نتایج جستجو برای: penetration test

تعداد نتایج: 843790  

2002
Daniel Geer John Harthorne

Penetration testing is the art of finding an open door. It is not a science as science depends on falsifiable hypotheses. The most penetration testing can hope for is to be the science of insecurity not the science of security inasmuch as penetration testing can at most prove insecurity by falsifying the hypothesis that any system, network, or application is secure. To be a science of security ...

2014
Daniel F. McGinnis Stefan Sommer Andreas Lorke Ronnie N. Glud Peter Linke

Continental shelves are predominately ( 70%) covered with permeable, sandy sediments. While identified as critical sites for intense oxygen, carbon, and nutrient turnover, constituent exchange across permeable sediments remains poorly quantified. The central North Sea largely consists of permeable sediments and has been identified as increasingly at risk for developing hypoxia. Therefore, we in...

2012
Zhe Yang Abbas Mohammed Jun Peng

Municipal wireless network is a recently established infrastructure of city-based wireless network, which provides mainly outdoor broadband wireless access to Internet for public usages. The municipal network is usually regarded as a public-utility service, which not only delivers well connected broadband services in the city at an affordable price but also promotes society interaction and brin...

Journal: :CoRR 2012
Robayet Nasim

Exponential growth of the volume of Bluetooth-enabled devices indicates that it has become a popular way of wireless interconnections for exchanging information. The main goal of this paper is to analyze the most critical Bluetooth attacks in real scenarios. In order to find out the major vulnerabilities in modern Bluetooth-enabled mobile devices several attacks have performed successfully such...

Journal: :IEEE Communications Letters 2012
Mate Boban Tiago T. V. Vinhoza Ozan K. Tonguz João Barros

One of the stumbling blocks for implementation of Vehicular Ad Hoc Networks is the penetration rate: the percentage of vehicles that have the communication equipment installed. As the equipment deployment is unlikely to happen instantaneously, it is important to explore the performance gains achievable at low penetration rates. This especially pertains to safety applications, which are expected...

2014
Erinc Erdem Konstantinos Kontis Selvaraj Saravanan

An experimental investigation of sonic air, CO2 and Helium transverse jets in Mach 5 cross flow was carried out over a flat plate. The jet to freestream momentum flux ratio, J, was kept the same for all gases. The unsteady flow topology was examined using high speed schlieren visualisation and PIV. Schlieren visualisation provided information regarding oscillating jet shear layer structures and...

2016
Alexander Pretschner Alei Salem

Context Industrial control systems govern important industrial processes as well as many other areas of daily life including building automation and the energy infrastructure. In the past, such systems were rarely networked if at all. Recently, however, a need for a higher degree of communication between different systems as well as other company resources has arisen. While leading to increased...

2013
Dong-Ho Jung Young-Sin Noh Hae-Doo Lee Hoon-Sang Chang Hyun-Wook Ryu Kyung-San Min

During endodontic treatment, it is important to create a fluid-tight seal in the access cavity in order to prevent marginal leakage and the ingress of oral fluids and microorganisms into the root canal. Nevertheless, temporary filling materials have received less attention than materials used for a permanent and prolonged use. However, they are an essential link in the chain that leads to disin...

2007
Weidong Cui Jayanthkumar Kannan Helen J. Wang

Application-level protocol specifications are useful for many security applications, including intrusion prevention and detection that performs deep packet inspection and traffic normalization, and penetration testing that generates network inputs to an application to uncover potential vulnerabilities. However, current practice in deriving protocol specifications is mostly manual. In this paper...

1999
By M. I. Todorovska M. D. Trifunac

An empirical, energy-based methodology for liquefaction hazard assessment and microzonation mapping is presented. The approach is probabilistic, considers the uncertainty in the liquefaction criterion, and is applicable to most earthquake-induced liquefaction analyses. The examples illustrated are for water-saturated sands at level ground. The energy of ground shaking is estimated from the Four...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید