Results 1 to 10 of about 536,772 (338)

Cascaded Reinforcement Learning Agents for Large Action Spaces in Autonomous Penetration Testing [PDF]

open access: gold, 2022
Khuong Tran   +6 more
openalex   +1 more source

PENETRATION TESTING

open access: yes, 2023
This slide deck provides a deep dive into penetration testing with a focus on the capabilities of Kali Linux. The slides begin with an overview and then divide into information gathering, vulnerability analysis, exploitation, and post-exploitation tools.
openaire   +1 more source

Network Penetration Testing and Research [PDF]

open access: yes
This paper will focus the on research and testing done on penetrating a network for security purposes. This research will provide the IT security office new methods of attacks across and against a company's network as well as introduce them to new ...
Murphy, Brandon F.
core   +1 more source

Automated Penetration Testing Framework for Smart-Home-Based IoT Devices [PDF]

open access: gold, 2022
Rohit Akhilesh   +3 more
openalex   +1 more source

Efficient and Standardized Alarm Rationalization for Cybersecurity Monitoring

open access: yesIEEE Access
Threat monitoring in cybersecurity systems is often jeopardized by alarm flooding, which frequently occurs in Security Information and Event Management (SIEM) solutions due to the unnecessary annunciation of numerous logs and event data from a variety of
Sarah Alabdulhadi, Ali Al-Matouq
doaj   +1 more source

Automated Windows domain penetration method based on reinforcement learning

open access: yes网络与信息安全学报, 2023
Windows domain provides a unified system service for resource sharing and information interaction among users.However, this also introduces significant security risks while facilitating intranet management.In recent years, intranet attacks targeting ...
Lige ZHAN   +4 more
doaj  

Penetration Testing

open access: yesTHE BULLETIN, 2018
Morey J. Haber, Brad Hibbert
  +5 more sources

Enhancing Website Security Using Vulnerability Assessment and Penetration Testing (VAPT) Based on OWASP Top Ten

open access: yesJournal of Applied Informatics and Computing
Website security is one of the main concerns in the digital era, given the increasing potential for cyber threats. This research aims to improve website security by using the Vulnerability Assessment and Penetration Testing (VAPT) method that refers to ...
Diana Rohmaniah   +3 more
doaj   +1 more source

On protection of Freedom's solar dynamic radiator from the orbital debris environment. Part 1: Preliminary analyses and testing [PDF]

open access: yes
A great deal of experimentation and analysis was performed to quantify penetration thresholds of components which will experience orbital debris impacts.
Christiansen, Eric L.   +2 more
core   +1 more source

Home - About - Disclaimer - Privacy