Results 11 to 20 of about 525,062 (269)

Autonomous Penetration Testing Based on Improved Deep Q-Network

open access: yesApplied Sciences, 2021
Penetration testing is an effective way to test and evaluate cybersecurity by simulating a cyberattack. However, the traditional methods deeply rely on domain expert knowledge, which requires prohibitive labor and time costs.
Shicheng Zhou   +4 more
doaj   +1 more source

A Real-Time Co-simulation Platform for Power CPS Based on Multi-component Parallel Architecture

open access: yesZhongguo dianli, 2022
For power cyber-physical system (CPS) formed by integration of traditional power systems and advanced information technology, the coupling between the power system on the physical side and the communication network on the information side are ...
Keting WAN   +3 more
doaj   +1 more source

The Impact of IPv6 on Penetration Testing [PDF]

open access: yes, 2012
In this paper we discuss the impact the use of IPv6 has on remote penetration testing of servers and web applications. Several modifications to the penetration testing process are proposed to accommodate IPv6.
Boer, Pieter-Tjerk de   +3 more
core   +4 more sources

Analysis and Implementation of the ISSAF Framework on OSSTMM on Website Security Vulnerabilities Testing in Polinema

open access: yesJurnal Jaringan Telekomunikasi, 2023
Along with the increasing number of websites circulating on the Internet, the security holes that arise are also increasing. The Electrical Engineering Department's website is no exception, especially on the Electrical Engineering Department's website ...
Muhammad Alif Nabila   +2 more
doaj   +1 more source

Modelling penetration testing with reinforcement learning using capture‐the‐flag challenges: Trade‐offs between model‐free learning and a priori knowledge

open access: yesIET Information Security, 2023
Penetration testing is a security exercise aimed at assessing the security of a system by simulating attacks against it. So far, penetration testing has been carried out mainly by trained human attackers and its success critically depended on the ...
Fabio Massimo Zennaro, László Erdődi
doaj   +1 more source

Penetration impact testing of self-reinforced composites [PDF]

open access: yes, 2014
Penetration impact resistance is one of the key advantages of self-reinforced composites. This is typically measured using the same setup as for brittle fibre composites.
Baets, J   +4 more
core   +1 more source

Web Application Penetration Testing Using SQL Injection Attack

open access: yesJOIV: International Journal on Informatics Visualization, 2021
A web application is a very important requirement in the information and digitalization era. With the increasing use of the internet and the growing number of web applications, every web application requires an adequate security level to store ...
Alde Alanda   +4 more
doaj   +1 more source

Reinforcement learning for efficient network penetration testing [PDF]

open access: yes, 2019
Penetration testing (also known as pentesting or PT) is a common practice for actively assessing the defenses of a computer network by planning and executing all possible attacks to discover and exploit existing vulnerabilities.
Chen, T., Ghanem, M.
core   +3 more sources

Research on network security technology of industrial control system [PDF]

open access: yesMATEC Web of Conferences, 2022
The relationship between industrial control system and Internet is becoming closer and closer, and its network security has attracted much attention. Penetration testing is an active network intrusion detection technology, which plays an indispensable ...
Jin Kai   +4 more
doaj   +1 more source

HARMer: Cyber-Attacks Automation and Evaluation

open access: yesIEEE Access, 2020
With the increasing growth of cyber-attack incidences, it is important to develop innovative and effective techniques to assess and defend networked systems against cyber attacks.
Simon Yusuf Enoch   +5 more
doaj   +1 more source

Home - About - Disclaimer - Privacy