نتایج جستجو برای: penetration

تعداد نتایج: 35603  

2009
Khaled Mahdi Maytham Safar

We introduce a new diffusion property to characterize different models of social networks; the “Degree of Diffusion α ”. The degree of diffusion α introduced in this work is a totally new parameter. It relates the ratio of adopters over the non-adopters to the penetration depth in a diffusion process over a social network. It predicts the future possible adopters within any diffusion process. E...

Journal: :Annales UMCS, Informatica 2004
L. M. Guard M. D. Crossland Marcin Paprzycki Johnson P. Thomas

This paper describes a planned program of investigation designed to determine what characteristics are signficant in predicting performance of students used as subjects in IT system penetration testing testbeds. In large part the experimental design replicates an earlier study by Jonsson et al., and extends that study to include factors describing the attacking subjects. In this way the propose...

2016
Tom Chothia Joeri de Ruiter

This paper shows how it is possible to use commercial off-the-shelf IoT devices in a taught cyber security course. We argue that the current level of IoT device security makes testing them an excellent exercise for students. We have developed a course based around this idea that teaches students basic penetration testing techniques and then sets two rounds of group assignments in which they get...

2014
Dae-Hee Son Seung-Hwa Kang Sang-Hee Kang

Wind farms usually produce power irregularly, due to unpredictable change of wind speed. Accordingly, we should determine the penetration limit of wind power to consider stability of power system and build a facility to control the wind power. The operational limit of wind power is determined as the minimum between the technical limit and the dynamic limit of wind power. The technical limit is ...

Journal: :IEEE Trans. Software Eng. 1996
Olin Sibert Phillip A. Porras Robert Lindell

| An in-depth analysis of the 80x86 processor families identi es architectural properties that may have unexpected, and undesirable, results in secure computer systems. In addition, reported implementation errors in some processor versions render them undesirable for secure systems because of potential security and reliability problems. In this paper, we discuss the imbalance in scrutiny for ha...

Journal: :JTAER 2006
Keir Dyce Mary Barrett

M-commerce, a growing sub-category of E-business, allows business to be done ‘anywhere, anytime’. However security of wireless devices remains problematic. It is unclear whether protocols to alleviate security problems, such as wireless vulnerability assessments (WNVAs), are being used or are effective. The paper reports on a survey-based study of Australian computer security professionals’ use...

Journal: :Computers & Security 2016
William Knowles Alistair Baron Tim McGarr

Simulated security assessments (a collective term used here for penetration testing, vulnerability assessment, and related nomenclature) may need standardisation, but not in the commonly assumed manner of practical assessment methodologies. Instead, this study highlights market failures within the providing industry at the beginning and ending of engagements, which has left clients receiving am...

Journal: :Remote Sensing 2017
Julián Martínez Violeta Montiel Javier Rey Francisco J. Cañadas-Quesada Pedro Vera-Candeas

Low yields in ornamental rock mining remain one of the most important problems in this industry. This fact is usually associated with the presence of anisotropies in the rock, which makes it difficult to extract the blocks. An optimised planning of the exploitation, together with an improved geological understanding of the deposit, could increase these yields. In this work, marble mining in Mac...

2001
Cynthia E. Irvine Timothy Levin

The design and construction of secure systems cannot be entirely captured in textbooks or class notes, but must be taught as an art which is learned through apprenticeship and practice. This paper describes a course in Secure Systems that uses the Flaw Hypothesis Methodology for penetration testing as a vehicle for motivating and teaching students fundamental principles of security

2008
Xavier Fernández-i-Marín Yanina Welp

This article starts with a fact: Internet penetration levels in Spain are extremely low compared with other European countries. In the nineties this situation was justified by the relative delay in the adoption of public and private initiatives, oriented towards the development of the Information Society (IS). However, data in 2003 show that the gap still holds or even tends to increase with th...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید