Results 11 to 20 of about 536,772 (338)
CIPHER: Cybersecurity Intelligent Penetration-Testing Helper for Ethical Researcher [PDF]
Penetration testing, a critical component of cybersecurity, typically requires extensive time and effort to find vulnerabilities. Beginners in this field often benefit from collaborative approaches with the community or experts.
Derry Pratama +6 more
doaj +2 more sources
Vulnerability Assessment and Penetration Testing on Student Service Center System [PDF]
The number of system breaches has recently increased across various sectors, including the education sector. These breaches are carried out through various methods such as SQL Injection, XSS Attack, web defacement, malware, and others.
Khairunnisak Isnaini +3 more
doaj +2 more sources
Autonomous Penetration Testing Based on Improved Deep Q-Network
Penetration testing is an effective way to test and evaluate cybersecurity by simulating a cyberattack. However, the traditional methods deeply rely on domain expert knowledge, which requires prohibitive labor and time costs.
Shicheng Zhou +4 more
doaj +3 more sources
A Systematic Literature Review on Penetration Testing in Networks: Future Research Directions
Given the widespread use of the internet at the individual, governmental, and nongovernmental levels, and the opportunities it offers, such as online shopping, security concerns may arise.
Mariam Alhamed, M. M. Hafizur Rahman
doaj +1 more source
Intelligent connected vehicles (ICVs) are equipped with extensive electronic control units which offer convenience but also pose significant cybersecurity risks. Penetration testing, recommended in ISO/SAE 21434 “Road vehicles—Cybersecurity engineering”,
Haichun Zhang +5 more
doaj +1 more source
Penetration Testing of Wireless Networks [PDF]
This project focuses on performing security assessment on wireless networks, and to crack the password assigned to it. The idea of wireless network brings to mind lot of ways of attacking and penetrating a network compared to the traditionally wired ...
Mohammed F. Abdulqader, Adnan Y. Dawod
doaj +1 more source
Optimal Filter Assignment Policy Against Distributed Denial of Service Attack on Router Mikrotik [PDF]
Information technology is currently one of the things that almost all universities widely adopt. The development of information technology requires universities to manage potential resources effectively and efficiently. as stated in the regulation of the
Lutfi Salkin +3 more
doaj +1 more source
Reinforcement learning in VANET penetration testing
The recent popularity of Connected and Autonomous Vehicles (CAV) corresponds with an increase in the risk of cyber-attacks. These cyber-attacks are instigated by white-coat hackers, and cyber-criminals.
Phillip Garrad, Saritha Unnikrishnan
doaj +1 more source
Due to the complexity of network penetration and the diversity of penetration methods, traditional analysis approaches analyse only a single penetration method or part of the network penetration process. Moreover, the lack of customized exploration makes
Sijie Zheng +8 more
doaj +1 more source
Remote Penetration Testing with Telegram Bot
The widespread of websites and web applications makes them the main target of cyber attacks. One way to increase security is to perform a penetration test.
Naufal Hafiz +4 more
doaj +1 more source

