Results 31 to 40 of about 1,899 (129)

Benchmarking Of Pentesting Tools

open access: yes, 2017
{"references": ["Verizon Enterprise. 2016 Data Breach Investigations Report. Report,\nVerizon Enterprise, July 2016.", "A. Sagala and E. Manurung. Testing and Comparing Result\nScanning Using Web Vulnerability Scanner. Advanced Science Letters,\n21(11):3458\u20133462, November 2015.", "P. Baral.
Vega, Esteban Alejandro Armas   +2 more
openaire   +2 more sources

Herramientas DNP3 pentesting para redes de infraestructura critica

open access: yesIngenierías USBMed, 2016
Este artículo presenta un conjunto de herramientas de software que son capaces de realizar actividades Pentesting en la infraestructura crítica del sector eléctrico mediante el protocolo DNP3. Las herramientas son capaces de comprobar la capacidad de los
M. Sánchez   +1 more
doaj  

Automated Vulnerability Exploitation Using Deep Reinforcement Learning

open access: yesApplied Sciences
The main objective of this paper is to develop a reinforcement agent capable of effectively exploiting a specific vulnerability. Automating pentesting can reduce the cost and time of the operation.
Anas AlMajali   +5 more
doaj   +1 more source

A Study On API Security Pentesting [PDF]

open access: yes, 2023
Application Programming Interfaces (APIs) are essential in the digital realm as the bridge enabling seamless communication and collaboration between diverse software applications.
Asemi, Hadi
core   +1 more source

Storytelling Opportunities in Teaching Cybersecurity

open access: yesВысшее образование в России
Modern threats are shifting the focus of information security from the technical component to the social context to a greater extent. In the process of cyber defense training, a number of the most pressing challenges can be identified, involving the use ...
T. I. Payusova
doaj   +1 more source

Security Analysis of Indonesian Region Government Web Applications Based on NIST SP 800-115 and WSTG v4.2

open access: yesJournal of Information Systems and Informatics
The rapid adoption of e-government systems has increased the exposure of government web applications to cybersecurity threats with the lack of security-focused implementation.
Arizal   +2 more
doaj   +1 more source

Environnements de tests d’intrusion pour mobiles et tablettes [PDF]

open access: yes, 2017
L’objectif de ce travail est de réaliser une recherche des possibilités actuelles de tests d’intrusion mobiles. Après avoir recherché les technologies existantes, nous les analysons et les comparons afin de proposer un outil complet.
Bocchi, Yann, Vianin, Jérémie
core  

Les POMDP font de meilleurs hackers: Tenir compte de l'incertitude dans les tests de penetration [PDF]

open access: yes, 2012
Penetration Testing is a methodology for assessing network security, by generating and executing possible hacking attacks. Doing so automatically allows for regular and systematic testing. A key question is how to generate the attacks.
Buffet, Olivier   +2 more
core   +3 more sources

Static Pentesting of Android Application

open access: yesInternational Journal of Recent Technology and Engineering (IJRTE), 2020
Mobile application use has become increasingly common, particularly android is the most well known working framework being utilized. The portable application is getting developed in all areas like social insurance, individual consideration, Gaming, Business, and so forth, and these applications need the client to give their own information, wherein the
Pooja P, Puneeth K M
openaire   +1 more source

Langaton lähiverkko ja tietoturva [PDF]

open access: yes, 2018
Opinnäyteyön tarkoituksena oli perehtyä 802.11-standardiin pohjautuvan langattoman lähiverkon toimintaan ja tutkia yleisimpien langattomiin lähiverkkoihin kohdistuvien hyökkäysten toimintaperiaatetta.
Hätönen, Nico
core  

Home - About - Disclaimer - Privacy