Results 11 to 20 of about 525,062 (269)
Autonomous Penetration Testing Based on Improved Deep Q-Network
Penetration testing is an effective way to test and evaluate cybersecurity by simulating a cyberattack. However, the traditional methods deeply rely on domain expert knowledge, which requires prohibitive labor and time costs.
Shicheng Zhou +4 more
doaj +1 more source
A Real-Time Co-simulation Platform for Power CPS Based on Multi-component Parallel Architecture
For power cyber-physical system (CPS) formed by integration of traditional power systems and advanced information technology, the coupling between the power system on the physical side and the communication network on the information side are ...
Keting WAN +3 more
doaj +1 more source
The Impact of IPv6 on Penetration Testing [PDF]
In this paper we discuss the impact the use of IPv6 has on remote penetration testing of servers and web applications. Several modifications to the penetration testing process are proposed to accommodate IPv6.
Boer, Pieter-Tjerk de +3 more
core +4 more sources
Along with the increasing number of websites circulating on the Internet, the security holes that arise are also increasing. The Electrical Engineering Department's website is no exception, especially on the Electrical Engineering Department's website ...
Muhammad Alif Nabila +2 more
doaj +1 more source
Penetration testing is a security exercise aimed at assessing the security of a system by simulating attacks against it. So far, penetration testing has been carried out mainly by trained human attackers and its success critically depended on the ...
Fabio Massimo Zennaro, László Erdődi
doaj +1 more source
Penetration impact testing of self-reinforced composites [PDF]
Penetration impact resistance is one of the key advantages of self-reinforced composites. This is typically measured using the same setup as for brittle fibre composites.
Baets, J +4 more
core +1 more source
Web Application Penetration Testing Using SQL Injection Attack
A web application is a very important requirement in the information and digitalization era. With the increasing use of the internet and the growing number of web applications, every web application requires an adequate security level to store ...
Alde Alanda +4 more
doaj +1 more source
Reinforcement learning for efficient network penetration testing [PDF]
Penetration testing (also known as pentesting or PT) is a common practice for actively assessing the defenses of a computer network by planning and executing all possible attacks to discover and exploit existing vulnerabilities.
Chen, T., Ghanem, M.
core +3 more sources
Research on network security technology of industrial control system [PDF]
The relationship between industrial control system and Internet is becoming closer and closer, and its network security has attracted much attention. Penetration testing is an active network intrusion detection technology, which plays an indispensable ...
Jin Kai +4 more
doaj +1 more source
HARMer: Cyber-Attacks Automation and Evaluation
With the increasing growth of cyber-attack incidences, it is important to develop innovative and effective techniques to assess and defend networked systems against cyber attacks.
Simon Yusuf Enoch +5 more
doaj +1 more source

