نتایج جستجو برای: vulnerable scanner
تعداد نتایج: 71901 فیلتر نتایج به سال:
Increasing usage of Internet and computer networks by individuals and organizations and also attackers’ usage of new methods and tools in an attempt to endanger network security, have led to the emergence of a wide range of threats to networks. A honeypot is one of the basic techniques employed for network security improvement. It is basically designed to be attacked so as to get the attackers’...
This paper describes ongoing work in the E.U. project PROTECTOR (Preventive Safety for Unprotected Road User) on the important problem of detecting vulnerable traffic participants from a moving vehicle. We focus on the three sensor technologies that are pursued: laser scanner, radar and video. We discuss their characteristics and present the relevant pattern recognition techniques. First protot...
XSS Attacks continue to be prevalent today, not only because XSS sanitization is a hard problem in richformatting contexts, but also because there are so many potential avenues and so many uneducated developers who forget to sanitize reflected content altogether. In this paper, we present Gd0rk, a tool which employs Google’s advanced search capabilities to scan for websites vulnerable to XSS. I...
combined pet/ct scanners now play a major role in medicine for in vivo imaging in oncology, cardiology, neurology, and psychiatry. as the performance of a scanner depends not only on the scintillating material but also on the scanner design, with regards to the advent of newer scanners, there is a need to optimize acquisition protocols as well as to compare scanner performances on an objective ...
introduction: three-dimensional (3d) scanners are widely used in medicine. one of the applications of 3d scanners is the acquisition of anthropometric dimensions for ergonomics and the creation of an anthropometry data bank. the aim of this study was to evaluate the precision and accuracy of a modified 3d scanner fabricated in this study. methods: in this work, a 3d scan of the human body was o...
The internet has provided a vast range of benefits to society, and empowering people in a variety of ways. Due to incredible growth of Internet usage in past 2 decades, everyday a number of new Web applications are also becoming a part of World Wide Web. The distributed and open nature of internet attracts hackers to interrupt the smooth services of web applications. Some of the famous web appl...
Pedestrians are important yet vulnerable road users, especially in urban environments. Traffic accidents involving pedestrians usually lead to serious injuries or fatalities. From an application’s point of view, pedestrian detection can be used for traffic flow monitoring, intelligent pedestrian crossing or on-board vehicle for driver assistance. From the technology’s point view, different sens...
estimation of pigment magnitudes in synthetic leather by using scanner and artificial neural network
in the present work the magnitudes of pigments in the synthetic leather, were measured by means of scanner. initially synthetic leather samples pigmented by three different pigments of yellow, blue and red colors were prepared. then the pigmented samples were scanned, and the values of rgb of images were calculated. the artificial neural network (ann) method used to make relation between rgb va...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید