Results 1 to 10 of about 525,062 (269)

CIPHER: Cybersecurity Intelligent Penetration-Testing Helper for Ethical Researcher [PDF]

open access: yesSensors
Penetration testing, a critical component of cybersecurity, typically requires extensive time and effort to find vulnerabilities. Beginners in this field often benefit from collaborative approaches with the community or experts.
Derry Pratama   +6 more
doaj   +2 more sources

Inner Profile Measurement for Pipes Using Penetration Testing [PDF]

open access: yesSensors, 2019
Penetration testing has been used to measure material properties for over fifty years. Currently, it is under-utilised as a contemporary scientific and engineering tool for investigating the condition of pipes whose inner surface has been exposed to ...
Robert Ross, Avinash Baji, Dean Barnett
doaj   +2 more sources

A Systematic Literature Review on Penetration Testing in Networks: Future Research Directions

open access: yesApplied Sciences, 2023
Given the widespread use of the internet at the individual, governmental, and nongovernmental levels, and the opportunities it offers, such as online shopping, security concerns may arise.
Mariam Alhamed, M. M. Hafizur Rahman
doaj   +1 more source

ICVTest: A Practical Black-Box Penetration Testing Framework for Evaluating Cybersecurity of Intelligent Connected Vehicles

open access: yesApplied Sciences, 2023
Intelligent connected vehicles (ICVs) are equipped with extensive electronic control units which offer convenience but also pose significant cybersecurity risks. Penetration testing, recommended in ISO/SAE 21434 “Road vehicles—Cybersecurity engineering”,
Haichun Zhang   +5 more
doaj   +1 more source

Penetration Testing of Wireless Networks [PDF]

open access: yesKirkuk Journal of Science, 2016
This project focuses on performing security assessment on wireless networks, and to crack the password assigned to it. The idea of wireless network brings to mind lot of ways of attacking and penetrating a network compared to the traditionally wired ...
Mohammed F. Abdulqader, Adnan Y. Dawod
doaj   +1 more source

Optimal Filter Assignment Policy Against Distributed Denial of Service Attack on Router Mikrotik [PDF]

open access: yesMATEC Web of Conferences, 2022
Information technology is currently one of the things that almost all universities widely adopt. The development of information technology requires universities to manage potential resources effectively and efficiently. as stated in the regulation of the
Lutfi Salkin   +3 more
doaj   +1 more source

Reinforcement learning in VANET penetration testing

open access: yesResults in Engineering, 2023
The recent popularity of Connected and Autonomous Vehicles (CAV) corresponds with an increase in the risk of cyber-attacks. These cyber-attacks are instigated by white-coat hackers, and cyber-criminals.
Phillip Garrad, Saritha Unnikrishnan
doaj   +1 more source

Remote Penetration Testing with Telegram Bot

open access: yesJurnal RESTI (Rekayasa Sistem dan Teknologi Informasi), 2023
The widespread of websites and web applications makes them the main target of cyber attacks. One way to increase security is to perform a penetration test.
Naufal Hafiz   +4 more
doaj   +1 more source

PTVis: Visual Narrative and Auxiliary Decision to Assist in Comprehending the Penetration Testing Process

open access: yesIEEE Access, 2020
Due to the complexity of network penetration and the diversity of penetration methods, traditional analysis approaches analyse only a single penetration method or part of the network penetration process. Moreover, the lack of customized exploration makes
Sijie Zheng   +8 more
doaj   +1 more source

Automatic Verification and Execution of Cyber Attack on IoT Devices

open access: yesSensors, 2023
Internet of Things (IoT) devices are becoming a part of our daily life; from health monitors to critical infrastructure, they are used everywhere. This makes them ideal targets for malicious actors to exploit for nefarious purposes.
Fartein Lemjan Færøy   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy