Results 11 to 20 of about 1,899 (129)

Semilleros de investigación en educación virtual

open access: yesCITAS, 2020
Los retos que la educación basada en ambien- tes virtuales de aprendizaje impone a las insti- tuciones educativas que incorporan programas bajo mediación virtual, exigen construir con los estudiantes un escenario de promoción de la investigación ...
Sandra Patricia Castiblanco   +1 more
doaj   +1 more source

The THREAT-ARREST Cyber-Security Training Platform [PDF]

open access: yes, 2020
Cyber security is always a main concern for critical infrastructures and nation-wide safety and sustainability. Thus, advanced cyber ranges and security training is becoming imperative for the involved organizations.
ASA-M Al-Ghamdi   +10 more
core   +1 more source

Reinforcement learning for efficient network penetration testing [PDF]

open access: yes, 2019
Penetration testing (also known as pentesting or PT) is a common practice for actively assessing the defenses of a computer network by planning and executing all possible attacks to discover and exploit existing vulnerabilities.
Chen, T., Ghanem, M.
core   +3 more sources

Pentesting using Ethical Hacking techniques in IPv6 networks

open access: yesRevista Ingenio, 2016
Through this article the results of a research project are shown, carrying out a pentesting using ethical hacking techniques in networks implemented in the IP Protocol version 6 (IPv6), through a GNU / Linux security distribution tool IT, BackTrack ...
Jorge Armando Rojas Osorio   +2 more
doaj   +1 more source

Ethical hacking, una metodología para descubrir fallas de seguridad en sistemas informáticos mediante la herramienta KALI-LINUX

open access: yesInformática y Sistemas, 2017
Para el desarrollo de la investigación se realizaron pruebas de seguridad haciendo uso del Ethical Hacking como enfoque metodológico para determinar vulnerabilidades existentes en los sistemas operativos de Windows y Android, haciendo uso de las ...
Jorge Veloz   +3 more
doaj   +1 more source

Smart Computer Security Audit: Reinforcement Learning with a Deep Neural Network Approximator [PDF]

open access: yes, 2020
A significant challenge in modern computer security is the growing skill gap as intruder capabilities increase, making it necessary to begin automating elements of penetration testing so analysts can contend with the growing number of cyber threats.
Alonso, E.   +4 more
core  

AI for the Common Good?! Pitfalls, challenges, and ethics pen-testing

open access: yesPaladyn, 2019
Recently, many AI researchers and practitioners have embarked on research visions that involve doing AI for “Good”. This is part of a general drive towards infusing AI research and practice with ethical thinking.
Berendt Bettina
doaj   +1 more source

A methodology for testing virtualisation security [PDF]

open access: yes, 2017
There is a growing interest in virtualisation due to its central role in cloud computing, virtual desktop environments and Green IT. Data centres and cloud computing utilise this technology to run multiple operating systems on one physical server, thus ...
Coull, Natalie   +2 more
core   +2 more sources

POINTER:a GDPR-compliant framework for human pentesting (for SMEs) [PDF]

open access: yes, 2018
Penetration tests have become a valuable tool in any organisation’s arsenal, in terms of detecting vulnerabilities in their technical defences. Many organisations now also “penetration test” their employees, assessing their resilience and ability to ...
Archibald, Jacqueline, Renaud, K.
core   +3 more sources

iOS Applications Testing - Multivocal Sources [PDF]

open access: yes, 2011
Appendix of conference paper: Ivans Kulesovs, iOS Applications Testing,
Kulesovs, Ivans
core   +1 more source

Home - About - Disclaimer - Privacy