Academic literature on the topic 'Exploit testing'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Exploit testing.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Exploit testing"
Deng, Fenglei, Jian Wang, Bin Zhang, Chao Feng, Zhiyuan Jiang, and Yunfei Su. "A Pattern-Based Software Testing Framework for Exploitability Evaluation of Metadata Corruption Vulnerabilities." Scientific Programming 2020 (September 27, 2020): 1–21. http://dx.doi.org/10.1155/2020/8883746.
Full textNarayana Rao, T. Venkat, and Vemula Shravan. "Metasploit Unleashed Tool for Penetration Testing." International Journal on Recent and Innovation Trends in Computing and Communication 7, no. 4 (April 26, 2019): 16–20. http://dx.doi.org/10.17762/ijritcc.v7i4.5285.
Full textMason, G. J. "CONTRAFREELOADING IN STARLINGS: TESTING THE INFORMATION HYPOTHESIS." Behaviour 136, no. 10-11 (1999): 1267–82. http://dx.doi.org/10.1163/156853999500712.
Full textBarone, Guglielmo, Francesco D'Acunto, and Gaia Narciso. "Telecracy: Testing for Channels of Persuasion." American Economic Journal: Economic Policy 7, no. 2 (May 1, 2015): 30–60. http://dx.doi.org/10.1257/pol.20130318.
Full textBin Khalid, Hasnan, and Budi Saesar Luhur. "Kinematic-Dynamic Modeling and Test Control of Tracked Drive Vehicle for Indoor Mapping." Applied Mechanics and Materials 148-149 (December 2011): 1510–13. http://dx.doi.org/10.4028/www.scientific.net/amm.148-149.1510.
Full textBergström, Gunnar, Jonas Christoffersson, Kristin Schwanke, Robert Zweigerdt, and Carl-Fredrik Mandenius. "Stem cell derived in vivo-like human cardiac bodies in a microfluidic device for toxicity testing by beating frequency imaging." Lab on a Chip 15, no. 15 (2015): 3242–49. http://dx.doi.org/10.1039/c5lc00449g.
Full textPedersen, Rasmus Søndergaard, and Anders Rahbek. "TESTING GARCH-X TYPE MODELS." Econometric Theory 35, no. 05 (October 18, 2018): 1012–47. http://dx.doi.org/10.1017/s026646661800035x.
Full textLakshmiSupraja, K. "Sneaking into Mobile." International Journal for Research in Applied Science and Engineering Technology 9, no. VI (June 30, 2021): 5107–17. http://dx.doi.org/10.22214/ijraset.2021.36042.
Full textSLOAN, JOHN C., and TAGHI M. KHOSHGOFTAAR. "TESTING AND FORMAL VERIFICATION OF SERVICE ORIENTED ARCHITECTURES." International Journal of Reliability, Quality and Safety Engineering 16, no. 02 (April 2009): 137–62. http://dx.doi.org/10.1142/s0218539309003332.
Full textSeong, Jin-Taek. "Group Testing-Based Robust Algorithm for Diagnosis of COVID-19." Diagnostics 10, no. 6 (June 11, 2020): 396. http://dx.doi.org/10.3390/diagnostics10060396.
Full textDissertations / Theses on the topic "Exploit testing"
Flansburg, Kevin. "A framework for automated management of exploit testing environments." Thesis, Georgia Institute of Technology, 2015. http://hdl.handle.net/1853/54912.
Full textVernersson, Susanne. "Penetration Testing in a Web Application Environment." Thesis, Linnéuniversitetet, Institutionen för datavetenskap, fysik och matematik, DFM, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-8934.
Full textKahlström, Joakim, and Johan Hedlin. "Automating software installation for cyber security research and testing public exploits in CRATE." Thesis, Linköpings universitet, Databas och informationsteknik, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-177401.
Full textAndersson, Gustaf, and Fredrik Andersson. "Android Environment Security." Thesis, Linnéuniversitetet, Institutionen för datavetenskap, fysik och matematik, DFM, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-20512.
Full textBahabanian, Olivier. "Explicit deconvolution of wellbore storage distorted well test data." Texas A&M University, 2006. http://hdl.handle.net/1969.1/4811.
Full textMcNiel, Patrick D. "Implicit and explicit measures." Thesis, Atlanta, Ga. : Georgia Institute of Technology, 2009. http://hdl.handle.net/1853/28132.
Full textCollier, Benjamin Lee. "DOES OPTIMISM EXPLAIN HOW RELIGIOUSNESS AFFECTS ALCOHOL USE AMONG COLLEGE STUDENTS?" UKnowledge, 2006. http://uknowledge.uky.edu/gradschool_theses/398.
