Results 111 to 120 of about 1,899 (129)
Some of the next articles are maybe not open access.
Test and Pentesting Methods for Identifying Vulnerabilities in IoT Devices: A Systematic Review
Lecture Notes in Networks and SystemsWilfredo Ticona
exaly
PenGym: Realistic training environment for reinforcement learning pentesting agents
Computers and SecurityKento Hasegawa +2 more
exaly
Generative AI for pentesting: the good, the bad, the ugly
International Journal of Information SecuritySami Azam, Bharanidharan Shanmugam
exaly

