Results 21 to 30 of about 525,062 (269)
Package Hermeticity Testing with Thermal Transient Measurements [PDF]
The rapid incursion of new technologies such as MEMS and smart sensor device manufacturing requires new tailor-made packaging designs. In many applications these devices are exposed to humid environments.
Rencz, M., Vass-Varnai, Andras
core +2 more sources
Smart Computer Security Audit: Reinforcement Learning with a Deep Neural Network Approximator [PDF]
A significant challenge in modern computer security is the growing skill gap as intruder capabilities increase, making it necessary to begin automating elements of penetration testing so analysts can contend with the growing number of cyber threats.
Alonso, E. +4 more
core
In situ nanocompression testing of irradiated copper. [PDF]
Increasing demand for energy and reduction of carbon dioxide emissions has revived interest in nuclear energy. Designing materials for radiation environments necessitates a fundamental understanding of how radiation-induced defects alter mechanical ...
Hosemann, P +3 more
core +3 more sources
WAPTT - Web Application Penetration Testing Tool
Web applications vulnerabilities allow attackers to perform malicious actions that range from gaining unauthorized account access to obtaining sensitive data.
DURIC, Z.
doaj +1 more source
Systematic Literature Review on Penetration Testing for Mobile Cloud Computing Applications
Mobile cloud computing (MCC) enables mobile devices to exploit seamless cloud services via offloading, and has numerous advantages and increased security and complexity. Penetration testing of mobile applications has become more complex and expensive due
Ahmad Salah Al-Ahmad +3 more
doaj +1 more source
The speed of technological development has made it possible for all people to be connected to one another. The creation of web-based information systems that help in all areas, including government, health, and education, is one of the forces behind the ...
Yoel Armando, Rosalina Rosalina
doaj +1 more source
Short-term wind prediction using an ensemble of particle swarm optimised FIR filters [PDF]
Due to the large and increasing penetration of wind power around the world, accurate power production forecasts are required to manage power systems and wind power plants.
Dowell, Jethro, Weiss, Stephan
core +1 more source
Demonstration of sustained and useful converter responses during balanced and unbalanced faults in microgrids [PDF]
In large power grids where converter penetration is presently low and the network impedance is predominantly reactive, the required response from converters during faults is presently specified by phrases such as “maximum reactive output”.
Burt, Graeme +4 more
core +1 more source
Adopting Automated Penetration Testing Tools
Modern society is heavily reliant upon the internet. Accordingly, it is vital to ensure that the data transmitted over the internet is safe. Several tools have been created for cybersecurity experts and organizations to test the security levels of ...
Yazeed Alkhurayyif +1 more
doaj +1 more source
Deep Reinforcement Learning for Intelligent Penetration Testing Path Design
Penetration testing is an important method to evaluate the security degree of a network system. The importance of penetration testing attack path planning lies in its ability to simulate attacker behavior, identify vulnerabilities, reduce potential ...
Junkai Yi, Xiaoyan Liu
doaj +1 more source

