Academic literature on the topic 'Exploit testing'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Exploit testing.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Exploit testing"

1

Deng, Fenglei, Jian Wang, Bin Zhang, Chao Feng, Zhiyuan Jiang, and Yunfei Su. "A Pattern-Based Software Testing Framework for Exploitability Evaluation of Metadata Corruption Vulnerabilities." Scientific Programming 2020 (September 27, 2020): 1–21. http://dx.doi.org/10.1155/2020/8883746.

Full text
Abstract:
In recent years, increased attention is being given to software quality assurance and protection. With considerable verification and protection schemes proposed and deployed, today’s software unfortunately still fails to be protected from cyberattacks, especially in the presence of insecure organization of heap metadata. In this paper, we aim to explore whether heap metadata could be corrupted and exploited by cyberattackers, in an attempt to assess the exploitability of vulnerabilities and ensure software quality. To this end, we propose RELAY, a software testing framework to simulate human exploitation behavior for metadata corruption at the machine level. RELAY employs the heap layout serialization method to construct exploit patterns from human expertise and decomposes complex exploit-solving problems into a series of intermediate state-solving subproblems. With the heap layout procedural method, RELAY makes use of the fewer resources consumed to solve a layout problem according to the exploit pattern, activates the intermediate state, and generates the final exploit. Additionally, RELAY can be easily extended and can continuously assimilate human knowledge to enhance its ability for exploitability evaluation. Using 20 CTF&RHG programs, we then demonstrate that RELAY has the ability to evaluate the exploitability of metadata corruption vulnerabilities and works more efficiently compared with other state-of-the-art automated tools.
APA, Harvard, Vancouver, ISO, and other styles
2

Narayana Rao, T. Venkat, and Vemula Shravan. "Metasploit Unleashed Tool for Penetration Testing." International Journal on Recent and Innovation Trends in Computing and Communication 7, no. 4 (April 26, 2019): 16–20. http://dx.doi.org/10.17762/ijritcc.v7i4.5285.

Full text
Abstract:
In the recent era as the technology is growing rapidly, the use of internet has grown at an exponential rate. The growth has started increasing in between the years 1995-2000.The success of internet has brought great change to the world as we know; however, the problems are common as an obstacle to every productive growth. As the thousands of sites are launching daily and lakhs of people using it ,with limited sources of internet available to monitor the security and credibility of these sites. The security issues are growing rapidly and the existence of vulnerabilities are inevitable. As a result exploits became rampant causing the usage of information security fields. Eventually, the need for vulnerability scanning for a particular network or a particular site has increased and the result was pre-emptive existence of penetration testers whose sole purpose is to execute an exploit using a payload for scanning a vulnerability far before others got the opportunity. Metasploit is a computer security tool that works like a penetration tester. The Metasploit Framework was developed with the intentions of making lives of security experts easier.
APA, Harvard, Vancouver, ISO, and other styles
3

Mason, G. J. "CONTRAFREELOADING IN STARLINGS: TESTING THE INFORMATION HYPOTHESIS." Behaviour 136, no. 10-11 (1999): 1267–82. http://dx.doi.org/10.1163/156853999500712.

Full text
Abstract:
AbstractContrafreeloading (CFL) behaviour, in which animals forage persistently in patches that require effort to exploit when patches containing ad lib. food are easily available, seems to contradict the predictions of optimal foraging theory. However, it has been proposed that contrafreeloaders are in fact exploiting a hidden resource, namely information about patches that may be useful in future foraging attempts. We performed two experiments on starlings Sturnus vulgaris to test this hypothesis by determining the circumstances in which CFL occurs and assessing whether any useful information is acquired by animals performing the behaviour. In accordance with previous results we found that CFL is reduced when foragers are previously deprived of food and also when there are means of gathering information aside from sampling (namely when patches that require effort to exploit can be visually inspected). We also found that useful information is acquired by birds that perform CFL, in that when subsequently tested in extinction with the best patch removed they reliably chose the patch that had been the second best. These results are consistent with the information gain hypothesis. However, birds with low levels of CFL did not perform discernably worse in this test of patch knowledge and experimental reductions in CFL achieved through deprivation treatments did not produce apparent reductions in useful information possessed.
APA, Harvard, Vancouver, ISO, and other styles
4

Barone, Guglielmo, Francesco D'Acunto, and Gaia Narciso. "Telecracy: Testing for Channels of Persuasion." American Economic Journal: Economic Policy 7, no. 2 (May 1, 2015): 30–60. http://dx.doi.org/10.1257/pol.20130318.

Full text
Abstract:
We consider the long-lived slant towards Berlusconi in political information on Italian television (TV ). We exploit a shock to the slanted exposure of viewers: idiosyncratic deadlines to switch to digital TV from 2008 to 2012, which increased the number of freeview channels tenfold. The switch caused a drop in the vote share of Berlusconi's coalition by between 5.5 and 7.5 percentage points. The effect was stronger in towns with older and less educated voters. At least 20 percent of digital users changed their voting behavior after the introduction of digital TV. Our evidence is consistent with the existence of persuasion-biased viewers. (JEL D72, D83, L82, L88)
APA, Harvard, Vancouver, ISO, and other styles
5

Bin Khalid, Hasnan, and Budi Saesar Luhur. "Kinematic-Dynamic Modeling and Test Control of Tracked Drive Vehicle for Indoor Mapping." Applied Mechanics and Materials 148-149 (December 2011): 1510–13. http://dx.doi.org/10.4028/www.scientific.net/amm.148-149.1510.

Full text
Abstract:
This paper presents one approach in designing and testing an unmanned ground vehicle (UGV) for indoor mapping. The approach makes use of computer real-time simulation and animation direct with the testing in real environment. Novel control architecture was proposed, by exploit the communication between two laptop installed Matlab/Simulink and telemetry data collected from it. The parameter values between real performance and model can be easily evaluated and also from its ladar scanning result, then researcher can explore more variation of modeling aspect, parameter and sensor-actuator configuration to enhance performance of their indoor unmanned vehicle
APA, Harvard, Vancouver, ISO, and other styles
6

Bergström, Gunnar, Jonas Christoffersson, Kristin Schwanke, Robert Zweigerdt, and Carl-Fredrik Mandenius. "Stem cell derived in vivo-like human cardiac bodies in a microfluidic device for toxicity testing by beating frequency imaging." Lab on a Chip 15, no. 15 (2015): 3242–49. http://dx.doi.org/10.1039/c5lc00449g.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Pedersen, Rasmus Søndergaard, and Anders Rahbek. "TESTING GARCH-X TYPE MODELS." Econometric Theory 35, no. 05 (October 18, 2018): 1012–47. http://dx.doi.org/10.1017/s026646661800035x.

Full text
Abstract:
We present novel theory for testing for reduction of GARCH-X type models with an exogenous (X) covariate to standard GARCH type models. To deal with the problems of potential nuisance parameters on the boundary of the parameter space as well as lack of identification under the null, we exploit a noticeable property of specific zero-entries in the inverse information of the GARCH-X type models. Specifically, we consider sequential testing based on two likelihood ratio tests and as demonstrated the structure of the inverse information implies that the proposed test neither depends on whether the nuisance parameters lie on the boundary of the parameter space, nor on lack of identification. Asymptotic theory is derived essentially under stationarity and ergodicity, coupled with a regularity assumption on the exogenous covariate X. Our general results on GARCH-X type models are applied to Gaussian based GARCH-X models, GARCH-X models with Student’s t-distributed innovations as well as integer-valued GARCH-X (PAR-X) models.
APA, Harvard, Vancouver, ISO, and other styles
8

LakshmiSupraja, K. "Sneaking into Mobile." International Journal for Research in Applied Science and Engineering Technology 9, no. VI (June 30, 2021): 5107–17. http://dx.doi.org/10.22214/ijraset.2021.36042.

Full text
Abstract:
As the numbers of android mobiles are increasing day by day and are used to store sensitive information. So, maintaining security is becoming a difficult thing. Here comes the role of penetration testing. The process of performing a penetration test is to verify that mobile devices are vulnerable to security risk or not. We will exploit the mobile devices by preparing and performing the penetration test using Metasploit. It is a framework for developing and executing exploit code against a remote target machine. The main goal is to provide an understanding of mobile device penetration testing using Metasploit Framework and how to utilize it as a security professional.
APA, Harvard, Vancouver, ISO, and other styles
9

SLOAN, JOHN C., and TAGHI M. KHOSHGOFTAAR. "TESTING AND FORMAL VERIFICATION OF SERVICE ORIENTED ARCHITECTURES." International Journal of Reliability, Quality and Safety Engineering 16, no. 02 (April 2009): 137–62. http://dx.doi.org/10.1142/s0218539309003332.

Full text
Abstract:
We examine two open engineering problems in the area of testing and formal verification of internet-enabled service oriented architectures (SOA). The first involves deciding when to formally and exhaustively verify versus when to informally and non-exhaustively test. The second concerns scalability limitations associated with formal verification, to which we propose a semi-formal technique that uses software agents. Finally, we assess how these findings can improve current software quality assurance practices. Addressing the first problem, we present and explain two classes of tradeoffs. External tradeoffs between assurance, performance, and flexibility are determined by the business needs of each application, whether it be in engineering, commerce, or entertainment. Internal tradeoffs between assurance, scale, and level of detail involve the technical challenges of feasibly verifying or testing an SOA. To help decide whether to exhaustively verify or non-exhaustively test, we present and explain these two classes of tradeoffs. Identifying a middle ground between testing and verification, we propose using software agents to simulate services in a composition. Technologically, this approach has the advantage of assuring the quality of compositions that are too large to exhaustively verify. Operationally, it supports testing these compositions in the laboratory without access to source code or use of network resources of third-party services. We identify and exploit the structural similarities between agents and services, examining how doing so can assure the quality of service compositions.
APA, Harvard, Vancouver, ISO, and other styles
10

Seong, Jin-Taek. "Group Testing-Based Robust Algorithm for Diagnosis of COVID-19." Diagnostics 10, no. 6 (June 11, 2020): 396. http://dx.doi.org/10.3390/diagnostics10060396.

Full text
Abstract:
At the time of writing, the COVID-19 infection is spreading rapidly. Currently, there is no vaccine or treatment, and researchers around the world are attempting to fight the infection. In this paper, we consider a diagnosis method for COVID-19, which is characterized by a very rapid rate of infection and is widespread. A possible method for avoiding severe infections is to stop the spread of the infection in advance by the prompt and accurate diagnosis of COVID-19. To this end, we exploit a group testing (GT) scheme, which is used to find a small set of confirmed cases out of a large population. For the accurate detection of false positives and negatives, we propose a robust algorithm (RA) based on the maximum a posteriori probability (MAP). The key idea of the proposed RA is to exploit iterative detection to propagate beliefs to neighbor nodes by exchanging marginal probabilities between input and output nodes. As a result, we show that our proposed RA provides the benefit of being robust against noise in the GT schemes. In addition, we demonstrate the performance of our proposal with a number of tests and successfully find a set of infected samples in both noiseless and noisy GT schemes with different COVID-19 incidence rates.
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Exploit testing"

1

Flansburg, Kevin. "A framework for automated management of exploit testing environments." Thesis, Georgia Institute of Technology, 2015. http://hdl.handle.net/1853/54912.

Full text
Abstract:
To demonstrate working exploits or vulnerabilities, people often share their findings as a form of proof-of-concept (PoC) prototype. Such practices are particularly useful to learn about real vulnerabilities and state-of-the-art exploitation techniques. Unfortunately, the shared PoC exploits are seldom reproducible; in part because they are often not thoroughly tested, but largely because authors lack a formal way to specify the tested environment or its dependencies. Although exploit writers attempt to overcome such problems by describing their dependencies or testing environments using comments, this informal way of sharing PoC exploits makes it hard for exploit authors to achieve the original goal of demonstration. More seriously, these non- or hard-to-reproduce PoC exploits have limited potential to be utilized for other useful research purposes such as penetration testing, or in benchmark suites to evaluate defense mechanisms. In this paper, we present XShop, a framework and infrastructure to describe environments and dependencies for exploits in a formal way, and to automatically resolve these constraints and construct an isolated environment for development, testing, and to share with the community. We show how XShop's flexible design enables new possibilities for utilizing these reproducible exploits in five practical use cases: as a security benchmark suite, in pen-testing, for large scale vulnerability analysis, as a shared development environment, and for regression testing. We design and implement such applications by extending the XShop framework and demonstrate its effectiveness with twelve real exploits against well-known bugs that include GHOST, Shellshock, and Heartbleed. We believe that the proposed practice not only brings immediate incentives to exploit authors but also has the potential to be grown as a community-wide knowledge base.
APA, Harvard, Vancouver, ISO, and other styles
2

Vernersson, Susanne. "Penetration Testing in a Web Application Environment." Thesis, Linnéuniversitetet, Institutionen för datavetenskap, fysik och matematik, DFM, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-8934.

