Found: 76
Select item for more details and to access through your institution.
Innovating Resilience.
- Published in:
- ISACA Journal, 2021, n. 3, p. 14
- By:
- Publication type:
- Article
DETERMINATION OF GSM SIGNAL PENETRATION LOSS IN SOME SELECTED BUILDINGS IN RIVERS STATE, NIGERIA.
- Published in:
- Nigerian Journal of Technology, 2015, v. 34, n. 3, p. 609, doi. 10.4314/njt.v34i3.26
- By:
- Publication type:
- Article
COMPUTER SYSTEMS TECHNOLOGIES USED IN TOURISM ACTIVITIES.
- Published in:
- Annals (Constanţa Maritime University), 2016, v. 17, n. 25, p. 239
- By:
- Publication type:
- Article
Cybersecurity in the Dental Office: A Holistic Approach.
- Published in:
- Compendium of Continuing Education in Dentistry (15488578), 2018, v. 39, n. 6, p. 348
- By:
- Publication type:
- Article
Enhancing Web Application Security through Automated Penetration Testing with Multiple Vulnerability Scanners.
- Published in:
- Computers (2073-431X), 2023, v. 12, n. 11, p. 235, doi. 10.3390/computers12110235
- By:
- Publication type:
- Article
Distributed Attack Deployment Capability for Modern Automated Penetration Testing.
- Published in:
- Computers (2073-431X), 2022, v. 11, n. 3, p. 33, doi. 10.3390/computers11030033
- By:
- Publication type:
- Article
Distributed code behavior vulnerability with nano science fuzzy scanning algorithm based on machine learning.
- Published in:
- Applied Nanoscience, 2023, v. 13, n. 3, p. 2073, doi. 10.1007/s13204-021-02119-5
- By:
- Publication type:
- Article
Penetration Testing Framework using the Q Learning Ensemble Deep CNN Discriminator Framework.
- Published in:
- International Journal of Advanced Computer Science & Applications, 2024, v. 15, n. 3, p. 845, doi. 10.14569/ijacsa.2024.0150385
- By:
- Publication type:
- Article
Development of Cyber-Attack Scenarios for Nuclear Power Plants Using Scenario Graphs.
- Published in:
- International Journal of Distributed Sensor Networks, 2015, v. 2015, p. 1, doi. 10.1155/2015/836258
- By:
- Publication type:
- Article
The "Ethics" of Teaching Ethical Hacking.
- Published in:
- Journal of International Technology & Information Management, 2013, v. 22, n. 4, p. 67, doi. 10.58729/1941-6679.1021
- By:
- Publication type:
- Article
Iran's Strategic Penetration of Latin America.
- Published in:
- 2016
- By:
- Publication type:
- Book Review
INVESTIGATION OF THE METHOD OF EVALUATING THE EFFECTIVENESS OF THE INFORMATION SECURITY SYSTEM BASED ON FUZZY INFERENCE.
- Published in:
- Scientific Journal of Astana IT University, 2023, v. 13, p. 52, doi. 10.37943/13DZEV3953
- By:
- Publication type:
- Article
Sugar as an Analogue for Snow in Penetration Testing: A Preliminary Comparison.
- Published in:
- Powders, 2022, v. 1, n. 1, p. 33, doi. 10.3390/powders1010004
- By:
- Publication type:
- Article
Washington's Cyber Quandary.
- Published in:
- Journal: American Water Works Association, 2024, v. 116, n. 4, p. 5, doi. 10.1002/awwa.2259
- By:
- Publication type:
- Article
Comprehensive Security for IoT Devices with Kubernetes and Raspberry Pi Cluster.
- Published in:
- Electronics (2079-9292), 2024, v. 13, n. 9, p. 1613, doi. 10.3390/electronics13091613
- By:
- Publication type:
- Article
Enhancing Zero Trust Models in the Financial Industry through Blockchain Integration: A Proposed Framework.
- Published in:
- Electronics (2079-9292), 2024, v. 13, n. 5, p. 865, doi. 10.3390/electronics13050865
- By:
- Publication type:
- Article
Detection of Web Cross-Site Scripting (XSS) Attacks.
- Published in:
- Electronics (2079-9292), 2022, v. 11, n. 14, p. N.PAG, doi. 10.3390/electronics11142212
- By:
- Publication type:
- Article
An Environment-Specific Prioritization Model for Information-Security Vulnerabilities Based on Risk Factor Analysis.
- Published in:
- Electronics (2079-9292), 2022, v. 11, n. 9, p. N.PAG, doi. 10.3390/electronics11091334
- By:
- Publication type:
- Article
Validation and application of empirical Shear wave velocity models based on standard penetration test.
- Published in:
- Computational Methods in Civil Engineering, 2013, v. 4, n. 1, p. 25
- By:
- Publication type:
- Article
Cyber-Attack Penetration Test and Vulnerability Analysis.
- Published in:
- International Journal of Online Engineering, 2017, v. 13, n. 1, p. 125, doi. 10.3991/ijoe.v13i01.6407
- By:
- Publication type:
- Article
Ethical hacking for IoT: Security issues, challenges, solutions and recommendations.
- Published in:
- Internet of Things & Cyber Physical Systems, 2023, v. 3, p. 280, doi. 10.1016/j.iotcps.2023.04.002
- By:
- Publication type:
- Article
Shore Up Your Cybersecurity: The Cybersecurity and Infrastructure Security Agency provides resources for organizations to enhance their resilience.
- Published in:
- Strategic Finance, 2023, v. 105, n. 6, p. 56
- By:
- Publication type:
- Article
HACKING BACK: REEVALUATING THE LEGALITY OF RETALIATORY CYBERATTACKS.
- Published in:
- George Washington International Law Review, 2014, v. 46, n. 1, p. 199
- By:
- Publication type:
- Article
VULNERABILITY ASSESSMENT AND PENETRATION TESTING ON THE XYZ WEBSITE USING NIST 800-115 STANDARD.
- Published in:
- Journal of Syntax Literate, 2022, v. 7, n. 1, p. 520, doi. 10.36418/syntax-literate.v7i1.5800
- By:
- Publication type:
- Article
Research on Security Weakness Using Penetration Testing in a Distributed Firewall.
- Published in:
- Sensors (14248220), 2023, v. 23, n. 5, p. 2683, doi. 10.3390/s23052683
- By:
- Publication type:
- Article
Automatic Verification and Execution of Cyber Attack on IoT Devices.
- Published in:
- Sensors (14248220), 2023, v. 23, n. 2, p. 733, doi. 10.3390/s23020733
- By:
- Publication type:
- Article
Inner Profile Measurement for Pipes Using Penetration Testing.
- Published in:
- Sensors (14248220), 2019, v. 19, n. 2, p. 237, doi. 10.3390/s19020237
- By:
- Publication type:
- Article
.Ethical Hacking in Information Security Curricula.
- Published in:
- International Journal of Information & Communication Technology Education, 2016, v. 12, n. 1, p. 1, doi. 10.4018/IJICTE.2016010101
- By:
- Publication type:
- Article
Enhancing IoT security in wireless local area networks through dynamic vulnerability scanning.
- Published in:
- Sādhanā: Academy Proceedings in Engineering Sciences, 2024, v. 49, n. 3, p. 1, doi. 10.1007/s12046-024-02534-8
- By:
- Publication type:
- Article
Security Validation in OpenStack: A Comprehensive Evaluation.
- Published in:
- Journal of Cybersecurity & Information Management, 2024, v. 14, n. 1, p. 79, doi. 10.54216/JCIM.140106
- By:
- Publication type:
- Article
Why do young people start and continue with ethical hacking? A qualitative study on individual and social aspects in the lives of ethical hackers.
- Published in:
- Criminology & Public Policy, 2023, v. 22, n. 4, p. 803, doi. 10.1111/1745-9133.12650
- By:
- Publication type:
- Article
A Survey on Penetration Path Planning in Automated Penetration Testing.
- Published in:
- Applied Sciences (2076-3417), 2024, v. 14, n. 18, p. 8355, doi. 10.3390/app14188355
- By:
- Publication type:
- Article
A Vulnerability Scanning Method for Web Services in Embedded Firmware.
