共 50 条
- [41] ANALYSIS OF THE USE OF NEUTRALISATION TECHNIQUES IN VIOLATIONS OF INFORMATION SECURITY EKONOMSKI VJESNIK, 2012, 25 (01): : 182 - 193
- [42] Transformer testing using circuit analysis techniques ELECTRICAL INSULATION CONFERENCE AND ELECTRICAL MANUFACTURING & COIL WINDING CONFERENCE, PROCEEDINGS, 2001, : 639 - 641
- [43] An analysis of power reduction techniques in scan testing INTERNATIONAL TEST CONFERENCE 2001, PROCEEDINGS, 2001, : 670 - 677
- [44] Portable testing techniques for the analysis of drug materials WILEY INTERDISCIPLINARY REVIEWS: FORENSIC SCIENCE, 2022, 4 (06):
- [45] Comparative Analysis on Techniques for Big Data Testing 2016 INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY (INCITE) - NEXT GENERATION IT SUMMIT ON THE THEME - INTERNET OF THINGS: CONNECT YOUR WORLDS, 2016,
- [46] Testing Techniques and Analysis of SQL Injection Attacks PROCEEDINGS OF 2017 2ND INTERNATIONAL CONFERENCE ON KNOWLEDGE ENGINEERING AND APPLICATIONS (ICKEA), 2017, : 55 - 59
- [47] A Study of Outlier Analysis Techniques for Delay Testing 2008 IEEE INTERNATIONAL TEST CONFERENCE, VOLS 1 AND 2, PROCEEDINGS, 2008, : 1 - 10
- [48] A Dynamic Analysis Security Testing Infrastructure for Internet of Things 2020 SIXTH INTERNATIONAL CONFERENCE ON MOBILE AND SECURE SERVICES (MOBISECSERV)), 2020,
- [49] Security Analysis of VoIP Networks Through Penetration Testing INFORMATION AND SOFTWARE TECHNOLOGIES (ICIST 2017), 2017, 756 : 601 - 610
- [50] Security Assurance with Program Path Analysis and Metamorphic Testing PROCEEDINGS OF 2013 IEEE 4TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING AND SERVICE SCIENCE (ICSESS), 2012, : 193 - 197