Full text
Abstract:
As the use of web applications is increasing among a number of different industries, many companies turn to online applications to promote their services. Companies see the great advantages with web applications such as convenience, low costs and little need of additional hardware or software configuration. Meanwhile, the threats against web applications are scaling up where the attacker is not in need of much experience or knowledge to hack a poorly secured web application as the service easily can be accessed over the Internet. While common attacks such as cross-site scripting and SQL injection are still around and very much in use since a number of years, the hacker community constantly discovers new exploits making businesses in need of higher security. Penetration testing is a method used to estimate the security of a computer system, network or web application. The aim is to reveal possible vulnerabilities that could be exploited by a malicious attacker and suggest solutions to the given problem at hand. With the right security fixes, a business system can go from being a threat to its users’ sensitive data to a secure and functional platform with just a few adjustments. This thesis aims to help the IT security consultants at Combitech AB with detecting and securing the most common web application exploits that companies suffer from today. By providing Combitech with safe and easy methods to discover and fix the top security deficiencies, the restricted time spent at a client due to budget concerns can be made more efficient thanks to improvements in the internal testing methodology. The project can additionally be of interest to teachers, students and developers who want to know more about web application testing and security as well as common exploit scenarios.
APA, Harvard, Vancouver, ISO, and other styles
3

Kahlström, Joakim, and Johan Hedlin. "Automating software installation for cyber security research and testing public exploits in CRATE." Thesis, Linköpings universitet, Databas och informationsteknik, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-177401.

Full text
Abstract:
As cyber attacks are an ever-increasing threat to many organizations, the need for controlled environments where cyber security defenses can be tested against real-world attacks is increasing. These environments, called cyber ranges, exist across the world for both military and academic purposes of various scales. As the function of a cyber range involves having a set of computers, virtual or physical, that can be configured to replicate a corporate network or an industrial control system, having an automated method of configuring these can streamline the process of performing different exercises. This thesis aims to provide a proof of concept of how the installation of software with known vulnerabilities can be performed and examines if the software is vulnerable directly after installation. The Cyber Range And Training Environment (CRATE) developed by the Swedish Defence Research Agency (FOI) is used as a testbed for the installations and FOI-provided tools are used for launching automated attacks against the installed software. The results show that installations can be performed without Internet access and with minimal network traffic being generated and that our solution can rewrite existing software packages from the package manager Chocolatey to work with an on-premises repository with an 85% success rate. It is also shown that very few publicly available exploits succeed without any manual configuration of either the exploit or the targeted software. Our work contributes to making it easier to set up environments where cyber security research and training can be conducted by simplifying the process of installing vulnerable applications.
APA, Harvard, Vancouver, ISO, and other styles
4

Andersson, Gustaf, and Fredrik Andersson. "Android Environment Security." Thesis, Linnéuniversitetet, Institutionen för datavetenskap, fysik och matematik, DFM, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-20512.

Full text
Abstract:
In modern times mobile devices are a increasing technology and malicious users are increasing as well. On a mobile device it often exist valuable private information that a malicious user is interested in and it often has lower security features implemented compared to computers. It is therefore important to be aware of the security risks that exist when using a mobile device in order to stay protected.In this thesis information about what security risks and attacks that are possible to execute towards a mobile device running Android will be presented. Possible attack scenarios are attacking the device itself, the communication between the device and a server and finally the server.
APA, Harvard, Vancouver, ISO, and other styles
5

Bahabanian, Olivier. "Explicit deconvolution of wellbore storage distorted well test data." Texas A&M University, 2006. http://hdl.handle.net/1969.1/4811.

Full text
Abstract:
The analysis/interpretation of wellbore storage distorted pressure transient test data remains one of the most significant challenges in well test analysis. Deconvolution (i.e., the "conversion" of a variable-rate distorted pressure profile into the pressure profile for an equivalent constant rate production sequence) has been in limited use as a "conversion" mechanism for the last 25 years. Unfortunately, standard deconvolution techniques require accurate measurements of flow-rate and pressure — at downhole (or sandface) conditions. While accurate pressure measurements are commonplace, the measurement of sandface flowrates is rare, essentially non-existent in practice. As such, the "deconvolution" of wellbore storage distorted pressure test data is problematic. In theory, this process is possible, but in practice, without accurate measurements of flowrates, this process can not be employed. In this work we provide explicit (direct) deconvolution of wellbore storage distorted pressure test data using only those pressure data. The underlying equations associated with each deconvolution scheme are derived in the Appendices and implemented via a computational module. The value of this work is that we provide explicit tools for the analysis of wellbore storage distorted pressure data; specifically, we utilize the following techniques: * Russell method (1966) (very approximate approach), * "Beta" deconvolution (1950s and 1980s), * "Material Balance" deconvolution (1990s). Each method has been validated using both synthetic data and literature field cases and each method should be considered valid for practical applications. Our primary technical contribution in this work is the adaptation of various deconvolution methods for the explicit analysis of an arbitrary set of pressure transient test data which are distorted by wellbore storage — without the requirement of having measured sandface flowrates.
APA, Harvard, Vancouver, ISO, and other styles
6

McNiel, Patrick D. "Implicit and explicit measures." Thesis, Atlanta, Ga. : Georgia Institute of Technology, 2009. http://hdl.handle.net/1853/28132.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Collier, Benjamin Lee. "DOES OPTIMISM EXPLAIN HOW RELIGIOUSNESS AFFECTS ALCOHOL USE AMONG COLLEGE STUDENTS?" UKnowledge, 2006. http://uknowledge.uky.edu/gradschool_theses/398.