- Published in:
- Applied Sciences (2076-3417), 2024, v. 14, n. 6, p. 2373, doi. 10.3390/app14062373
- By:
- Publication type:
- Article
A Systematic Literature Review on Penetration Testing in Networks: Future Research Directions.
- Published in:
- Applied Sciences (2076-3417), 2023, v. 13, n. 12, p. 6986, doi. 10.3390/app13126986
- By:
- Publication type:
- Article
Cascaded Reinforcement Learning Agents for Large Action Spaces in Autonomous Penetration Testing.
- Published in:
- Applied Sciences (2076-3417), 2022, v. 12, n. 21, p. 11265, doi. 10.3390/app122111265
- By:
- Publication type:
- Article
Improved Deep Recurrent Q-Network of POMDPs for Automated Penetration Testing.
- Published in:
- Applied Sciences (2076-3417), 2022, v. 12, n. 20, p. N.PAG, doi. 10.3390/app122010339
- By:
- Publication type:
- Article
A Comparative Study of Web Application Security Parameters: Current Trends and Future Directions.
- Published in:
- Applied Sciences (2076-3417), 2022, v. 12, n. 8, p. 4077, doi. 10.3390/app12084077
- By:
- Publication type:
- Article
Preventing Data Breaches by Learning from Competitors.
- Published in:
- CPA Journal, 2023, v. 93, n. 7/8, p. 74
- By:
- Publication type:
- Article
Quantitative Penetration Testing with Item Response Theory.
- Published in:
- Journal of Information Assurance & Security, 2014, v. 9, n. 3, p. 118
- By:
- Publication type:
- Article
Ethical Hacking Solution to Defeat Cyber Attacks.
- Published in:
- Petroleum - Gas University of Ploiesti Bulletin, Technical Series, 2018, v. 70, n. 2, p. 29
- By:
- Publication type:
- Article
ETHICS VS MORALITY.
- Published in:
- ITNOW, 2018, v. 60, n. 2, p. 44, doi. 10.1093/itnow/bwy051
- By:
- Publication type:
- Article
ADVENTURES IN ETHICAL HACKING.
- Published in:
- ITNOW, 2016, v. 58, n. 3, p. 36, doi. 10.1093/itnow/bww074
- By:
- Publication type:
- Article
Bridging the Gap: A Survey and Classification of Research-Informed Ethical Hacking Tools.
- Published in:
- Journal of Cybersecurity & Privacy, 2024, v. 4, n. 3, p. 410, doi. 10.3390/jcp4030021
- By:
- Publication type:
- Article
DAVS: Dockerfile Analysis for Container Image Vulnerability Scanning.
- Published in:
- Computers, Materials & Continua, 2022, v. 72, n. 1, p. 1699, doi. 10.32604/cmc.2022.025096
- By:
- Publication type:
- Article
Conception of Security Defence in Integrated Video Monitoring Systems for Railways.
- Published in:
- Railway Signalling & Communication Engineering, 2024, v. 21, n. 6, p. 53, doi. 10.3969/j.issn.1673-4440.2024.06.009
- By:
- Publication type:
- Article
Ready, Set, Sprint: US DOL Announces the Cybersecurity Sprint.
- Published in:
- 2022
- By:
- Publication type:
- Proceeding
A Downside to Red Teaming.
- Published in:
- ISSA Journal, 2016, v. 14, n. 12, p. 8
- By:
- Publication type:
- Article
Why Information Security Teams Fail.
- Published in:
- ISSA Journal, 2016, v. 14, n. 2, p. 28
- By:
- Publication type:
- Article
IVQF<sub>IoT</sub>: An intelligent vulnerability quantification framework for scoring internet of things vulnerabilities.
- Published in:
- Expert Systems, 2022, v. 39, n. 5, p. 1, doi. 10.1111/exsy.12829
- By:
- Publication type:
- Article
GPS diving computer for underwater tracking and mapping.
- Published in:
- Underwater Technology, 2012, v. 30, n. 4, p. 189, doi. 10.3723/ut.30.189
- By:
- Publication type:
- Article