Journal articles on the topic 'Exploit testing'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Exploit testing.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Deng, Fenglei, Jian Wang, Bin Zhang, Chao Feng, Zhiyuan Jiang, and Yunfei Su. "A Pattern-Based Software Testing Framework for Exploitability Evaluation of Metadata Corruption Vulnerabilities." Scientific Programming 2020 (September 27, 2020): 1–21. http://dx.doi.org/10.1155/2020/8883746.
Full textNarayana Rao, T. Venkat, and Vemula Shravan. "Metasploit Unleashed Tool for Penetration Testing." International Journal on Recent and Innovation Trends in Computing and Communication 7, no. 4 (April 26, 2019): 16–20. http://dx.doi.org/10.17762/ijritcc.v7i4.5285.
Full textMason, G. J. "CONTRAFREELOADING IN STARLINGS: TESTING THE INFORMATION HYPOTHESIS." Behaviour 136, no. 10-11 (1999): 1267–82. http://dx.doi.org/10.1163/156853999500712.
Full textBarone, Guglielmo, Francesco D'Acunto, and Gaia Narciso. "Telecracy: Testing for Channels of Persuasion." American Economic Journal: Economic Policy 7, no. 2 (May 1, 2015): 30–60. http://dx.doi.org/10.1257/pol.20130318.
Full textBin Khalid, Hasnan, and Budi Saesar Luhur. "Kinematic-Dynamic Modeling and Test Control of Tracked Drive Vehicle for Indoor Mapping." Applied Mechanics and Materials 148-149 (December 2011): 1510–13. http://dx.doi.org/10.4028/www.scientific.net/amm.148-149.1510.
Full textBergström, Gunnar, Jonas Christoffersson, Kristin Schwanke, Robert Zweigerdt, and Carl-Fredrik Mandenius. "Stem cell derived in vivo-like human cardiac bodies in a microfluidic device for toxicity testing by beating frequency imaging." Lab on a Chip 15, no. 15 (2015): 3242–49. http://dx.doi.org/10.1039/c5lc00449g.
Full textPedersen, Rasmus Søndergaard, and Anders Rahbek. "TESTING GARCH-X TYPE MODELS." Econometric Theory 35, no. 05 (October 18, 2018): 1012–47. http://dx.doi.org/10.1017/s026646661800035x.
Full textLakshmiSupraja, K. "Sneaking into Mobile." International Journal for Research in Applied Science and Engineering Technology 9, no. VI (June 30, 2021): 5107–17. http://dx.doi.org/10.22214/ijraset.2021.36042.
Full textSLOAN, JOHN C., and TAGHI M. KHOSHGOFTAAR. "TESTING AND FORMAL VERIFICATION OF SERVICE ORIENTED ARCHITECTURES." International Journal of Reliability, Quality and Safety Engineering 16, no. 02 (April 2009): 137–62. http://dx.doi.org/10.1142/s0218539309003332.
Full textSeong, Jin-Taek. "Group Testing-Based Robust Algorithm for Diagnosis of COVID-19." Diagnostics 10, no. 6 (June 11, 2020): 396. http://dx.doi.org/10.3390/diagnostics10060396.
Full textMaitra, Arpita, Bibhas Adhikari, and Satyabrata Adhikari. "Proposal for dimensionality testing in QPQ." Quantum Information and Computation 18, no. 13&14 (November 2018): 1125–42. http://dx.doi.org/10.26421/qic18.13-14-4.
Full textSingh, Mandeep, Sunny Kumar, Tushant Garg, and Niranjan Pandey. "Penetration Testing on Metasploitable 2." International Journal of Engineering and Computer Science 9, no. 05 (May 10, 2020): 25014–22. http://dx.doi.org/10.18535/ijecs/v9i05.4476.
Full textBernhofen, Daniel M., and John C. Brown. "Testing the General Validity of the Heckscher-Ohlin Theorem." American Economic Journal: Microeconomics 8, no. 4 (November 1, 2016): 54–90. http://dx.doi.org/10.1257/mic.20130126.