Full text
Abstract:
Alcohol use, because of its many negative consequences, is the number one health problem facing college students. Because of this, researchers have looked for factors associated with reduced drinking. Religiousness is one such factor. Religiousness is a complex, multidimensional construct, and while it tends to be negatively associated with alcohol use, research progress has been slow due to the tendency of researchers to poorly operationalize this construct and to design studies that fail to go beyond the bivariate relationship of religiousness and alcohol use. In order to address these shortcomings, this study will assess two dimensions of religiousness, religious commitment/motivation and religious consequences, and will test a model, presented by Koenig et al., (2001), that postulates religiousness works through mental health in order to reduce alcohol use. More specifically, this study will test optimism as a possible mediator and moderator of the relationship between religiousness and alcohol use. This study used archival data from 260 (202 female and 58 male) Caucasian, Christian, undergraduate college students who completed a battery of surveys that included measures of religiousness, optimism, and alcohol use. A factor analysis was conducted on one measure of religiousness, the short form of the Faith Maturity Scale. Also, optimism was tested as both a mediator and a moderator for both dimensions of religiousness in predicting alcohol use. Findings indicated optimism is not a significant mediator of the religiousness-alcohol use relationship because optimism did not meet the preconditions for a mediator as it was not associated with alcohol use in this sample. Also, optimism was not a significant moderator of religious commitment/motivation, but it did moderate the relationship of religious consequences and alcohol use. Finally, the two dimensions of religiousness interacted in predicting alcohol use. While both dimensions of religiousness were negatively associated with alcohol use throughout the findings, gender was a significant moderator in all significant interactions. Several implications follow from this study. First, greater specificity is needed regarding Koenig et al.s (2001) model specifically in regards to which third variables are associated with which health outcomes and to whom the model applies. Second, this study highlights the importance of a multidimensional assessment of religiousness. Finally, this study indicates specificity is needed regarding what religious interventions will be helpful for which genders.
APA, Harvard, Vancouver, ISO, and other styles
8

Andersson, Daniel, and Fredrik Saliba. "Virtual testing of self-piercing rivet connections." Thesis, Luleå tekniska universitet, Institutionen för teknikvetenskap och matematik, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-79405.

Full text
Abstract:
The automotive industry is currently trying to replace the conventional steels to lightweight materials such as aluminum or carbon fiber to meet all stricter emission targets. When using such materials, traditional joining methods, such as spot welds, could be difficult to use. Therefore, more focus has been put on self-piercing rivets (SPR).In whole car models used in crash simulations, substitution models are used to model SPR joints. It is important to calibrate these models for different load cases. Volvo Cars Corporation (VCC) are currently calibrating using time-consuming physical tests where the SPR joint is subjected to loads in different directions. To save time, a way of virtually evaluating the SPR joint strength is therefore sought after. To do this, a method was developed using non-linear FEM in LS-DYNA. The method was then used to perform sensitivity studies concerning friction, sheet thickness and rivet geometry.The method developed can be divided into three parts. The process simulation, where the rivet insertion was simulated. A springback analysis, where the material is allowed to springback, closer resembling the real behaviour. Finally, the three destructive tests, lap-shear, cross-tension and KS2, were built using the geometry and initial values from the springback.For the process simulation, an explicit solution was used. To handle the large deformations present during the event, r-adaptivity was used together with a kill-element-method to describe failure, based on CrachFEM or Gissmo. The following springback analysis was then performed using one implicit step.For the destructive tests, a solid element representation of the SPR joint was created using the geometry and initial values from the springback. A shell-solid hybrid model was used to keep the computational time low.Using the method, a good correlation was found both for the process- and the destructive test simulations when compared to experiments. Furthermore, it could be concluded that friction, sheet thickness and rivet geometry affects the SPR joint strength and characteristics.
APA, Harvard, Vancouver, ISO, and other styles
9

Liang, Yuli. "Contributions to Estimation and Testing Block Covariance Structures in Multivariate Normal Models." Doctoral thesis, Stockholms universitet, Statistiska institutionen, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:su:diva-115347.

Full text
Abstract:
This thesis concerns inference problems in balanced random effects models with a so-called block circular Toeplitz covariance structure. This class of covariance structures describes the dependency of some specific multivariate two-level data when both compound symmetry and circular symmetry appear simultaneously. We derive two covariance structures under two different invariance restrictions. The obtained covariance structures reflect both circularity and exchangeability present in the data. In particular, estimation in the balanced random effects with block circular covariance matrices is considered. The spectral properties of such patterned covariance matrices are provided. Maximum likelihood estimation is performed through the spectral decomposition of the patterned covariance matrices. Existence of the explicit maximum likelihood estimators is discussed and sufficient conditions for obtaining explicit and unique estimators for the variance-covariance components are derived. Different restricted models are discussed and the corresponding maximum likelihood estimators are presented. This thesis also deals with hypothesis testing of block covariance structures, especially block circular Toeplitz covariance matrices. We consider both so-called external tests and internal tests. In the external tests, various hypotheses about testing block covariance structures, as well as mean structures, are considered, and the internal tests are concerned with testing specific covariance parameters given the block circular Toeplitz structure. Likelihood ratio tests are constructed, and the null distributions of the corresponding test statistics are derived.
APA, Harvard, Vancouver, ISO, and other styles
10

Pillai, Anil Ph D. "Retreating from the Nuclear Path Testing the theory of Prudential Realism to explain Nuclear Forbearance." University of Cincinnati / OhioLINK, 2012. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1342103267.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Exploit testing"

1

Maynor, David. Metasploit toolkit for penetration testing, exploit development, and vulnerability research. Burlington, MA: Syngress, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Maynor, David. Metasploit toolkit for penetration testing, exploit development, and vulnerability research. Burlington, MA: Syngress, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Implicit and explicit knowledge in second language learning, testing and teaching. Buffalo: Multilingual Matters, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

ACT, PLAN, EXPLORE: Mathematics victory : Classroom text. 3rd ed. Des Plaines, Ill: Cambridge Publishing, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Blau, Francine D. Do cognitive test scores explain higher US wage inequality? Cambridge, MA: National Bureau of Economic Research, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

United States. Office of Educational Research and Improvement., National Center for Education Statistics., and National Assessment of Educational Progress (Project), eds. Using HLM and NAEP data to explore school correlates of 1990 mathematics and geometry achievement in grades 4, 8, and 12: Methodology and results. [Washington, D.C.]: U.S. Dept. of Education, Office of Educational Research and Improvement, 1995.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Maugeri, Giuseppe. L’insegnamento dell’italiano a stranieri Alcune coordinate di riferimento per gli anni Venti. Venice: Fondazione Università Ca’ Foscari, 2021. http://dx.doi.org/10.30687/978-88-6969-523-0.

