• Aucun résultat trouvé

[PDF] Top 20 Using testing techniques for vulnerability detection in C programs

Has 10000 "Using testing techniques for vulnerability detection in C programs" found on our website. Below are the top 20 most common "Using testing techniques for vulnerability detection in C programs".

Using testing techniques for vulnerability detection in C programs

Using testing techniques for vulnerability detection in C programs

... and vulnerability driven inspections etc. Vulnerability cause presence testing is one of the main activities that support the validation of secure ...vulnerabilities in software products ... Voir le document complet

18

Model-based testing of PLC programs with appropriate conformance relations

Model-based testing of PLC programs with appropriate conformance relations

... in an industrial language into a formal model may be found in ...considered in what follows. A timed model, in the form of a timed automaton for instance, may be indeed ... Voir le document complet

11

Expiratory and inspiratory cries detection using different signals' decomposition techniques

Expiratory and inspiratory cries detection using different signals' decomposition techniques

... Decomposition Techniques * Lina Abou-Abbas, * Chakib Tadj, * Christian Gargour, and † Leila Montazeri, *Montreal, and †Canada Summary: This paper addresses the problem of automatic cry signal segmentation ... Voir le document complet

17

Using Data Integration for Security Testing

Using Data Integration for Security Testing

... the vulnerability causes of the system [6, 5, 4, ...or vulnerability causes that should be prevented in ...security testing approach specialised for protocols ...faults. In [5], ... Voir le document complet

17

On Testing Constraint Programs

On Testing Constraint Programs

... appeals for better software engineering practices, particularly in the testing ...a testing framework en- abling automated test case generation for constraint ...refined using ... Voir le document complet

20

On Testing Constraint Programs

On Testing Constraint Programs

... appeals for better software engineer- ing practices, particularly in the testing ...a testing framework enabling automated test case generation for constraint ...refined using ... Voir le document complet

16

Comparison of robust detection techniques for local outliers in multivariate spatial data

Comparison of robust detection techniques for local outliers in multivariate spatial data

... Subjects in High-dimensional Neuroimaging Datasets with Regularized Minimum Covariance Determinant, Medical Image Computing and Computer-Assisted Intervention-MICCAI ... Voir le document complet

41

Testing techniques to solve roofing problems

Testing techniques to solve roofing problems

... Testing techniques to solve roofing problems Paroli, R. M.; Dutt, O. https://publications-cnrc.canada.ca/fra/droits L’accès à ce site Web et l’utilisation de son contenu sont assujettis aux conditions ... Voir le document complet

3

A Multi-agents Intrusion Detection System Using Ontology and Clustering Techniques

A Multi-agents Intrusion Detection System Using Ontology and Clustering Techniques

... implemented, in order to optimize the knowledge representa- tion and to incorporate more intelligence in the information ...basis for known attacks, used with the agent ...support for an IDS ... Voir le document complet

13

Bounds for Multistage Stochastic Programs using Supervised Learning Strategies

Bounds for Multistage Stochastic Programs using Supervised Learning Strategies

... of using the loss function of the supervised learning algorithm in (5), we look for good choices of the parameters λ of the learning problems by directly computing (3) for each candidate set ... Voir le document complet

13

Using Shape Descriptors for UAV Detection

Using Shape Descriptors for UAV Detection

... At first, we have combined the GFD based shape features with a neural network to test its accuracy in our context of detecting flying drones and discriminating birds with a steady camera[r] ... Voir le document complet

6

A Review of Optical Interferometry Techniques for VOC Detection

A Review of Optical Interferometry Techniques for VOC Detection

... effects. Detection and monitoring of VOCs are important for maintaining safe and healthy industrial and domestic ...processing techniques, this review assesses the different approaches adopted ... Voir le document complet

37

DETECTION DES TECHNIQUES DE JEU DE LA GUITARE

DETECTION DES TECHNIQUES DE JEU DE LA GUITARE

... 6.1. Notes étouffées avec la paume Le palm muting fait intervenir la paume de la main droite pour produire un effet étouffé, similaire au con sordino des cordes frottées. Les caractéristiques des notes étouffées ... Voir le document complet

8

Using SMT Solving for the Lookup of Infeasible Paths in Binary Programs

Using SMT Solving for the Lookup of Infeasible Paths in Binary Programs

... mainly in the inclusion of infeasible execution paths in the WCET ...conditions using Satisfiability Modulo Theory (SMT) ...performed in the OTAWA framework and is independent of any ... Voir le document complet

12

Vulnerability of the Doppler Detection System to countermeasures

Vulnerability of the Doppler Detection System to countermeasures

... L’accès à ce site Web et l’utilisation de son contenu sont assujettis aux conditions présentées dans le site LISEZ CES CONDITIONS ATTENTIVEMENT AVANT D’UTILISER CE SITE WEB. NRC Publicat[r] ... Voir le document complet

51

Using SMT Solving for the Lookup of Infeasible Paths in Binary Programs

Using SMT Solving for the Lookup of Infeasible Paths in Binary Programs

... mainly in the inclusion of infeasible execution paths in the WCET ...conditions using Satisfiability Modulo Theory (SMT) ...performed in the OTAWA framework and is independent of any ... Voir le document complet

11

Using OR techniques for projets selection in the petrol industy

Using OR techniques for projets selection in the petrol industy

... portfolio in the frontier represents a set of projects satisfying minimum levels of production, tolerable operational and maintenance costs, precedence relations between projects, and a limited ...1991), ... Voir le document complet

27

Using extreme value theory for image detection

Using extreme value theory for image detection

... observed in this prior work, is theoretically ...important for a better parameter estimation ...image detection and demonstrating its importance in this ... Voir le document complet

20

Detection of metallic and plastic landmines using the GPR and 2-D resistivity techniques

Detection of metallic and plastic landmines using the GPR and 2-D resistivity techniques

... acquired using SIR 20 system (from GSSI) operating with 400, 900 and 1500 MHz an- tennae towed with constant speed along the surface of the test site ...profiles using three different frequencies (400, 900 ... Voir le document complet

10

Distributed Hypothesis Testing: Cooperation and Concurrent Detection

Distributed Hypothesis Testing: Cooperation and Concurrent Detection

... coherent detection or under concur- rent detection when the sensor can send more than a single bit or the sensor observations have the same marginal distributions under the two hypotheses, the exponents ... Voir le document complet

16

Show all 10000 documents...