Results 41 to 50 of about 536,772 (338)

Penetration Testing Tangerang City Web Application With Implementing OWASP Top 10 Web Security Risks Framework

open access: yesJISA (Jurnal Informatika dan Sains), 2023
The speed of technological development has made it possible for all people to be connected to one another. The creation of web-based information systems that help in all areas, including government, health, and education, is one of the forces behind the ...
Yoel Armando, Rosalina Rosalina
doaj   +1 more source

Effect of Particle Size on Droplet Infiltration into Hydrophobic Porous Media As a Model of Water Repellent Soil [PDF]

open access: yes, 2011
The wettability of soil is of great importance for plants and soil biota, and in determining the risk for preferential flow, surface runoff, flooding,and soil erosion. The molarity of ethanol droplet (MED) test is widely used for quantifying the severity
Adamson A. W.   +24 more
core   +1 more source

A Survey on Penetration Path Planning in Automated Penetration Testing

open access: yesApplied Sciences
Penetration Testing (PT) is an effective proactive security technique that simulates hacker attacks to identify vulnerabilities in networks or systems. However, traditional PT relies on specialized experience and costs extraordinary time and effort. With
Ziyang Chen   +3 more
doaj   +1 more source

Penetration Testing Server Sistem Informasi Manajemen Dan Website Universitas Kristen Petra [PDF]

open access: yes, 2015
A developing organization need information technology in itsoperational activity. However what is often considered is how toensure that data saved in server is safe from unauthorized parties.Therefore, this thesis reviews how a person who is appointed as
Andjarwirawan, J. (Justinus)   +2 more
core  

Quantitative penetration testing with item response theory (extended version) [PDF]

open access: yes, 2013
Existing penetration testing approaches assess the vulnerability of a system by determining whether certain attack paths are possible in practice. Therefore, penetration testing has thus far been used as a qualitative research method.
Arnold, Florian   +2 more
core   +7 more sources

Clinical Insights Into Hypercalcemia of Malignancy in Childhood

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Hypercalcemia of malignancy (HCM) is a rare but life‐threatening metabolic emergency in children that occurs in less than 1% of pediatric cancer cases, with a reported incidence ranging from 0.4% to 1.0% across different studies. While it is observed in 10%–20% of adult malignancies, pediatric HCM remains relatively uncommon.
Hüseyin Anıl Korkmaz
wiley   +1 more source

Personalized Selumetinib Dosing in Pediatric Neurofibromatosis Type 1: Insights From a Pilot Therapeutic Drug Monitoring Study

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Objective To evaluate selumetinib exposure using therapeutic drug monitoring (TDM) in pediatric patients with neurofibromatosis type 1 (NF1) and plexiform neurofibromas (PN), assess interpatient pharmacokinetic variability, and explore the relationship between drug exposure, clinical response, and adverse effects.
Janka Kovács   +8 more
wiley   +1 more source

Development of a method for automated 5G and beyond network slices penetration testing

open access: yesРадіоелектронні і комп'ютерні системи
The subject of this article is penetration testing methodologies for 5G networks and beyond. The aim of this paper is to develop a methodology and software for automated penetration testing of the network infrastructure of next-generation cellular ...
Roman Odarchenko   +2 more
doaj   +1 more source

Deep Reinforcement Learning for Intelligent Penetration Testing Path Design

open access: yesApplied Sciences, 2023
Penetration testing is an important method to evaluate the security degree of a network system. The importance of penetration testing attack path planning lies in its ability to simulate attacker behavior, identify vulnerabilities, reduce potential ...
Junkai Yi, Xiaoyan Liu
doaj   +1 more source

Analisa Kerentanan pada Vulnerable docker dengan metode Vulnerability Scanning dan Penetration Testing menggunakan Opensource tools [PDF]

open access: yes, 2023
Salah satu teknologi dalam deployment yaitu docker. Docker adalah open source project yang dirancang untuk membantu application deployment dengan menggunakan software containers.
Al Mauqy, Abdurrahman Harish
core  

Home - About - Disclaimer - Privacy