Results 61 to 70 of about 1,899 (129)

NASA IV&V's Cyber Range for Space Systems [PDF]

open access: yes
A cyber range is a virtual environment that is used for cyberwarfare training and cyber technology development. It provides tools that help strengthen the stability, security and performance of cyber infrastructures and IT systems.
Bailey, Brandon
core   +1 more source

Selection of penetration testing methodologies: A comparison and evaluation [PDF]

open access: yes, 2015
Cyber security is fast becoming a strategic priority across both governments and private organisations. With technology abundantly available, and the unbridled growth in the size and complexity of information systems, cyber criminals have a multitude of ...
Johnstone, Michael N, Shanley, Aleatha
core   +1 more source

Interpol review of digital evidence for 2019-2022. [PDF]

open access: yesForensic Sci Int Synerg, 2023
Reedy P.
europepmc   +1 more source

PENTEST LAB

open access: yes, 2017
The project consists of the development of a platform of virtualization of networks and services customizable on demand, with the aim of being able to develop tests of security audit in a controlled environment and to allow the auditor to observe and analyze in real time what happens in the environments test. This platform allows to initiate on demand,
openaire   +2 more sources

Privacy and Security in Multi-User Health Kiosks. [PDF]

open access: yesInt J Telerehabil, 2017
Takyi H   +4 more
europepmc   +1 more source

Introducción al pentesting

open access: yes, 2017
Treballs Finals de Grau d'Enginyeria Informàtica, Facultat de Matemàtiques, Universitat de Barcelona, Any: 2017, Director: Oriol Pujol ...
openaire   +1 more source

A Methodological Approach for Assessing Amplified Reflection Distributed Denial of Service on the Internet of Things. [PDF]

open access: yesSensors (Basel), 2016
Costa Gondim JJ   +4 more
europepmc   +1 more source

Pentesting Exercise Management Application

open access: yes, 2019
The Pentesting Exercise Management Application (PEMA) is a platform in which one may coordinate the planning, creation and execution of labs and tasks on the themes of hacking, malware-analysis and penetration testing. In this bachelor thesis, we were tasked with developing the foundation upon which our employer may continue to expand the ...
Berntsen, Sander Løken   +3 more
openaire   +1 more source

PASTA-4-PHT: a pipeline for automated security and technical audits for the personal health train. [PDF]

open access: yesBMC Med Inform Decis Mak
Welten S   +9 more
europepmc   +1 more source

Home - About - Disclaimer - Privacy