Full text
Abstract:
This book develops the theme of teaching Italian abroad, starting from the awareness of the motivations for foreign students to study the Italian language and the different methodological procedures in order to teach it.For this purpose, the book focuses on the problems concerning the training of teachers of Italian to foreigners and on the many aspects of teaching Italian in order to propose both a methodological reflection on the edulinguistic project and educational solutions aimed at improving the quality of the students’ learning.Part 1The first part focuses on edulinguistic teaching vision for the learning of the Italian language as a foreign language based upon the principles of the Humanistic Approach.1. Teaching Italian Language Abroad: Institutional Language Policy and StrategiesThis chapter focuses on the situation of Italian foreign language teaching in the world. It also describes the linguistic policy for the promotion of Italian languages abroad adopted by the Italian Ministry of Foreign Affairs and the results obtained as the number of students involved in the different geographic areas.2. Teaching Trainer Courses as a Key Factor to Improve the Quality of Teaching Italian AbroadIn this chapter teaching trainer courses for Italian language teachers are considered as a part of a strategy to increase the students’ motivations and the learning process.3. Students as a Customer vs Students as a PersonLinguistic education and the Humanistic Approach aim to develop the students’ potential and create an autonomous language personality. Therefore, in this chapter, we outline a teaching perspective that considers the student as a person at the centre of teaching and learning Italian process.Part 2In the second part teaching methodologies to improve the quality of teaching and learning Italian language to foreigners are described.4. Effective Cooperative Learning Strategies to Teach Italian as a Foreign LanguageExamples of cooperative learning are given to illustrate how the following teaching methodology is possible in teaching Italian language even if it demands strong research and clear guidance for educators.5. How to Teach Italian Grammar to ForeignersThis chapter examines the existing research about using a deductive form of teaching grammar versus using an inductive form of teaching it.6. Teaching Italian Through Literature, Movies and CartoonsIn this chapter, different media and sources to teach Italian are examined. Using both classic and digital tools, students can explore the Italian language and culture from different points of view, developing a strategy to revisit thinking and to collaborate with others during the reading of classic texts or reading a cartoon.7. Humanistic Testing and Assessment for Italian as a Foreign LanguageFrom a Humanistic point of view, in this chapter, testing and assessment are considered as potential and relevant instruments to measure the progress and performance of individual students of Italian language.8. How to Plan and Use an Environment to Teach Italian to ForeignersThis chapter focuses on learning space to teach Italian to foreigners. The main aim is to provide practical advice and support to the teachers of Italian language schools that are going to explore how to develop and adapt learning spaces to the teaching activities and the students’ needs.
APA, Harvard, Vancouver, ISO, and other styles
8

Metasploit Toolkit for Penetration Testing, Exploit Development, and Vulnerability Research. Elsevier, 2007. http://dx.doi.org/10.1016/b978-1-59749-074-0.x5000-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Foster, James. Metasploit Toolkit for Penetration Testing, Exploit Development, and Vulnerability Research. Syngress, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Megahed, Hamza. Penetration Testing with Shellcode: Detect, exploit, and secure network-level and operating system vulnerabilities. Packt Publishing, 2018.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Exploit testing"

1

Kayacık, Hilmi G., A. Nur Zincir-Heywood, Malcolm I. Heywood, and Stefan Burschka. "Testing Detector Parameterization Using Evolutionary Exploit Generation." In Lecture Notes in Computer Science, 105–10. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-01129-0_13.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Tavazzi, Erica, Camille L. Gerard, Olivier Michielin, Alexandre Wicky, Roberto Gatta, and Michel A. Cuendet. "A Process Mining Approach to Statistical Analysis: Application to a Real-World Advanced Melanoma Dataset." In Lecture Notes in Business Information Processing, 291–304. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-72693-5_22.

Full text
Abstract:
AbstractThanks to its ability to offer a time-oriented perspective on the clinical events that define the patient’s path of care, Process Mining (PM) is assuming an emerging role in clinical data analytics. PM’s ability to exploit time-series data and to build processes without any a priori knowledge suggests interesting synergies with the most common statistical analyses in healthcare, in particular survival analysis. In this work we demonstrate contributions of our process-oriented approach in analyzing a real-world retrospective dataset of patients treated for advanced melanoma at the Lausanne University Hospital. Addressing the clinical questions raised by our oncologists, we integrated PM in almost all the steps of a common statistical analysis. We show: (1) how PM can be leveraged to improve the quality of the data (data cleaning/pre-processing), (2) how PM can provide efficient data visualizations that support and/or suggest clinical hypotheses, also allowing to check the consistency between real and expected processes (descriptive statistics), and (3) how PM can assist in querying or re-expressing the data in terms of pre-defined reference workflows for testing survival differences among sub-cohorts (statistical inference). We exploit a rich set of PM tools for querying the event logs, inspecting the processes using statistical hypothesis testing, and performing conformance checking analyses to identify patterns in patient clinical paths and study the effects of different treatment sequences in our cohort.
APA, Harvard, Vancouver, ISO, and other styles
3

Li, Jianwen, Shufang Zhu, Geguang Pu, and Moshe Y. Vardi. "SAT-Based Explicit LTL Reasoning." In Hardware and Software: Verification and Testing, 209–24. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-26287-1_13.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Kühn, Johannes Maximilian, Oliver Bringmann, and Wolfgang Rosenstiel. "Increasing Reliability Using Adaptive Cross-Layer Techniques in DRPs: Just-Safe-Enough Responses to Reliability Threats." In Dependable Embedded Systems, 121–38. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-52017-5_5.

Full text
Abstract:
AbstractThe developments in the semiconductor industry as predicted by institutions such as the ITRS present a difficult question to hardware and software developers alike: How to implement increasingly complex, power hungry, and critical applications reliably in today’s and tomorrow’s semiconductor technology? The present trend of semiconductor technology is characterized by a sharp increase in complexity, cost, and delicacy. Also, it does not scale along the demands which are still based on and often exceed Moore’s Law. In this chapter, we propose to exploit the architectural redundancies provided by potent, yet energy efficient massively parallel architectures, modeled using Dynamically Reconfigurable Processors (DRP). Using DRPs, we built an extensive cross-layer approach, offering different levels of reliability measures to operating system (OS) and software developers through low-cost hardware redundancy schemes and appropriate physical operating condition tuning. On the hardware side, online testing schemes and error detection are deployed to trigger dynamic remapping to avoid the usage of faulty components. This approach is further complemented through hardware health monitoring that can detect reliability issues such as negative bias temperature instability (NBTI) or hot carrier injection (HCI) before they surface as an error as well as further tuning of operating conditions to delay such phenomena from surfacing.
APA, Harvard, Vancouver, ISO, and other styles
5

Porat, Ely, and Amir Rothschild. "Explicit Non-adaptive Combinatorial Group Testing Schemes." In Automata, Languages and Programming, 748–59. Berlin, Heidelberg: Springer Berlin Heidelberg, 2008. http://dx.doi.org/10.1007/978-3-540-70575-8_61.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Christakis, Maria, Peter Müller, and Valentin Wüstholz. "Collaborative Verification and Testing with Explicit Assumptions." In FM 2012: Formal Methods, 132–46. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-32759-9_13.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Brucker, Achim D., and Burkhart Wolff. "Monadic Sequence Testing and Explicit Test-Refinements." In Tests and Proofs, 17–36. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-41135-4_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Beckert, Bernhard, Sarah Grebing, and Mattias Ulbrich. "An Interaction Concept for Program Verification Systems with Explicit Proof Object." In Hardware and Software: Verification and Testing, 163–78. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-70389-3_11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Rozier, Kristin Yvonne, and Moshe Y. Vardi. "Deterministic Compilation of Temporal Safety Properties in Explicit State Model Checking." In Hardware and Software: Verification and Testing, 243–59. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-39611-3_23.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Isbell, Daniel R., and John Rogers. "Measuring Implicit and Explicit Learning and Knowledge." In The Routledge Handbook of Second Language Acquisition and Language Testing, 305–15. New York: Routledge, 2020. | Series: The Routledge handbooks in second language acquisition: Routledge, 2020. http://dx.doi.org/10.4324/9781351034784-33.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Exploit testing"

1

Darmaillacq, Vianney. "Security policy testing using vulnerability exploit chaining." In 2008 IEEE International Conference on Software Testing Verification and Validation Workshop. IEEE, 2008. http://dx.doi.org/10.1109/icstw.2008.37.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Rodrigues, Gennaro S., Fernanda L. Kastensmidt, Vincent Pouget, and Alberto Bosio. "Performances VS Reliability: how to exploit Approximate Computing for Safety-Critical applications." In 2018 IEEE 24th International Symposium on On-Line Testing And Robust System Design (IOLTS). IEEE, 2018. http://dx.doi.org/10.1109/iolts.2018.8474122.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Iliopoulos, Athanasios, John G. Michopoulos, and John C. Hermanson. "Composite Material Testing Data Reduction to Adjust for the Systematic 6-DoF Testing Machine Aberrations." In ASME 2012 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference. American Society of Mechanical Engineers, 2012. http://dx.doi.org/10.1115/detc2012-71119.

Full text
Abstract:
This paper describes a data reduction methodology for eliminating the systematic aberrations introduced by the unwanted behavior of a multiaxial testing machine, into the massive amounts of experimental data collected from testing of composite material coupons. The machine in reference is a custom made 6-DoF system called NRL66.3 and developed at the NAval Research Laboratory, that consists of multiple sets of hexapod configurations essentially forming a recursive synthesis of multiple parallel mechanisms. Hexapod linkages, the grips, and other deformable parts of the machine absorb energy. This is manifested in an either reversible or irreversible manner, thus introducing a parasitic behavior that is undesirable from the perspective of our ultimate goal of the material constitutive characterization. The data reduction focuses both on the kinematic (pose of the grip) and the reaction (forces and moments) that are critical input quantities of the material characterization process. The kinematic response is reduced by exploitation of the kinematics of the dots used for full field measurements. A correction transformation is identified by solving an inverse problem that minimizes the known displacements at the grips as given by the full field measurements and those given by the machine’s displacement sensors. A Procrustes problem formalism was introduced to exploit a known material behavior tested by the testing machine. Consequently, a correction transformation was established and was applied on the load cell data of the machine in order to eliminate the spurious responses appearing in the force and moment data.
APA, Harvard, Vancouver, ISO, and other styles
4

John, Shaju, Jin-Hyeong Yoo, and Norman M. Wereley. "A Magnetorheological Actuation System: Part I — Testing." In ASME 2007 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference. ASMEDC, 2007. http://dx.doi.org/10.1115/detc2007-35646.

Full text
Abstract:
There is a demand for compact hybrid actuation systems which combines actuation and valving systems in a compact package. Such self-contained actuation systems have potential applications in the field of rotorcraft (as active pitch links) and automotive engineering (as active vibration control devices). Hybrid hydraulic actuation systems, based on frequency rectification of the high frequency motion of an active material, can be used to exploit the high bandwidth of smart material to design devices with high force and stroke. Magnetorheological (MR) fluids are active fluids whose viscosity can be changed through the application of a magnetic field. By using MR fluids as the hydraulic fluid in such hybrid devices, a valving system with no moving parts can be implemented. Such a system will be attractive in rotorcraft applications with large centrifugal force loading. Thus, MR fluids can be used to control the motion of an output cylinder. The MR fluid based valves can be configured in the form of a Wheatstone bridge to produce bi-directional motion in an output cylinder by alternately applying a magnetic field in the two arms of the bridge. In this study, the actuation is performed using a compact Terfenol-D stack driven actuator. The frequency rectification of the stack motion is done using reed valves. This actuator and valve configuration form a compact hydraulic system with fluidic valves. The advantages of such systems are that part count is low, absence of moving parts and the possibility of continuous controllability of the output cylinder. By applying varying magnetic fields in the arms of the bridge (by applying different currents to the coils), the differential pressure acting on the output cylinder can be controlled. The description of the experimental setup, the tests performed and the experimental results are presented in this paper.
APA, Harvard, Vancouver, ISO, and other styles
5

Schwartz, Christian J., and Shyam Bahadur. "Development of a Novel Wear Testing Device for the Investigation of Articular Cartilage and Compliant Polymers for Use in Biomedical Implants." In World Tribology Congress III. ASMEDC, 2005. http://dx.doi.org/10.1115/wtc2005-63370.

Full text
Abstract:
Development of new biomaterials for use on the articulating surfaces of total-joint implants is essential to the improvement of implant design and implant lifetimes. Currently, rigid ultra-high molecular weight polyethylene (UHMWPE) is the most commonly used material for implant wear surfaces because of its high wear resistance. However, UHMWPE does not mimic the properties of native articular cartilage, nor does it exploit the full potential of ambient synovial fluid for joint lubrication. Furthermore, implant loosening due to the body’s reaction to UHMWPE particulate is a leading reason for the limited lifetimes of such implants [1]. A new approach is needed in order to increase the pain-free lifetime for those persons requiring total-joint arthroplasty. Such an approach will likely involve synthetic or natural materials with properties that more closely resemble natural articular cartilage.
APA, Harvard, Vancouver, ISO, and other styles
6

Gerber, Andrew G., Kevin W. Wilcox, and Jian T. Zhang. "Benchmarking of a Massively Parallel Hybrid CFD Solver for Ocean Applications." In ASME 2013 32nd International Conference on Ocean, Offshore and Arctic Engineering. American Society of Mechanical Engineers, 2013. http://dx.doi.org/10.1115/omae2013-10999.

Full text
Abstract:
This paper presents progress on the development of a CFD program called EXN/Aero specifically designed to exploit performance gains from new hybrid multicore-manycore computer architectures. The hybrid multicore-manycore design is outlined along with performance and validation testing on an underwater vehicle and unsteady vortex shedding applications. It is shown that by revisiting CFD code design with a view to a number of important trends in the high performance computing industry, significant order of magnitude gains in computational power can be achieved.
APA, Harvard, Vancouver, ISO, and other styles
7

Zhang, Meishan, Guohong Fu, and Nan Yu. "Segmenting Chinese Microtext: Joint Informal-Word Detection and Segmentation with Neural Networks." In Twenty-Sixth International Joint Conference on Artificial Intelligence. California: International Joint Conferences on Artificial Intelligence Organization, 2017. http://dx.doi.org/10.24963/ijcai.2017/591.

Full text
Abstract:
State-of-the-art Chinese word segmentation systems typically exploit supervised modelstrained on a standard manually-annotated corpus,achieving performances over 95% on a similar standard testing corpus.However, the performances may drop significantly when the same models are applied onto Chinese microtext.One major challenge is the issue of informal words in the microtext.Previous studies show that informal word detection can be helpful for microtext processing.In this work, we investigate it under the neural setting, by proposing a joint segmentation model that integrates the detection of informal words simultaneously.In addition, we generate training corpus for the joint model by using existing corpus automatically.Experimental results show that the proposed model is highly effective for segmentation of Chinese microtext.
APA, Harvard, Vancouver, ISO, and other styles
8

Seely, Brian J., Karl M. Kapp, Larraine A. Kapka, and Steven Wendel. "Enhancing Interpretation of Learned Concepts Through an Online Tensile Strength Simulation." In ASME 2017 International Mechanical Engineering Congress and Exposition. American Society of Mechanical Engineers, 2017. http://dx.doi.org/10.1115/imece2017-70445.

Full text
Abstract:
This NSF funded project was a collaborative research effort that focused on the development and implementation of an open source, online virtual tensile strength testing simulation. The simulation was designed to emphasize the equations used as part of tensile testing rather than solely on the use of the tensile testing equipment. The resulting simulator was utilized by engineering technology and engineering students in higher education as well as pre-engineering high school students in the Project Lead The Way network. The research tested whether or not an online learning simulation can be effective for tensile testing instruction. The developed simulation was designed to focus on and exploit concepts to enhance student ability of interpreting the resultant stress-strain curve by applying mathematical concepts of graphing, predicting and applied knowledge of material properties. Further, the open source tool was developed with a prepare, practice, perform framework allowing students with different knowledge sets to choose the most appropriate level of scaffolding to match their comfort level, enhancing self-efficacy. Analysis of the gathered results of each learner for the pre- and post-test showed a significant improvement after the experience, the pre-test mean score was 53.16 points, while the post-test mean was 72.42 (out of 80), suggesting the online learning simulation had a positive effect on learning. This project has since expanded tensile testing to include hardness and impact testing. Final results will be presented for all three testing methods using both high school and college students as test subjects comparing pre- and post-test results.
APA, Harvard, Vancouver, ISO, and other styles
9

Yang, Bozhi, and Qiao Lin. "Planar Microfabricated Check Valves Utilizing Large Compliance of PDMS." In ASME 2005 International Mechanical Engineering Congress and Exposition. ASMEDC, 2005. http://dx.doi.org/10.1115/imece2005-81958.

Full text
Abstract:
This paper presents three types of planar check valves that uniquely exploit the large compliance of simple PDMS structures. The micro check valves consist of a thin compliant flap and a rigid stopper embedded in a microchannel. The flap is perpendicular to the flow and lies near the stopper, forming a restricted fluid path inside the channel. In particular, a novel “zero flap-stopper gap” valve design was proposed and fabricated using a special technique, in which the flap and stopper are in contact naturally forming a normally-closed device with high diodicity. Testing results show that the check valves can achieve a diodicity up to 105. The check valves can be fabricated using the standard replica molding technique from PDMS, and thus are highly amenable to integration with other PDMS-based microfluidic systems.
APA, Harvard, Vancouver, ISO, and other styles
10

Emam, Samir A., Jared Hobeck, and Daniel J. Inman. "Experimental Study of Nonlinear Vibration Energy Harvesting of a Bistable Composite Laminate." In ASME 2017 Conference on Smart Materials, Adaptive Structures and Intelligent Systems. American Society of Mechanical Engineers, 2017. http://dx.doi.org/10.1115/smasis2017-3717.

Full text
Abstract:
This study is at attempt to explore the nonlinear behavior of bistable composite laminates for vibration energy harvesting. Asymmetric four-ply [0/90/0/90] carbon-fiber plate with two cylindrical stable equilibria supported at its center and free at all boundaries is used for the experimental testing. Macro-fiber composite (MFC) patches are attached to the plate to transform the mechanical vibration energy into electrical energy. The mechanical bistable property of the plate makes it possible to snap from one stable equilibrium state to the other. This snapthrough motion is highly nonlinear and associated with large-amplitude vibrations. The experimental tests aim at exploiting the nonlinearity due to the snapthrough motion to enhance the energy extraction. First, the resonant frequencies and damping of the plate are identified. A primary-resonance excitations of the first mode are carried out using two schemes: amplitude sweep and frequency sweep. In the first case, amplitude sweep, the excitation frequency is kept fixed at the resonant frequency and the amplitude of excitation is increased. The time history and FFT of the response as well as the output voltage are measured and reported. In the second case, frequency sweep, the excitation frequency is varied around the resonant frequency while the excitation amplitude is kept fixed. In both cases, the response shows a small-amplitude single-well vibrations at low excitation amplitudes and chaotic and periodic snapthrough motion as the amplitude and frequency of excitation are varied. The snapthrough motion has been found to greatly enhance the energy extraction capability. This study can serve as a motive for more testing and modeling efforts in order to understand the complex nonlinear behavior of bistable composite laminates and exploit it for vibration energy harvesting.
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Exploit testing"

1

Sen, Koushik, and Gul Agha. CUTE and jCUTE: Concolic Unit Testing and Explicit Path Model-Checking Tools (Tools Paper). Fort Belvoir, VA: Defense Technical Information Center, January 2006. http://dx.doi.org/10.21236/ada484701.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Clausen, Jay, D. Moore, L. Cain, and K. Malinowski. VI preferential pathways : rule or exception. Engineer Research and Development Center (U.S.), July 2021. http://dx.doi.org/10.21079/11681/41305.

Full text
Abstract:
Trichloroethylene (TCE) releases from leaks and spills next to a large government building occurred over several decades with the most recent event occurring 20 years ago. In response to a perceived conventional vapor intrusion (VI) issue a sub-slab depressurization system (SSDS) was installed 6 years ago. The SSDS is operating within design limits and has achieved building TCE vapor concentration reductions. However, subsequent periodic TCE vapor spikes based on daily HAPSITE™ measurements indicate additional source(s). Two rounds of smoke tests conducted in 2017 and 2018 involved introduction of smoke into a sanitary sewer and storm drain manholes located on effluent lines coming from the building until smoke was observed exiting system vents on the roof. Smoke testing revealed many leaks in both the storm sewer and sanitary sewer systems within the building. Sleuthing of the VI source term using a portable HAPSITE™ indicate elevated vapor TCE levels correspond with observed smoke emanation from utility lines. In some instances, smoke odors were perceived but no leak or suspect pipe was identified suggesting the odor originates from an unidentified pipe located behind or enclosed in a wall. Sleuthing activities also found building roof materials explain some of the elevated TCE levels on the 2nd floor. A relationship was found between TCE concentrations in the roof truss area, plenum space above 2nd floor offices, and breathing zone of 2nd floor offices. Installation of an external blower in the roof truss space has greatly reduced TCE levels in the plenum and office spaces. Preferential VI pathways and unexpected source terms may be overlooked mechanisms as compared to conventional VI.
APA, Harvard, Vancouver, ISO, and other styles
3

Chornodon, Myroslava. FEAUTURES OF GENDER IN MODERN MASS MEDIA. Ivan Franko National University of Lviv, February 2021. http://dx.doi.org/10.30970/vjo.2021.49.11064.

Full text
Abstract:
The article clarifies of gender identity stereotypes in modern media. The main gender stereotypes covered in modern mass media are analyzed and refuted. The model of gender relations in the media is reflected mainly in the stereotypical images of men and woman. The features of the use of gender concepts in modern periodicals for women and men were determined. The most frequently used derivatives of these macroconcepts were identified and analyzed in detail. It has been found that publications for women and men are full of various gender concepts that are used in different contexts. Ingeneral, theanalysisofthe concept-maximums and concept-minimum gender and their characteristics is carried out in the context of gender stereotypes that have been forme dand function in the society, system atizing the a ctual presentations. The study of the gender concept is relevant because it reveals new trends and features of modern gender images. Taking into account the special features of gender-labeled periodicals in general and the practical absence of comprehensive scientific studies of the gender concept in particular, there is a need to supplement Ukrainian science with this topic. Gender psychology, which is served by methods of various sciences, primarily sociological, pedagogical, linguistic, psychological, socio-psychological. Let us pay attention to linguistic and psycholinguistic methods in gender studies. Linguistic methods complement intelligence research tasks, associated with speech, word and text. Psycholinguistic methods used in gender psychology (semantic differential, semantic integral, semantic analysis of words and texts), aimed at studying speech messages, specific mechanisms of origin and perception, functions of speech activity in society, studying the relationship between speech messages and gender properties participants in the communication, to analyze the linguistic development in connection with the general development of the individual. Nowhere in gender practice there is the whole arsenal of psychological methods that allow you to explore psychological peculiarities of a person like observation, experiments, questionnaires, interviews, testing, modeling, etc. The methods of psychological self-diagnostics include: the gender aspect of the own socio-psychological portrait, a gender biography as a variant of the biographical method, aimed at the reconstruction of individual social experience. In the process of writing a gender autobiography, a person can understand the characteristics of his gender identity, as well as ways and means of their formation. Socio-psychological methods of studying gender include the study of socially constructed women’s and men’s roles, relationships and identities, sexual characteristics, psychological characteristics, etc. The use of gender indicators and gender approaches as a means of socio-psychological and sociological analysis broadens the subject boundaries of these disciplines and makes them the subject of study within these disciplines. And also, in the article a combination of concrete-historical, structural-typological, system-functional methods is implemented. Descriptive and comparative methods, method of typology, modeling are used. Also used is a method of content analysis for the study of gender content of modern gender-stamped journals. It was he who allowed quantitatively to identify and explore the features of the gender concept in the pages of periodicals for women and men. A combination of historical, structural-typological, system-functional methods is also implemented in the article. Descriptive and comparative methods, method of typology, modeling are used. A method of content analysis for the study of gender content of modern gender-labeled journals is also used. It allowed to identify and explore the features of the gender concept quantitatively in the periodicals for women and men. The conceptual perception and interpretation of the gender concept «woman», which is highlighted in the modern gender-labeled press in Ukraine, requires the elaboration of the polyfunctionality of gender interpretations, the comprehension of the metaphorical perception of this image and its role and purpose in society. A gendered approach to researching the gender content of contemporary periodicals for women and men. Conceptual analysis of contemporary gender-stamped publications within the gender conceptual sphere allows to identify and correlate the meta-gender and gender concepts that appear in society.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography