نتایج جستجو برای: needle penetration test

تعداد نتایج: 879814  

Journal: :Pain physician 2014
Omar Hamman El Abd Joao Eduardo Daud Amadera Daniel Camargo Pimentel Thais Spacov Camargo Pimentel

BACKGROUND Transforaminal epidural steroid injections (TFESI) are a mainstay in the treatment of spine pain. Though this commonly performed procedure is generally felt to be safe, devastating complications following inadvertent intra-arterial injections of particulate steroid have been reported. The use of digital subtraction angiography (DSA) has been suggested as a means of detecting intra-ar...

2009
Farkhod Alisherov

Penetration testing is one of the oldest methods for assessing the security of a computer system. The idea behind penetration testing methodologies is that the penetration tester should follow a pre-scripted format during test as dictated by the methodology. A penetration testing methodology was proposed in this research. It is also important to consider a policy that should be followed by both...

Journal: :Softw. Test., Verif. Reliab. 2011
William G. J. Halfond Shauvik Roy Choudhary Alessandro Orso

Penetration testing is widely used to help ensure the security of web applications. Using penetration testing, testers discover vulnerabilities by simulating attacks on a target web application. To do this efficiently, testers rely on automated techniques that gather input vector information about the target web application and analyze the application’s responses to determine whether an attack ...

Journal: :IACR Cryptology ePrint Archive 2007
Horng-Twu Liaw Jiann-Fu Lin Wei-Chen Wu

Recently, Liaw et al. proposed a hash based electronic traveler’s check system. They claimed that their scheme is secure. However, after analyses, we found that their scheme is vulnerable to key compromise impersonation and parallel session attack. Further, we will improve their scheme to avoid such an attack.

2000
Chi-Ok Hwang Michael Mascagni

We describe two efficient methods of estimating the fluid permeability of standard models of porous media by using the statistics of continuous Brownian motion paths that initiate outside a sample and terminate on contacting the porous sample. The first method associates the ‘‘penetration depth’’ with a specific property of the Brownian paths, then uses the standard relation between penetration...

Journal: :Wireless Communications and Mobile Computing 2011
Konstantinos Katsaros Ralf Kernchen Mehrdad Dianati David Rieck Charalambos Zinoviou

This paper studies the impacts of vehicular communications on efficiency of traffic in urban areas. We consider a Green Light Optimized Speed Advisory (GLOSA) application implementation in a typical reference area, and present the results of its performance analysis using an integrated cooperative ITS simulation platform. In addition, we study route alternation using Vehicle to Infrastructure (...

2016
William E. Johnson Allison Luzader Irfan Ahmed Vassil Roussev Golden G. Richard Cynthia Bailey Lee

Cybersecurity classes should be focused on building practical skills along with the development of the open mindset that is essential to tackle the dynamic cybersecurity landscape. Unfortunately, traditional lecture-style teaching is a poor match for this task. Peer instruction is a non-traditional, active learning approach that has proven to be effective in many fundamental courses of computer...

2009
Khaled Mahdi Maytham Safar

We introduce a new diffusion property to characterize different models of social networks; the “Degree of Diffusion α ”. The degree of diffusion α introduced in this work is a totally new parameter. It relates the ratio of adopters over the non-adopters to the penetration depth in a diffusion process over a social network. It predicts the future possible adopters within any diffusion process. E...

Journal: :Annales UMCS, Informatica 2004
L. M. Guard M. D. Crossland Marcin Paprzycki Johnson P. Thomas

This paper describes a planned program of investigation designed to determine what characteristics are signficant in predicting performance of students used as subjects in IT system penetration testing testbeds. In large part the experimental design replicates an earlier study by Jonsson et al., and extends that study to include factors describing the attacking subjects. In this way the propose...

2016
Tom Chothia Joeri de Ruiter

This paper shows how it is possible to use commercial off-the-shelf IoT devices in a taught cyber security course. We argue that the current level of IoT device security makes testing them an excellent exercise for students. We have developed a course based around this idea that teaches students basic penetration testing techniques and then sets two rounds of group assignments in which they get...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید