Results 1 to 10 of about 1,849 (84)
Generative Adversarial Network (GAN)-Based Autonomous Penetration Testing for Web Applications [PDF]
The web application market has shown rapid growth in recent years. The expansion of Wireless Sensor Networks (WSNs) and the Internet of Things (IoT) has created new web-based communication and sensing frameworks. Current security research utilizes source
Ankur Chowdhary +2 more
doaj +2 more sources
Analysis of Autonomous Penetration Testing Through Reinforcement Learning and Recommender Systems [PDF]
Conducting penetration testing (pentesting) in cybersecurity is a crucial turning point for identifying vulnerabilities within the framework of Information Technology (IT), where real malicious offensive behavior is simulated to identify potential ...
Ariadna Claudia Moreno +7 more
doaj +2 more sources
Reverse Engineering and Security Evaluation of Commercial Tags for RFID-Based IoT Applications [PDF]
The Internet of Things (IoT) is a distributed system of physical objects that requires the seamless integration of hardware (e.g., sensors, actuators, electronics) and network communications in order to collect and exchange data.
Tiago M. Fernández-Caramés +3 more
doaj +2 more sources
Refining the PoinTER “human firewall” pentesting framework [PDF]
PurposePenetration tests have become a valuable tool in the cyber security defence strategy, in terms of detecting vulnerabilities. Although penetration testing has traditionally focused on technical aspects, the field has started to realise the ...
Karen Renaud
exaly +5 more sources
CIPHER: Cybersecurity Intelligent Penetration-Testing Helper for Ethical Researcher [PDF]
Penetration testing, a critical component of cybersecurity, typically requires extensive time and effort to find vulnerabilities. Beginners in this field often benefit from collaborative approaches with the community or experts.
Derry Pratama +6 more
doaj +2 more sources
Automated Computer Network Exploitation with Bayesian Decision Networks
Penetration Testing (pentesting) is the process of using tactics and techniques to penetrate computer systems and networks to expose any issues in their cybersecurity \cite{rsa}.
Graeme Roberts, Gilbert Peterson
doaj +1 more source
As the core technology of next-generation air transportation systems, the Automatic Dependent Surveillance-Broadcast (ADS-B) is becoming very popular.
Hannu Turtiainen +3 more
doaj +1 more source
Survey on Reverse‐Engineering Tools for Android Mobile Devices
With the presence of the Internet and the frequent use of mobile devices to send several transactions that involve personal and sensitive information, it becomes of great importance to consider the security aspects of mobile devices. And with the increasing use of mobile applications that are utilized for several purposes such as healthcare or banking,
Ashwag Albakri +7 more
wiley +1 more source
Existen diferentes métodos para evaluar la seguridad de las aplicaciones Web, principalmente basados en algún técnico automatizado de escaneo El objetivo de la presente investigación refiere de los conceptos básicos necesarios para entender temas de ...
Ivan Coronel Suárez +1 more
doaj +1 more source
Vulnerabilidades de las cookies en aplicaciones web: Redes Sociales y Streaming
El objetivo de esta investigación fue analizar la vulnerabilidad de los ataques relacionados con el Id de sesión y el uso de cookies en ataques Cross Site Request Forgery (CSRF) simulando un ciberataque real en un entorno controlado.
Aura Dolores Zambrano Rendón +4 more
doaj +1 more source

