Automated method of building exploites in analysis software testing
A problem with the automated exploit building method for the stack buffer overflow vulnerability. Application of the method to the problem of assessing the severity of errors in software and building protection for software and operating systems.
Подобные документы
Application of an autotyped rasterization method to protect text, table and graphic information. Use of the method in question to protect information on tangible media. Develop a modified amplitude-modulated screening method to improve print quality.
статья, добавлен 28.09.2016Assistive computer programs are one of the most invaluable technologies for people who are blind: category of inclusive software can be effectively utilized for both educational purposes, enabling its users to work with windowed graphical user interfaces.
статья, добавлен 15.09.2020Support Vector Machine (SVM). Optimization problem (mainly Quadratic Programming). Interior Point Method. Mainstream methods to solve Quadratic Programming problem. Incomplete Cholesky factorization and Kronecker factorization. Reform SVM training.
статья, добавлен 30.08.2016The nodes of computer facilities and microprocessor systems. Architecture and software models of Intel microprocessors. Microprocessor systems on universal microprocessors and its programming. Microprocessor systems on microcontrollers and programming.
методичка, добавлен 11.10.2014Automation of the process of keeping a diary and converting it into digital form. Software solutions that allow the user to systematize their hobby experience and find something new for themselves. Evaluation of the functionality of compared systems.
статья, добавлен 19.03.2024The problem of parametric identification of mathematical models of reservoir systems for the porosity and permeability functions of ground rock. A solve the problem based on the gradient projection method with minimization of a squared quality criterion.
статья, добавлен 28.08.2016The main situations and problems that inevitably arise during the work of testing engineers, which can be solved by using mobile applications in the Charles program. Conducting testing of mobile applications on iOS and Android operating systems.
статья, добавлен 08.12.2024The nature and characteristics of distributed operating systems. Characteristic and distinctive features of operating systems real-time. Description, application and purpose multiprocessor operating systems, its role and place in computer security.
презентация, добавлен 25.09.2016An overview of the most popular approaches to the modeling of automated systems for intelligent monitoring and management of environmental safety in the water sector. Principles of construction of adaptive systems of this class and requirements to them.
статья, добавлен 30.04.2018Трудоемкость создания модели Building information modeling, потеря существующих рабочих практик при переходе на новую технологию. Характеристика прямых и косвенных недостатков Building information modeling, направленность на архитектурные проблемы.
статья, добавлен 29.07.2017The regression models of software project duration based on project effort. Equations of confidence interval of a non-linear regression model of software project duration based on Johnson transformation for the personal computer development platform.
статья, добавлен 22.03.2016Methods of traversal of high-level multi-threaded models formalized in the Use Case Map computer language. Advantages and disadvantages of this approach compared to existing ones. Generation character lines that are used to test software systems.
статья, добавлен 28.02.2016Definition of the concept "сybercrime". Analysis of history and cyber threat evolution. Study of the types of cybercrime. Characteristic of hacking, denial of service attack, virus dissemination, computer vandalism, cyber terrorism and software piracy.
презентация, добавлен 24.01.2017Понятие об архитектурной операционной системе. Обзор аппаратных и программных обеспечений компьютера с помощью "software" и "hardware". Очерк интеллектуального проектирования пространств и интерфейсов с использованием встроенных микропроцессоров.
реферат, добавлен 18.11.2013The opportunities that create application of computer visualization using mathematical software to improve the quality of interactive teaching of students. Visualization of numerical solution of problems of mathematical physics by finite element method.
статья, добавлен 20.01.2016- 66. Development of an advanced SS platform based on the OAuth2 protocol for unified system authorization
Examination of the significance of authentication and authorization in Software as a Service platforms, with a specific focus on the OAuth2 protocol. Analysis of potential vulnerabilities, complexities, and the ever-evolving nature of the protocol.
статья, добавлен 08.12.2024 On relevance of technical analysis. Pattern recognition. Technical indicators. Data processing. Feature extraction. Kolmogorov-Smirnov test. Algorithm and software. Model configuration. Clustering performance on simulated data, brutе force algorithm.
учебное пособие, добавлен 26.08.2016The structure chart of identification using n-th order volterra model in frequency domain using interpolation method. Numerical values of identification accuracy. The simulink model of the test system with noise generator, osillosopes. Wavelet function.
статья, добавлен 28.08.2016Analysis of the influence of information processes on the development of the state. The use of computer technology in the banking sector. Development of an automated terminal monitoring system and a database management system. Thin client functions.
статья, добавлен 26.01.2021Methods, tools and applications of Data Mining. Basic concepts of data warehouses and the place of Data Mining in their architecture. The process of data analysis using this technology, its stages. Analytical software market, product data capabilities.
статья, добавлен 30.10.2020The study of the sequence of stages of reconstruction of graphical images on a computer using decoding dual vectors of the tuple. Decoding code values in software components. Ways of coding information. Methods of the decrypting computer codes cost.
статья, добавлен 25.03.2016Development of new ways to ensure the security of data transmission through telecommunication networks. Hardware protection of information from unauthorized access. Organization of hidden channels of common use. The method of authentication of images.
статья, добавлен 29.11.2016Назначение, область применения и достоинства программы Consistent Software ElectriCS 3D. Автоматизированная раскладка кабелей различного назначения при проектировании, реконструкции, эксплуатации зданий и открытых территорий. Виды проектных документов.
реферат, добавлен 24.02.2013Development of a new complex oscillator for effective algorithmic trading in the stock market. Technical indicators on which the oscillator is based and the rule base for its construction. Oscillator calculation algorithm using QuantOffice software.
статья, добавлен 09.08.2022Исследование особенностей применения методов машинного обучения для выявления преступников по фотографиям. Определение необходимости обучения цифровой грамотности. Рассмотрение и характеристика основных причин масса мифов вокруг software engineering.
доклад, добавлен 09.10.2022