Full textKaraki, Youmna Shawki, Halina Kaubasa, and Nick Ivanov. "Normality Testing for Vectors on Perceptron Layers." European Journal of Engineering Research and Science 5, no. 9 (September 11, 2020): 1085–88. http://dx.doi.org/10.24018/ejers.2020.5.9.2090.
Full textAndria, Andria, and Ridho Pamungkas. "Penetration Testing Database Menggunakan Metode SQL Injection Via SQLMap di Termux." Indonesian Journal of Applied Informatics 5, no. 1 (April 18, 2021): 1. http://dx.doi.org/10.20961/ijai.v5i1.40845.
Full textLohano, Heman D., Fateh M. Mari, and Rajab A. Memon. "Testing Onion Market Integration in Pakistan." Pakistan Development Review 44, no. 4II (December 1, 2005): 717–28. http://dx.doi.org/10.30541/v44i4iipp.717-728.
Full textChen, Jia-Wei, Rongfang Wang, Fan Ding, Bo Liu, Licheng Jiao, and Jie Zhang. "A Convolutional Neural Network with Parallel Multi-Scale Spatial Pooling to Detect Temporal Changes in SAR Images." Remote Sensing 12, no. 10 (May 19, 2020): 1619. http://dx.doi.org/10.3390/rs12101619.
Full textGUO, PENGFEI, and ALWELL JULIUS OYET. "ON WAVELET METHODS FOR TESTING EQUALITY OF MEAN RESPONSE CURVES." International Journal of Wavelets, Multiresolution and Information Processing 07, no. 03 (May 2009): 357–73. http://dx.doi.org/10.1142/s0219691309002969.
Full textChan, Derek C. K., and Lori L. Burrows. "Thiocillin and micrococcin exploit the ferrioxamine receptor of Pseudomonas aeruginosa for uptake." Journal of Antimicrobial Chemotherapy 76, no. 8 (April 28, 2021): 2029–39. http://dx.doi.org/10.1093/jac/dkab124.
Full textLucchesi, David, Luciano Anselmo, Massimo Bassan, Marco Lucente, Carmelo Magnafico, Carmen Pardini, Roberto Peron, Giuseppe Pucacco, and Massimo Visco. "Testing General Relativity vs. Alternative Theories of Gravitation with the SaToR-G Experiment." Physical Sciences Forum 2, no. 1 (February 22, 2021): 52. http://dx.doi.org/10.3390/ecu2021-09274.
Full textVeronesi, Umberto, Thilo Rehren, Beverly Straube, and Marcos Martinón-Torres. "Testing the New World: early modern chemistry and mineral prospection at colonial Jamestown, 1607–1610." Archaeological and Anthropological Sciences 11, no. 12 (November 19, 2019): 6851–64. http://dx.doi.org/10.1007/s12520-019-00945-x.
Full textDatta, Avimanyu. "IT-Based Knowledge Capability and Commercialization of Innovations." International Journal of Knowledge Management 8, no. 3 (July 2012): 83–97. http://dx.doi.org/10.4018/jkm.2012070105.
Full textHilbig, Benjamin E., Pascal J. Kieslich, Felix Henninger, Isabel Thielmann, and Ingo Zettler. "Lead Us (Not) into Temptation: Testing the Motivational Mechanisms Linking Honesty–Humility to Cooperation." European Journal of Personality 32, no. 2 (March 2018): 116–27. http://dx.doi.org/10.1002/per.2149.
Full textSaidala, Ravi Kumar, and Nagaraju Devarakonda. "A Novel Chaotic Northern Bald Ibis Optimization Algorithm for Solving Different Cluster Problems [ICCICC18 #155]." International Journal of Software Science and Computational Intelligence 11, no. 2 (April 2019): 1–25. http://dx.doi.org/10.4018/ijssci.2019040101.
Full textTesárek, Pavel, Lukáš Novák, Jaroslav Topič, Zdeněk Prošek, Václav Nežerka, and Martin Lidmila. "Compression Testing of Gypsum-Based Composite Reinforced by Recycled Wires from Automobile Tires." Applied Mechanics and Materials 732 (February 2015): 393–96. http://dx.doi.org/10.4028/www.scientific.net/amm.732.393.
Full textSiva Prasad, K., Dr K. Raja Sekhar, and Dr P. Rajarajeswari. "An Integrated Approach Towards Vulnerability Assessment & Penetration Testing for a Web Application." International Journal of Engineering & Technology 7, no. 2.32 (May 31, 2018): 431. http://dx.doi.org/10.14419/ijet.v7i2.32.15733.
Full textPeng, Xiang Hua, Ying She Luo, Jing Ye Zhou, Min Yu, and Tao Luo. "Research on Creep Constitutive Model of TC11 Titanium Alloy Based on RBFNN." Materials Science Forum 575-578 (April 2008): 1050–55. http://dx.doi.org/10.4028/www.scientific.net/msf.575-578.1050.
Full textSahren, Sahren, Ruri Ashari Dalimuthe, and Muhammad Amin. "Penetration Testing Untuk Deteksi Vulnerability Sistem Informasi Kampus." Prosiding Seminar Nasional Riset Information Science (SENARIS) 1 (September 30, 2019): 994. http://dx.doi.org/10.30645/senaris.v1i0.109.
Full textLucchesi, David, Luciano Anselmo, Massimo Bassan, Marco Lucente, Carmelo Magnafico, Carmen Pardini, Roberto Peron, Giuseppe Pucacco, and Massimo Visco. "Testing Gravitational Theories in the Field of the Earth with the SaToR-G Experiment." Universe 7, no. 6 (June 8, 2021): 192. http://dx.doi.org/10.3390/universe7060192.
Full textAwdeh, Ali. "Monetary Policy and Economic Growth in Lebanon." Journal of Central Banking Theory and Practice 8, no. 2 (May 1, 2019): 147–71. http://dx.doi.org/10.2478/jcbtp-2019-0018.
Full textGinting, Jusia Amanda, and I. Gusti Gusti Ngurah Suryantara. "PENGUJIAN KERENTANAN SISTEM DENGAN MENGGUNAKAN METODE PENETRATION TESTING DI UNIVERSITAS XYZ." Infotech: Journal of Technology Information 7, no. 1 (June 30, 2021): 41–46. http://dx.doi.org/10.37365/jti.v7i1.105.
Full textFang, Zheng, and Juwon Seo. "A Projection Framework for Testing Shape Restrictions That Form Convex Cones." Econometrica 89, no. 5 (2021): 2439–58. http://dx.doi.org/10.3982/ecta17764.
Full textRamsingh, Chelsea, and Paolina Centonze. "Program Analysis For Database Injections." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 16, no. 6 (September 16, 2017): 6977–86. http://dx.doi.org/10.24297/ijct.v16i6.6332.
Full textGhanem, Mohamed C., and Thomas M. Chen. "Reinforcement Learning for Efficient Network Penetration Testing." Information 11, no. 1 (December 20, 2019): 6. http://dx.doi.org/10.3390/info11010006.
Full textWatanabe, Yuuki Y., Motohiro Ito, and Akinori Takahashi. "Testing optimal foraging theory in a penguin–krill system." Proceedings of the Royal Society B: Biological Sciences 281, no. 1779 (March 22, 2014): 20132376. http://dx.doi.org/10.1098/rspb.2013.2376.
Full textViviani, Emma, Luca Di Persio, and Matthias Ehrhardt. "Energy Markets Forecasting. From Inferential Statistics to Machine Learning: The German Case." Energies 14, no. 2 (January 11, 2021): 364. http://dx.doi.org/10.3390/en14020364.
Full textViviani, Emma, Luca Di Persio, and Matthias Ehrhardt. "Energy Markets Forecasting. From Inferential Statistics to Machine Learning: The German Case." Energies 14, no. 2 (January 11, 2021): 364. http://dx.doi.org/10.3390/en14020364.
Full textSim, Jun-Gi. "Improved image processing of road pavement defect by infrared thermography." Selected Scientific Papers - Journal of Civil Engineering 13, s1 (March 1, 2018): 61–72. http://dx.doi.org/10.1515/sspjce-2018-0006.
Full textHidayat, Arif, and Ismail Puji Saputra. "ANALISA DAN PROBLEM SOLVING KEAMANAN ROUTER MIKROTIK RB750RA DAN RB750GR3 DENGAN METODE PENETRATION TESTING (STUDI KASUS: WARNET AULIA.NET, TANJUNG HARAPAN LAMPUNG TIMUR)." Jurnal RESISTOR (Rekayasa Sistem Komputer) 1, no. 2 (October 28, 2018): 118–24. http://dx.doi.org/10.31598/jurnalresistor.v1i2.323.
Full textNafiah, Faris, Ali Sophian, Md Raisuddin Khan, and Ilham Mukriz Zainal Abidin. "Modelling of scanning pulsed eddy current testing of normal and slanted surface cracks." Indonesian Journal of Electrical Engineering and Computer Science 16, no. 3 (December 1, 2019): 1297. http://dx.doi.org/10.11591/ijeecs.v16.i3.pp1297-1302.
Full textWu, Jiang, and J. W. Zuo. "Interactive System for T-Learning: Introduction of iTV Edutainment Mode." Advanced Materials Research 215 (March 2011): 43–46. http://dx.doi.org/10.4028/www.scientific.net/amr.215.43.
Full textCosta-Jussà, Marta R. "Domain adaptation strategies in statistical machine translation: a brief overview." Knowledge Engineering Review 30, no. 5 (October 30, 2015): 514–20. http://dx.doi.org/10.1017/s0269888915000119.
Full textBouziane, Ayoub, Jamal Kharroubi, and Arsalane Zarghili. "Towards an Optimal Speaker Modeling in Speaker Verification Systems using Personalized Background Models." International Journal of Electrical and Computer Engineering (IJECE) 7, no. 6 (December 1, 2017): 3655. http://dx.doi.org/10.11591/ijece.v7i6.pp3655-3663.
Full textCrippa, Chiara, and Federico Agliardi. "Practical Estimation of Landslide Kinematics Using PSI Data." Geosciences 11, no. 5 (May 14, 2021): 214. http://dx.doi.org/10.3390/geosciences11050214.
Full textRice, John, Tung-Shan Liao, Nigel Martin, and Peter Galvin. "The role of strategic alliances in complementing firm capabilities." Journal of Management & Organization 18, no. 6 (November 2012): 858–69. http://dx.doi.org/10.1017/s1833367200000493.
Full textRice, John, Tung-Shan Liao, Nigel Martin, and Peter Galvin. "The role of strategic alliances in complementing firm capabilities." Journal of Management & Organization 18, no. 6 (November 2012): 858–69. http://dx.doi.org/10.5172/jmo.2012.18.6.858.
Full textMichael, Steven C. "Time To Discovery." Ruffin Series of the Society for Business Ethics 3 (2002): 157–61. http://dx.doi.org/10.5840/ruffinx200237.
Full textBoschetto, Alberto, Luana Bottini, Valerio Cardini, Marco Eugeni, Paolo Gaudenzi, and Francesco Veniali. "Aircraft part substitution via additive manufacturing: design, simulation, fabrication and testing." Rapid Prototyping Journal 27, no. 5 (June 2, 2021): 995–1009. http://dx.doi.org/10.1108/rpj-06-2020-0140.
Full textSun, Xudong, Lei Huang, and Changping Liu. "Multispectral face spoofing detection using VIS–NIR imaging correlation." International Journal of Wavelets, Multiresolution and Information Processing 16, no. 02 (March 2018): 1840003. http://dx.doi.org/10.1142/s0219691318400039.
Full textPfrang, Steffen, Anne Borcherding, David Meier, and Jürgen Beyerer. "Automated security testing for web applications on industrial automation and control systems." at - Automatisierungstechnik 67, no. 5 (May 27, 2019): 383–401. http://dx.doi.org/10.1515/auto-2019-0021.
Full text