Routledge Handbook of Second Language Acquisition and Language Testing, 305–15. New York: Routledge, 2020. | Series: The Routledge handbooks in second language acquisition: Routledge, 2020. http://dx.doi.org/10.4324/9781351034784-33.
Der volle Inhalt der QuelleKonferenzberichte zum Thema "Exploit testing"
Darmaillacq, Vianney. „Security policy testing using vulnerability exploit chaining“. In 2008 IEEE International Conference on Software Testing Verification and Validation Workshop. IEEE, 2008. http://dx.doi.org/10.1109/icstw.2008.37.
Der volle Inhalt der QuelleRodrigues, Gennaro S., Fernanda L. Kastensmidt, Vincent Pouget und Alberto Bosio. „Performances VS Reliability: how to exploit Approximate Computing for Safety-Critical applications“. In 2018 IEEE 24th International Symposium on On-Line Testing And Robust System Design (IOLTS). IEEE, 2018. http://dx.doi.org/10.1109/iolts.2018.8474122.
Der volle Inhalt der QuelleIliopoulos, Athanasios, John G. Michopoulos und John C. Hermanson. „Composite Material Testing Data Reduction to Adjust for the Systematic 6-DoF Testing Machine Aberrations“. In ASME 2012 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference. American Society of Mechanical Engineers, 2012. http://dx.doi.org/10.1115/detc2012-71119.
Der volle Inhalt der QuelleJohn, Shaju, Jin-Hyeong Yoo und Norman M. Wereley. „A Magnetorheological Actuation System: Part I — Testing“. In ASME 2007 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference. ASMEDC, 2007. http://dx.doi.org/10.1115/detc2007-35646.
Der volle Inhalt der QuelleSchwartz, Christian J., und Shyam Bahadur. „Development of a Novel Wear Testing Device for the Investigation of Articular Cartilage and Compliant Polymers for Use in Biomedical Implants“. In World Tribology Congress III. ASMEDC, 2005. http://dx.doi.org/10.1115/wtc2005-63370.
Der volle Inhalt der QuelleGerber, Andrew G., Kevin W. Wilcox und Jian T. Zhang. „Benchmarking of a Massively Parallel Hybrid CFD Solver for Ocean Applications“. In ASME 2013 32nd International Conference on Ocean, Offshore and Arctic Engineering. American Society of Mechanical Engineers, 2013. http://dx.doi.org/10.1115/omae2013-10999.
Der volle Inhalt der QuelleZhang, Meishan, Guohong Fu und Nan Yu. „Segmenting Chinese Microtext: Joint Informal-Word Detection and Segmentation with Neural Networks“. In Twenty-Sixth International Joint Conference on Artificial Intelligence. California: International Joint Conferences on Artificial Intelligence Organization, 2017. http://dx.doi.org/10.24963/ijcai.2017/591.
Der volle Inhalt der QuelleSeely, Brian J., Karl M. Kapp, Larraine A. Kapka und Steven Wendel. „Enhancing Interpretation of Learned Concepts Through an Online Tensile Strength Simulation“. In ASME 2017 International Mechanical Engineering Congress and Exposition. American Society of Mechanical Engineers, 2017. http://dx.doi.org/10.1115/imece2017-70445.
Der volle Inhalt der QuelleYang, Bozhi, und Qiao Lin. „Planar Microfabricated Check Valves Utilizing Large Compliance of PDMS“. In ASME 2005 International Mechanical Engineering Congress and Exposition. ASMEDC, 2005. http://dx.doi.org/10.1115/imece2005-81958.
Der volle Inhalt der QuelleEmam, Samir A., Jared Hobeck und Daniel J. Inman. „Experimental Study of Nonlinear Vibration Energy Harvesting of a Bistable Composite Laminate“. In ASME 2017 Conference on Smart Materials, Adaptive Structures and Intelligent Systems. American Society of Mechanical Engineers, 2017. http://dx.doi.org/10.1115/smasis2017-3717.
Der volle Inhalt der QuelleBerichte der Organisationen zum Thema "Exploit testing"
Sen, Koushik, und Gul Agha. CUTE and jCUTE: Concolic Unit Testing and Explicit Path Model-Checking Tools (Tools Paper). Fort Belvoir, VA: Defense Technical Information Center, Januar 2006. http://dx.doi.org/10.21236/ada484701.
Der volle Inhalt der QuelleClausen, Jay, D. Moore, L. Cain und K. Malinowski. VI preferential pathways : rule or exception. Engineer Research and Development Center (U.S.), Juli 2021. http://dx.doi.org/10.21079/11681/41305.
Der volle Inhalt der QuelleChornodon, Myroslava. FEAUTURES OF GENDER IN MODERN MASS MEDIA. Ivan Franko National University of Lviv, Februar 2021. http://dx.doi.org/10.30970/vjo.2021.49.11064.
Der volle Inhalt der Quelle