Results 1 to 10 of about 1,849 (84)

Generative Adversarial Network (GAN)-Based Autonomous Penetration Testing for Web Applications [PDF]

open access: yesSensors, 2023
The web application market has shown rapid growth in recent years. The expansion of Wireless Sensor Networks (WSNs) and the Internet of Things (IoT) has created new web-based communication and sensing frameworks. Current security research utilizes source
Ankur Chowdhary   +2 more
doaj   +2 more sources

Analysis of Autonomous Penetration Testing Through Reinforcement Learning and Recommender Systems [PDF]

open access: yesSensors
Conducting penetration testing (pentesting) in cybersecurity is a crucial turning point for identifying vulnerabilities within the framework of Information Technology (IT), where real malicious offensive behavior is simulated to identify potential ...
Ariadna Claudia Moreno   +7 more
doaj   +2 more sources

Reverse Engineering and Security Evaluation of Commercial Tags for RFID-Based IoT Applications [PDF]

open access: yesSensors, 2016
The Internet of Things (IoT) is a distributed system of physical objects that requires the seamless integration of hardware (e.g., sensors, actuators, electronics) and network communications in order to collect and exchange data.
Tiago M. Fernández-Caramés   +3 more
doaj   +2 more sources

Refining the PoinTER “human firewall” pentesting framework [PDF]

open access: yesInformation and Computer Security, 2019
PurposePenetration tests have become a valuable tool in the cyber security defence strategy, in terms of detecting vulnerabilities. Although penetration testing has traditionally focused on technical aspects, the field has started to realise the ...
Karen Renaud
exaly   +5 more sources

CIPHER: Cybersecurity Intelligent Penetration-Testing Helper for Ethical Researcher [PDF]

open access: yesSensors
Penetration testing, a critical component of cybersecurity, typically requires extensive time and effort to find vulnerabilities. Beginners in this field often benefit from collaborative approaches with the community or experts.
Derry Pratama   +6 more
doaj   +2 more sources

Automated Computer Network Exploitation with Bayesian Decision Networks

open access: yesProceedings of the International Florida Artificial Intelligence Research Society Conference, 2022
Penetration Testing (pentesting) is the process of using tactics and techniques to penetrate computer systems and networks to expose any issues in their cybersecurity \cite{rsa}.
Graeme Roberts, Gilbert Peterson
doaj   +1 more source

GDL90fuzz: Fuzzing - GDL-90 Data Interface Specification Within Aviation Software and Avionics Devices–A Cybersecurity Pentesting Perspective

open access: yesIEEE Access, 2022
As the core technology of next-generation air transportation systems, the Automatic Dependent Surveillance-Broadcast (ADS-B) is becoming very popular.
Hannu Turtiainen   +3 more
doaj   +1 more source

Survey on Reverse‐Engineering Tools for Android Mobile Devices

open access: yesMathematical Problems in Engineering, Volume 2022, Issue 1, 2022., 2022
With the presence of the Internet and the frequent use of mobile devices to send several transactions that involve personal and sensitive information, it becomes of great importance to consider the security aspects of mobile devices. And with the increasing use of mobile applications that are utilized for several purposes such as healthcare or banking,
Ashwag Albakri   +7 more
wiley   +1 more source

Seguridad informática, metodologías, estándares y marco de gestión en un enfoque hacia las aplicaciones web

open access: yesRevista Científica y Tecnológica UPSE, 2022
Existen diferentes métodos para evaluar la seguridad de las aplicaciones Web, principalmente basados en algún técnico automatizado de escaneo  El objetivo de la presente investigación refiere de los conceptos básicos necesarios para entender temas de ...
Ivan Coronel Suárez   +1 more
doaj   +1 more source

Vulnerabilidades de las cookies en aplicaciones web: Redes Sociales y Streaming

open access: yesInformática y Sistemas, 2023
El objetivo de esta investigación fue analizar la vulnerabilidad de los ataques relacionados con el Id de sesión y el uso de cookies en ataques Cross Site Request Forgery (CSRF) simulando un ciberataque real en un entorno controlado.
Aura Dolores Zambrano Rendón   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy