- Full text PDF available (2)
- This year (0)
- Last 5 years (1)
- Last 10 years (3)
The number of reported web application vulnerabilities is increasing dramatically. The most of vulnerabilities result from improper input validation. This paper presents extensions to the Tainted Mode model which allows inter-module vulnerabilities detection. Besides, this paper presents a new approach to vulnerability analysis which incorporates advantages… (More)
Covering arrays are used for generating tests for interfaces with a large number of parameters. In this paper, a new method is described for constructing homogeneous and heterogeneous covering arrays that is based on a combination of combinatorial and optimization methods. In a wide class of particular cases, the method speeds up the construction of arrays… (More)
In this work we studied the approximation of the fundamental solution of the Laplace operator in two-dimensional space u = log(|x|) by harmonic polynomials. We analyzed the best approximation in the semi-ring with fixed outer radius and inner radius ? tending to zero. We observed exponential convergence in the degree of polynomials used for approximation.… (More)
Certain peculiarities have been revealed in the development of radiation sickness in guinea pigs subjected to nonuniform irradiation with superlethal doses. With electron and gamma-neutron radiation LD50/1.5 was 116.11 and 114.48 Gy respectively, when delivered to whole body, and 133.40 and 111.72 Gy when delivered to the posterior part of the body.