Full textAndersson, Daniel, and Fredrik Saliba. "Virtual testing of self-piercing rivet connections." Thesis, Luleå tekniska universitet, Institutionen för teknikvetenskap och matematik, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-79405.
Full textLiang, Yuli. "Contributions to Estimation and Testing Block Covariance Structures in Multivariate Normal Models." Doctoral thesis, Stockholms universitet, Statistiska institutionen, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:su:diva-115347.
Full textPillai, Anil Ph D. "Retreating from the Nuclear Path Testing the theory of Prudential Realism to explain Nuclear Forbearance." University of Cincinnati / OhioLINK, 2012. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1342103267.
Full textBooks on the topic "Exploit testing"
Maynor, David. Metasploit toolkit for penetration testing, exploit development, and vulnerability research. Burlington, MA: Syngress, 2007.
Find full textMaynor, David. Metasploit toolkit for penetration testing, exploit development, and vulnerability research. Burlington, MA: Syngress, 2007.
Find full textImplicit and explicit knowledge in second language learning, testing and teaching. Buffalo: Multilingual Matters, 2009.
Find full textACT, PLAN, EXPLORE: Mathematics victory : Classroom text. 3rd ed. Des Plaines, Ill: Cambridge Publishing, 2008.
Find full textBlau, Francine D. Do cognitive test scores explain higher US wage inequality? Cambridge, MA: National Bureau of Economic Research, 2001.
Find full textUnited States. Office of Educational Research and Improvement., National Center for Education Statistics., and National Assessment of Educational Progress (Project), eds. Using HLM and NAEP data to explore school correlates of 1990 mathematics and geometry achievement in grades 4, 8, and 12: Methodology and results. [Washington, D.C.]: U.S. Dept. of Education, Office of Educational Research and Improvement, 1995.
Find full textMaugeri, Giuseppe. L’insegnamento dell’italiano a stranieri Alcune coordinate di riferimento per gli anni Venti. Venice: Fondazione Università Ca’ Foscari, 2021. http://dx.doi.org/10.30687/978-88-6969-523-0.
Full textMetasploit Toolkit for Penetration Testing, Exploit Development, and Vulnerability Research. Elsevier, 2007. http://dx.doi.org/10.1016/b978-1-59749-074-0.x5000-4.
Full textFoster, James. Metasploit Toolkit for Penetration Testing, Exploit Development, and Vulnerability Research. Syngress, 2007.
Find full textMegahed, Hamza. Penetration Testing with Shellcode: Detect, exploit, and secure network-level and operating system vulnerabilities. Packt Publishing, 2018.
Find full textBook chapters on the topic "Exploit testing"
Kayacık, Hilmi G., A. Nur Zincir-Heywood, Malcolm I. Heywood, and Stefan Burschka. "Testing Detector Parameterization Using Evolutionary Exploit Generation." In Lecture Notes in Computer Science, 105–10. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-01129-0_13.
Full textTavazzi, Erica, Camille L. Gerard, Olivier Michielin, Alexandre Wicky, Roberto Gatta, and Michel A. Cuendet. "A Process Mining Approach to Statistical Analysis: Application to a Real-World Advanced Melanoma Dataset." In Lecture Notes in Business Information Processing, 291–304. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-72693-5_22.
Full textLi, Jianwen, Shufang Zhu, Geguang Pu, and Moshe Y. Vardi. "SAT-Based Explicit LTL Reasoning." In Hardware and Software: Verification and Testing, 209–24. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-26287-1_13.
Full textKühn, Johannes Maximilian, Oliver Bringmann, and Wolfgang Rosenstiel. "Increasing Reliability Using Adaptive Cross-Layer Techniques in DRPs: Just-Safe-Enough Responses to Reliability Threats." In Dependable Embedded Systems, 121–38. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-52017-5_5.
Full textPorat, Ely, and Amir Rothschild. "Explicit Non-adaptive Combinatorial Group Testing Schemes." In Automata, Languages and Programming, 748–59. Berlin, Heidelberg: Springer Berlin Heidelberg, 2008. http://dx.doi.org/10.1007/978-3-540-70575-8_61.
Full textChristakis, Maria, Peter Müller, and Valentin Wüstholz. "Collaborative Verification and Testing with Explicit Assumptions." In FM 2012: Formal Methods, 132–46. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-32759-9_13.
Full textBrucker, Achim D., and Burkhart Wolff. "Monadic Sequence Testing and Explicit Test-Refinements." In Tests and Proofs, 17–36. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-41135-4_2.
Full textBeckert, Bernhard, Sarah Grebing, and Mattias Ulbrich. "An Interaction Concept for Program Verification Systems with Explicit Proof Object." In Hardware and Software: Verification and Testing, 163–78. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-70389-3_11.
