Results 311 to 320 of about 14,954,259 (382)
Some of the next articles are maybe not open access.
To identify system vulnerabilities, pen testing is essential for cybersecurity. Phases of preparation, reconnaissance, scanning, exploitation, and reporting are all involved. Every phase makes use of tools such as Nmap, Nessus, and Metasploit. To guarantee system, network, and data security, businesses should conduct pen tests regularly using skilled ...
Bradley Fowler, Bruce G. Chaundy
+5 more sources
Bradley Fowler, Bruce G. Chaundy
+5 more sources
IEEE Transactions on Power Systems, 2020
Test systems are important tools and benchmark for power system research. Currently, there is a lack of standard test systems for modern transmission expansion planning (TEP) research, especially under high variable renewable energy (VRE) penetrations ...
Zhenyu Zhuo +6 more
semanticscholar +1 more source
Test systems are important tools and benchmark for power system research. Currently, there is a lack of standard test systems for modern transmission expansion planning (TEP) research, especially under high variable renewable energy (VRE) penetrations ...
Zhenyu Zhuo +6 more
semanticscholar +1 more source
Investigation of the Early Cement Hydration with a New Penetration Test, Rheometry and In-Situ XRD
RILEM Bookseries, 2019U. Pott, C. Ehm, C. Jakob, D. Stephan
semanticscholar +1 more source
Instrumented Becker Penetration Test. I: Equipment, Operation, and Performance
, 2017J. DeJong +7 more
semanticscholar +1 more source

