Results 31 to 40 of about 1,899 (129)
Benchmarking Of Pentesting Tools
{"references": ["Verizon Enterprise. 2016 Data Breach Investigations Report. Report,\nVerizon Enterprise, July 2016.", "A. Sagala and E. Manurung. Testing and Comparing Result\nScanning Using Web Vulnerability Scanner. Advanced Science Letters,\n21(11):3458\u20133462, November 2015.", "P. Baral.
Vega, Esteban Alejandro Armas +2 more
openaire +2 more sources
Herramientas DNP3 pentesting para redes de infraestructura critica
Este artículo presenta un conjunto de herramientas de software que son capaces de realizar actividades Pentesting en la infraestructura crítica del sector eléctrico mediante el protocolo DNP3. Las herramientas son capaces de comprobar la capacidad de los
M. Sánchez +1 more
doaj
Automated Vulnerability Exploitation Using Deep Reinforcement Learning
The main objective of this paper is to develop a reinforcement agent capable of effectively exploiting a specific vulnerability. Automating pentesting can reduce the cost and time of the operation.
Anas AlMajali +5 more
doaj +1 more source
A Study On API Security Pentesting [PDF]
Application Programming Interfaces (APIs) are essential in the digital realm as the bridge enabling seamless communication and collaboration between diverse software applications.
Asemi, Hadi
core +1 more source
Storytelling Opportunities in Teaching Cybersecurity
Modern threats are shifting the focus of information security from the technical component to the social context to a greater extent. In the process of cyber defense training, a number of the most pressing challenges can be identified, involving the use ...
T. I. Payusova
doaj +1 more source
The rapid adoption of e-government systems has increased the exposure of government web applications to cybersecurity threats with the lack of security-focused implementation.
Arizal +2 more
doaj +1 more source
Environnements de tests d’intrusion pour mobiles et tablettes [PDF]
L’objectif de ce travail est de réaliser une recherche des possibilités actuelles de tests d’intrusion mobiles. Après avoir recherché les technologies existantes, nous les analysons et les comparons afin de proposer un outil complet.
Bocchi, Yann, Vianin, Jérémie
core
Les POMDP font de meilleurs hackers: Tenir compte de l'incertitude dans les tests de penetration [PDF]
Penetration Testing is a methodology for assessing network security, by generating and executing possible hacking attacks. Doing so automatically allows for regular and systematic testing. A key question is how to generate the attacks.
Buffet, Olivier +2 more
core +3 more sources
Static Pentesting of Android Application
Mobile application use has become increasingly common, particularly android is the most well known working framework being utilized. The portable application is getting developed in all areas like social insurance, individual consideration, Gaming, Business, and so forth, and these applications need the client to give their own information, wherein the
Pooja P, Puneeth K M
openaire +1 more source
Langaton lähiverkko ja tietoturva [PDF]
Opinnäyteyön tarkoituksena oli perehtyä 802.11-standardiin pohjautuvan langattoman lähiverkon toimintaan ja tutkia yleisimpien langattomiin lähiverkkoihin kohdistuvien hyökkäysten toimintaperiaatetta.
Hätönen, Nico
core

