نتایج جستجو برای: penetration test
تعداد نتایج: 843790 فیلتر نتایج به سال:
The need for a drying stress indicator has previously been stated with some research in the past to this means. Given the recent successes in achieving this goal through monitoring shrinkage, the refinement and further understanding of the process was needed, specifically, the influence that penetration of the mount-foot had on the shrinkage data. Four different LVDTmounts were investigated in ...
Following previous presentations on the dangers penetration testers face in using current off-the-shelf tools and practices (Pwn the Pwn Plug and I Hunt Penetration Testers), this paper and presentation explores how widely available learning materials used to train penetration testers lead to inadequate protection of client data and penetration testing operations. Widely available books and oth...
The International Telecommunications Union (ITU) and the Organization for Economic Cooperation and Development (OECD) provide Internet penetration statistics, which are collected from official national sources worldwide, and they are widely used to inform policymakers and researchers about the expansion of digital technologies. Nevertheless, these statistics are derived with methodologies, whic...
the prediction of liquefaction potential of soil due to an earthquake is an essential task in civil engineering. the decision tree is a tree structure consisting of internal and terminal nodes which process the data to ultimately yield a classification. c4.5 is a known algorithm widely used to design decision trees. in this algorithm, a pruning process is carried out to solve the problem of the...
According to literature, penetration pricing is the dominant pricing strategy for network effect markets. In this paper we show that diffusion of products in a network effect market does not only vary with the set of pricing strategies chosen by competing vendors but also strongly depends on the topological structure of the customers' network. This stresses the inappropriateness of classical "i...
To diagnose the vulnerabilities of target system using a remote penetration test approach needs to avoid the modification of the security configuration of the target network. So the carrier of test codes needs to hide from the IDS filter out of our penetrating test codes. Hence, we proposed a polymorphic carrier which carries encrypted test codes and diversified decrypters, and, the proposed ca...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید