نتایج جستجو برای: penetration test

تعداد نتایج: 843790  

2009
Ariel Futoransky Fernando Miranda José Ignacio Orlicki Carlos Sarraute

We introduce a new simulation platform called Insight, created to design and simulate cyber-attacks against large arbitrary target scenarios. Insight has surprisingly low hardware and configuration requirements, while making the simulation a realistic experience from the attacker’s standpoint. The scenarios include a crowd of simulated actors: network devices, hardware devices, software applica...

2004
Bruno Heidelberger Matthias Teschner Richard Keiser Matthias Müller Markus H. Gross

Penalty approaches can be used to efficiently resolve collisions of dynamically simulated rigid and deformable objects. These approaches compute penalty forces based on the penetration depth of intersecting objects and there exist many algorithms for estimating the exact penetration depth. However, in discrete-time simulations, this information can cause non-plausible collision responses in cas...

2003
Yvonne M. van Everdingen Eric Waarts

Studies on the adoption of innovations by companies generally include micro-level and mesolevel variables in order to explain a company’s receptiveness to innovations. This study adds to the literature by investigating the role of macro-level variables (i.e. national culture) to explain differences in innovation penetration levels and adoption decisions by companies across national cultures. A ...

2009
Noa Agmon Sarit Kraus Gal A. Kaminka

In this paper, we study the problem of multi-robot perimeter patrol in adversarial environments, under uncertainty. In this problem, the robots patrol around a closed area, where their goal is to patrol in a way that maximizes their chances of detecting an adversary trying to penetrate into the area. Uncertainties may rise in different aspects in this domain, and herein our focus is twofold. Fi...

2000
H. Won K. Maki

– Until recently it has been believed that the superconductivity in Sr2RuO4 is described by p-wave pairing. However, both the recent specific heat and the magnetic penetration depth measurements on the purest single crystals of Sr2RuO4 appear to be explained more consistently in terms of f-wave superconductivity. In order to further this hypothesis, we study theoretically the thermodynamics and...

2017
D. S. Barendregt U. van der Velden M. F. Timmerman G. A. van der Weijden

Disclaimer/Complaints regulations If you believe that digital publication of certain material infringes any of your rights or (privacy) interests, please let the Library know, stating your reasons. In case of a legitimate complaint, the Library will make the material inaccessible and/or remove it from the website. Please Ask the Library: http://uba.uva.nl/en/contact, or a letter to: Library of ...

2009
Farkhod Alisherov

Penetration testing is one of the oldest methods for assessing the security of a computer system. The idea behind penetration testing methodologies is that the penetration tester should follow a pre-scripted format during test as dictated by the methodology. A penetration testing methodology was proposed in this research. It is also important to consider a policy that should be followed by both...

Journal: :Softw. Test., Verif. Reliab. 2011
William G. J. Halfond Shauvik Roy Choudhary Alessandro Orso

Penetration testing is widely used to help ensure the security of web applications. Using penetration testing, testers discover vulnerabilities by simulating attacks on a target web application. To do this efficiently, testers rely on automated techniques that gather input vector information about the target web application and analyze the application’s responses to determine whether an attack ...

Journal: :IACR Cryptology ePrint Archive 2007
Horng-Twu Liaw Jiann-Fu Lin Wei-Chen Wu

Recently, Liaw et al. proposed a hash based electronic traveler’s check system. They claimed that their scheme is secure. However, after analyses, we found that their scheme is vulnerable to key compromise impersonation and parallel session attack. Further, we will improve their scheme to avoid such an attack.

2000
Chi-Ok Hwang Michael Mascagni

We describe two efficient methods of estimating the fluid permeability of standard models of porous media by using the statistics of continuous Brownian motion paths that initiate outside a sample and terminate on contacting the porous sample. The first method associates the ‘‘penetration depth’’ with a specific property of the Brownian paths, then uses the standard relation between penetration...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید