Sciweavers

45 search results - page 3 / 9
» Penetration Testing: A Duet
Sort
View
ENGL
2007
195views more  ENGL 2007»
13 years 5 months ago
Human Factors and Ergonomics in Dye Penetrant and Magnetic Particles Nondestructive Inspection Methods
Dye Penetrant Inspection (DPI) and Magnetic Particles Inspection (MPI) are two of the most commonly used Non-Destructive Testing (NDT) techniques in industry. Both techniques do re...
B. L. Luk, Alan H. S. Chan
HICSS
2012
IEEE
260views Biometrics» more  HICSS 2012»
12 years 1 months ago
Effort Estimates for Vulnerability Discovery Projects
Security vulnerabilities continue to be an issue in the software field and new severe vulnerabilities are discovered in software products each month. This paper analyzes estimates...
Teodor Sommestad, Hannes Holm, Mathias Ekstedt
IJON
2008
158views more  IJON 2008»
13 years 5 months ago
An adaptive stereo basis method for convolutive blind audio source separation
We consider the problem of convolutive blind source separation of stereo mixtures. This is often tackled using frequency-domain independent component analysis (FDICA), or time-fre...
Maria G. Jafari, Emmanuel Vincent, Samer A. Abdall...
IWIA
2006
IEEE
13 years 11 months ago
Modeling and Execution of Complex Attack Scenarios using Interval Timed Colored Petri Nets
The commonly used flaw hypothesis model (FHM) for performing penetration tests provides only limited, highlevel guidance for the derivation of actual penetration attempts. In thi...
Ole Martin Dahl, Stephen D. Wolthusen