Full textRozier, Kristin Yvonne, and Moshe Y. Vardi. "Deterministic Compilation of Temporal Safety Properties in Explicit State Model Checking." In Hardware and Software: Verification and Testing, 243–59. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-39611-3_23.
Full textIsbell, Daniel R., and John Rogers. "Measuring Implicit and Explicit Learning and Knowledge." In The Routledge Handbook of Second Language Acquisition and Language Testing, 305–15. New York: Routledge, 2020. | Series: The Routledge handbooks in second language acquisition: Routledge, 2020. http://dx.doi.org/10.4324/9781351034784-33.
Full textConference papers on the topic "Exploit testing"
Darmaillacq, Vianney. "Security policy testing using vulnerability exploit chaining." In 2008 IEEE International Conference on Software Testing Verification and Validation Workshop. IEEE, 2008. http://dx.doi.org/10.1109/icstw.2008.37.
Full textRodrigues, Gennaro S., Fernanda L. Kastensmidt, Vincent Pouget, and Alberto Bosio. "Performances VS Reliability: how to exploit Approximate Computing for Safety-Critical applications." In 2018 IEEE 24th International Symposium on On-Line Testing And Robust System Design (IOLTS). IEEE, 2018. http://dx.doi.org/10.1109/iolts.2018.8474122.
Full textIliopoulos, Athanasios, John G. Michopoulos, and John C. Hermanson. "Composite Material Testing Data Reduction to Adjust for the Systematic 6-DoF Testing Machine Aberrations." In ASME 2012 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference. American Society of Mechanical Engineers, 2012. http://dx.doi.org/10.1115/detc2012-71119.
Full textJohn, Shaju, Jin-Hyeong Yoo, and Norman M. Wereley. "A Magnetorheological Actuation System: Part I — Testing." In ASME 2007 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference. ASMEDC, 2007. http://dx.doi.org/10.1115/detc2007-35646.
Full textSchwartz, Christian J., and Shyam Bahadur. "Development of a Novel Wear Testing Device for the Investigation of Articular Cartilage and Compliant Polymers for Use in Biomedical Implants." In World Tribology Congress III. ASMEDC, 2005. http://dx.doi.org/10.1115/wtc2005-63370.
Full textGerber, Andrew G., Kevin W. Wilcox, and Jian T. Zhang. "Benchmarking of a Massively Parallel Hybrid CFD Solver for Ocean Applications." In ASME 2013 32nd International Conference on Ocean, Offshore and Arctic Engineering. American Society of Mechanical Engineers, 2013. http://dx.doi.org/10.1115/omae2013-10999.
Full textZhang, Meishan, Guohong Fu, and Nan Yu. "Segmenting Chinese Microtext: Joint Informal-Word Detection and Segmentation with Neural Networks." In Twenty-Sixth International Joint Conference on Artificial Intelligence. California: International Joint Conferences on Artificial Intelligence Organization, 2017. http://dx.doi.org/10.24963/ijcai.2017/591.
Full textSeely, Brian J., Karl M. Kapp, Larraine A. Kapka, and Steven Wendel. "Enhancing Interpretation of Learned Concepts Through an Online Tensile Strength Simulation." In ASME 2017 International Mechanical Engineering Congress and Exposition. American Society of Mechanical Engineers, 2017. http://dx.doi.org/10.1115/imece2017-70445.
Full textYang, Bozhi, and Qiao Lin. "Planar Microfabricated Check Valves Utilizing Large Compliance of PDMS." In ASME 2005 International Mechanical Engineering Congress and Exposition. ASMEDC, 2005. http://dx.doi.org/10.1115/imece2005-81958.
Full textEmam, Samir A., Jared Hobeck, and Daniel J. Inman. "Experimental Study of Nonlinear Vibration Energy Harvesting of a Bistable Composite Laminate." In ASME 2017 Conference on Smart Materials, Adaptive Structures and Intelligent Systems. American Society of Mechanical Engineers, 2017. http://dx.doi.org/10.1115/smasis2017-3717.
Full textReports on the topic "Exploit testing"
Sen, Koushik, and Gul Agha. CUTE and jCUTE: Concolic Unit Testing and Explicit Path Model-Checking Tools (Tools Paper). Fort Belvoir, VA: Defense Technical Information Center, January 2006. http://dx.doi.org/10.21236/ada484701.
Full textClausen, Jay, D. Moore, L. Cain, and K. Malinowski. VI preferential pathways : rule or exception. Engineer Research and Development Center (U.S.), July 2021. http://dx.doi.org/10.21079/11681/41305.
Full textChornodon, Myroslava. FEAUTURES OF GENDER IN MODERN MASS MEDIA. Ivan Franko National University of Lviv, February 2021. http://dx.doi.org/10.30970/vjo.2021.49.11064.
Full text