Results 1 to 10 of about 525,062 (269)
CIPHER: Cybersecurity Intelligent Penetration-Testing Helper for Ethical Researcher [PDF]
Penetration testing, a critical component of cybersecurity, typically requires extensive time and effort to find vulnerabilities. Beginners in this field often benefit from collaborative approaches with the community or experts.
Derry Pratama +6 more
doaj +2 more sources
Inner Profile Measurement for Pipes Using Penetration Testing [PDF]
Penetration testing has been used to measure material properties for over fifty years. Currently, it is under-utilised as a contemporary scientific and engineering tool for investigating the condition of pipes whose inner surface has been exposed to ...
Robert Ross, Avinash Baji, Dean Barnett
doaj +2 more sources
A Systematic Literature Review on Penetration Testing in Networks: Future Research Directions
Given the widespread use of the internet at the individual, governmental, and nongovernmental levels, and the opportunities it offers, such as online shopping, security concerns may arise.
Mariam Alhamed, M. M. Hafizur Rahman
doaj +1 more source
Intelligent connected vehicles (ICVs) are equipped with extensive electronic control units which offer convenience but also pose significant cybersecurity risks. Penetration testing, recommended in ISO/SAE 21434 “Road vehicles—Cybersecurity engineering”,
Haichun Zhang +5 more
doaj +1 more source
Penetration Testing of Wireless Networks [PDF]
This project focuses on performing security assessment on wireless networks, and to crack the password assigned to it. The idea of wireless network brings to mind lot of ways of attacking and penetrating a network compared to the traditionally wired ...
Mohammed F. Abdulqader, Adnan Y. Dawod
doaj +1 more source
Optimal Filter Assignment Policy Against Distributed Denial of Service Attack on Router Mikrotik [PDF]
Information technology is currently one of the things that almost all universities widely adopt. The development of information technology requires universities to manage potential resources effectively and efficiently. as stated in the regulation of the
Lutfi Salkin +3 more
doaj +1 more source
Reinforcement learning in VANET penetration testing
The recent popularity of Connected and Autonomous Vehicles (CAV) corresponds with an increase in the risk of cyber-attacks. These cyber-attacks are instigated by white-coat hackers, and cyber-criminals.
Phillip Garrad, Saritha Unnikrishnan
doaj +1 more source
Remote Penetration Testing with Telegram Bot
The widespread of websites and web applications makes them the main target of cyber attacks. One way to increase security is to perform a penetration test.
Naufal Hafiz +4 more
doaj +1 more source
Due to the complexity of network penetration and the diversity of penetration methods, traditional analysis approaches analyse only a single penetration method or part of the network penetration process. Moreover, the lack of customized exploration makes
Sijie Zheng +8 more
doaj +1 more source
Automatic Verification and Execution of Cyber Attack on IoT Devices
Internet of Things (IoT) devices are becoming a part of our daily life; from health monitors to critical infrastructure, they are used everywhere. This makes them ideal targets for malicious actors to exploit for nefarious purposes.
Fartein Lemjan Færøy +3 more
doaj +1 more source

