Results 11 to 20 of about 1,899 (129)
Semilleros de investigación en educación virtual
Los retos que la educación basada en ambien- tes virtuales de aprendizaje impone a las insti- tuciones educativas que incorporan programas bajo mediación virtual, exigen construir con los estudiantes un escenario de promoción de la investigación ...
Sandra Patricia Castiblanco +1 more
doaj +1 more source
The THREAT-ARREST Cyber-Security Training Platform [PDF]
Cyber security is always a main concern for critical infrastructures and nation-wide safety and sustainability. Thus, advanced cyber ranges and security training is becoming imperative for the involved organizations.
ASA-M Al-Ghamdi +10 more
core +1 more source
Reinforcement learning for efficient network penetration testing [PDF]
Penetration testing (also known as pentesting or PT) is a common practice for actively assessing the defenses of a computer network by planning and executing all possible attacks to discover and exploit existing vulnerabilities.
Chen, T., Ghanem, M.
core +3 more sources
Pentesting using Ethical Hacking techniques in IPv6 networks
Through this article the results of a research project are shown, carrying out a pentesting using ethical hacking techniques in networks implemented in the IP Protocol version 6 (IPv6), through a GNU / Linux security distribution tool IT, BackTrack ...
Jorge Armando Rojas Osorio +2 more
doaj +1 more source
Para el desarrollo de la investigación se realizaron pruebas de seguridad haciendo uso del Ethical Hacking como enfoque metodológico para determinar vulnerabilidades existentes en los sistemas operativos de Windows y Android, haciendo uso de las ...
Jorge Veloz +3 more
doaj +1 more source
Smart Computer Security Audit: Reinforcement Learning with a Deep Neural Network Approximator [PDF]
A significant challenge in modern computer security is the growing skill gap as intruder capabilities increase, making it necessary to begin automating elements of penetration testing so analysts can contend with the growing number of cyber threats.
Alonso, E. +4 more
core
AI for the Common Good?! Pitfalls, challenges, and ethics pen-testing
Recently, many AI researchers and practitioners have embarked on research visions that involve doing AI for “Good”. This is part of a general drive towards infusing AI research and practice with ethical thinking.
Berendt Bettina
doaj +1 more source
A methodology for testing virtualisation security [PDF]
There is a growing interest in virtualisation due to its central role in cloud computing, virtual desktop environments and Green IT. Data centres and cloud computing utilise this technology to run multiple operating systems on one physical server, thus ...
Coull, Natalie +2 more
core +2 more sources
POINTER:a GDPR-compliant framework for human pentesting (for SMEs) [PDF]
Penetration tests have become a valuable tool in any organisation’s arsenal, in terms of detecting vulnerabilities in their technical defences. Many organisations now also “penetration test” their employees, assessing their resilience and ability to ...
Archibald, Jacqueline, Renaud, K.
core +3 more sources
iOS Applications Testing - Multivocal Sources [PDF]
Appendix of conference paper: Ivans Kulesovs, iOS Applications Testing,
Kulesovs, Ivans
core +1 more source

