Results 31 to 40 of about 536,772 (338)
Package Hermeticity Testing with Thermal Transient Measurements [PDF]
The rapid incursion of new technologies such as MEMS and smart sensor device manufacturing requires new tailor-made packaging designs. In many applications these devices are exposed to humid environments.
Rencz, M., Vass-Varnai, Andras
core +2 more sources
HARMer: Cyber-Attacks Automation and Evaluation
With the increasing growth of cyber-attack incidences, it is important to develop innovative and effective techniques to assess and defend networked systems against cyber attacks.
Simon Yusuf Enoch +5 more
doaj +1 more source
Refining the PoinTER “human firewall” pentesting framework [PDF]
PurposePenetration tests have become a valuable tool in the cyber security defence strategy, in terms of detecting vulnerabilities. Although penetration testing has traditionally focused on technical aspects, the field has started to realise the ...
Archibald, Jacqueline M., Renaud, Karen
core +3 more sources
In situ nanocompression testing of irradiated copper. [PDF]
Increasing demand for energy and reduction of carbon dioxide emissions has revived interest in nuclear energy. Designing materials for radiation environments necessitates a fundamental understanding of how radiation-induced defects alter mechanical ...
Hosemann, P +3 more
core +3 more sources
WAPTT - Web Application Penetration Testing Tool
Web applications vulnerabilities allow attackers to perform malicious actions that range from gaining unauthorized account access to obtaining sensitive data.
DURIC, Z.
doaj +1 more source
Systematic Literature Review on Penetration Testing for Mobile Cloud Computing Applications
Mobile cloud computing (MCC) enables mobile devices to exploit seamless cloud services via offloading, and has numerous advantages and increased security and complexity. Penetration testing of mobile applications has become more complex and expensive due
Ahmad Salah Al-Ahmad +3 more
doaj +1 more source
Smart Computer Security Audit: Reinforcement Learning with a Deep Neural Network Approximator [PDF]
A significant challenge in modern computer security is the growing skill gap as intruder capabilities increase, making it necessary to begin automating elements of penetration testing so analysts can contend with the growing number of cyber threats.
Alonso, E. +4 more
core
Short-term wind prediction using an ensemble of particle swarm optimised FIR filters [PDF]
Due to the large and increasing penetration of wind power around the world, accurate power production forecasts are required to manage power systems and wind power plants.
Dowell, Jethro, Weiss, Stephan
core +1 more source
Demonstration of sustained and useful converter responses during balanced and unbalanced faults in microgrids [PDF]
In large power grids where converter penetration is presently low and the network impedance is predominantly reactive, the required response from converters during faults is presently specified by phrases such as “maximum reactive output”.
Burt, Graeme +4 more
core +1 more source
Adopting Automated Penetration Testing Tools
Modern society is heavily reliant upon the internet. Accordingly, it is vital to ensure that the data transmitted over the internet is safe. Several tools have been created for cybersecurity experts and organizations to test the security levels of ...
Yazeed Alkhurayyif +1 more
doaj +1 more source

