Works matching DE "PENETRATION testing (Computer security)"
Results: 92
Cybersecurity in the Dental Office: A Holistic Approach.
- Published in:
- Compendium of Continuing Education in Dentistry (15488578), 2018, v. 39, n. 6, p. 348
- By:
- Publication type:
- Article
基于元操作的智能合约漏洞检测方法.
- Published in:
- Electronic Science & Technology, 2024, v. 37, n. 9, p. 64, doi. 10.16180/j.cnki.issn1007-7820.2024.09.010
- By:
- Publication type:
- Article
Conception of Security Defence in Integrated Video Monitoring Systems for Railways.
- Published in:
- Railway Signalling & Communication Engineering, 2024, v. 21, n. 6, p. 53, doi. 10.3969/j.issn.1673-4440.2024.06.009
- By:
- Publication type:
- Article
Washington's Cyber Quandary.
- Published in:
- Journal: American Water Works Association, 2024, v. 116, n. 4, p. 5, doi. 10.1002/awwa.2259
- By:
- Publication type:
- Article
Discernment and Enumeration of Security Vulnerabilities Present in Docker Images.
- Published in:
- Grenze International Journal of Engineering & Technology (GIJET), 2024, v. 10, n. 2, Part 2, p. 754
- By:
- Publication type:
- Article
Vulnerability Scanning by CPE-CVE Matching.
- Published in:
- Grenze International Journal of Engineering & Technology (GIJET), 2024, v. 10, n. 1, Part 2, p. 1289
- By:
- Publication type:
- Article
Hacking Exposed: Leveraging Google Dorks, Shodan, and Censys for Cyber Attacks and the Defense Against Them.
- Published in:
- Computers (2073-431X), 2025, v. 14, n. 1, p. 24, doi. 10.3390/computers14010024
- By:
- Publication type:
- Article
Enhancing Web Application Security through Automated Penetration Testing with Multiple Vulnerability Scanners.
- Published in:
- Computers (2073-431X), 2023, v. 12, n. 11, p. 235, doi. 10.3390/computers12110235
- By:
- Publication type:
- Article
Distributed Attack Deployment Capability for Modern Automated Penetration Testing.
- Published in:
- Computers (2073-431X), 2022, v. 11, n. 3, p. 33, doi. 10.3390/computers11030033
- By:
- Publication type:
- Article
Penetration Testing Framework using the Q Learning Ensemble Deep CNN Discriminator Framework.
- Published in:
- International Journal of Advanced Computer Science & Applications, 2024, v. 15, n. 3, p. 845, doi. 10.14569/ijacsa.2024.0150385
- By:
- Publication type:
- Article
Automated Penetration Testing Framework for Smart-Home-Based IoT Devices.
- Published in:
- Future Internet, 2022, v. 14, n. 5, p. N.PAG, doi. 10.3390/fi14100276
- By:
- Publication type:
- Article
COMPUTER SYSTEMS TECHNOLOGIES USED IN TOURISM ACTIVITIES.
- Published in:
- Annals (Constanţa Maritime University), 2016, v. 17, n. 25, p. 239
- By:
- Publication type:
- Article
DETECTING SECURITY VULNERABILITIES ON INTERNET-CONNECTED DEVICES.
- Published in:
- Annals of DAAAM & Proceedings, 2023, v. 34, p. 103, doi. 10.2507/34th.daaam.proceedings.015
- By:
- Publication type:
- Article
Optimal Application of Fault Current Limiters for Assuring Overcurrent Relays Coordination with Distributed Generations.
- Published in:
- Arabian Journal for Science & Engineering (Springer Science & Business Media B.V. ), 2016, v. 41, n. 9, p. 3381, doi. 10.1007/s13369-015-1917-1
- By:
- Publication type:
- Article
Cybersecurity Implications of IT and OT Convergence.
- Published in:
- Chemical Engineering, 2025, v. 122, n. 3, p. 28
- By:
- Publication type:
- Article
Super-Resolution Ptychography with Small Segmented Detectors.
- Published in:
- Microscopy & Microanalysis, 2025, v. 31, n. 1, p. 1, doi. 10.1093/mam/ozae134
- By:
- Publication type:
- Article
DAVS: Dockerfile Analysis for Container Image Vulnerability Scanning.
- Published in:
- Computers, Materials & Continua, 2022, v. 72, n. 1, p. 1699, doi. 10.32604/cmc.2022.025096
- By:
- Publication type:
- Article
EVALUATION OF NETWORK AND SYSTEMS SECURITY USING PENETRATION TESTING IN A SIMULATION ENVIRONMENT.
- Published in:
- Computer Science & Telecommunications, 2018, v. 55, n. 3, p. 3
- By:
- Publication type:
- Article
VULNERABILITY ASSESSMENT AND PENETRATION TESTING ON THE XYZ WEBSITE USING NIST 800-115 STANDARD.
- Published in:
- Journal of Syntax Literate, 2022, v. 7, n. 1, p. 520, doi. 10.36418/syntax-literate.v7i1.5800
- By:
- Publication type:
- Article
PenQA: A Comprehensive Instructional Dataset for Enhancing Penetration Testing Capabilities in Language Models.
- Published in:
- Applied Sciences (2076-3417), 2025, v. 15, n. 4, p. 2117, doi. 10.3390/app15042117
- By:
- Publication type:
- Article
VULREM: Fine-Tuned BERT-Based Source-Code Potential Vulnerability Scanning System to Mitigate Attacks in Web Applications.
- Published in:
- Applied Sciences (2076-3417), 2024, v. 14, n. 21, p. 9697, doi. 10.3390/app14219697
- By:
- Publication type:
- Article
A Survey on Penetration Path Planning in Automated Penetration Testing.
- Published in:
- Applied Sciences (2076-3417), 2024, v. 14, n. 18, p. 8355, doi. 10.3390/app14188355
- By:
- Publication type:
- Article
A Vulnerability Scanning Method for Web Services in Embedded Firmware.
- Published in:
- Applied Sciences (2076-3417), 2024, v. 14, n. 6, p. 2373, doi. 10.3390/app14062373
- By:
- Publication type:
- Article
A Systematic Literature Review on Penetration Testing in Networks: Future Research Directions.
- Published in:
- Applied Sciences (2076-3417), 2023, v. 13, n. 12, p. 6986, doi. 10.3390/app13126986
- By:
- Publication type:
- Article
Cascaded Reinforcement Learning Agents for Large Action Spaces in Autonomous Penetration Testing.
- Published in:
- Applied Sciences (2076-3417), 2022, v. 12, n. 21, p. 11265, doi. 10.3390/app122111265
- By:
- Publication type:
- Article
Improved Deep Recurrent Q-Network of POMDPs for Automated Penetration Testing.
- Published in:
- Applied Sciences (2076-3417), 2022, v. 12, n. 20, p. N.PAG, doi. 10.3390/app122010339
- By:
- Publication type:
- Article
A Comparative Study of Web Application Security Parameters: Current Trends and Future Directions.
- Published in:
- Applied Sciences (2076-3417), 2022, v. 12, n. 8, p. 4077, doi. 10.3390/app12084077
- By:
- Publication type:
- Article
Distributed code behavior vulnerability with nano science fuzzy scanning algorithm based on machine learning.
- Published in:
- Applied Nanoscience, 2023, v. 13, n. 3, p. 2073, doi. 10.1007/s13204-021-02119-5
- By:
- Publication type:
- Article
GPS diving computer for underwater tracking and mapping.
- Published in:
- Underwater Technology, 2012, v. 30, n. 4, p. 189, doi. 10.3723/ut.30.189
- By:
- Publication type:
- Article
Security Awareness in Smart Homes and Internet of Things Networks through Swarm-Based Cybersecurity Penetration Testing.
- Published in:
- Information (2078-2489), 2023, v. 14, n. 10, p. 536, doi. 10.3390/info14100536
- By:
- Publication type:
- Article
A Cybersecurity Approach for Evaluating Mobile Agents.
- Published in:
- Journal of Applied Security Research, 2017, v. 12, n. 2, p. 253, doi. 10.1080/19361610.2017.1277868
- By:
- Publication type:
- Article
Editorial: AI meets cybersecurity.
- Published in:
- 2023
- By:
- Publication type:
- Editorial
Hierarchical reinforcement learning for efficient and effective automated penetration testing of large networks.
- Published in:
- Journal of Intelligent Information Systems, 2023, v. 60, n. 2, p. 281, doi. 10.1007/s10844-022-00738-0
- By:
- Publication type:
- Article
Establishing IoT Cyber Hygiene Frameworks with Continuous Monitoring and Risk Assessment in Smart City Infrastructures.
- Published in:
- International Journal of Wireless & Ad Hoc Communication, 2023, v. 7, n. 2, p. 41, doi. 10.54216/IJWAC.070203
- By:
- Publication type:
- Article
Security Validation in OpenStack: A Comprehensive Evaluation.
- Published in:
- Journal of Cybersecurity & Information Management, 2024, v. 14, n. 1, p. 79, doi. 10.54216/JCIM.140106
- By:
- Publication type:
- Article
Ethical hacking for IoT: Security issues, challenges, solutions and recommendations.
- Published in:
- Internet of Things & Cyber Physical Systems, 2023, v. 3, p. 280, doi. 10.1016/j.iotcps.2023.04.002
- By:
- Publication type:
- Article
Modelling and Intelligent Decision of Partially Observable Penetration Testing for System Security Verification.
- Published in:
- Systems, 2024, v. 12, n. 12, p. 546, doi. 10.3390/systems12120546
- By:
- Publication type:
- Article
IVQF<sub>IoT</sub>: An intelligent vulnerability quantification framework for scoring internet of things vulnerabilities.
- Published in:
- Expert Systems, 2022, v. 39, n. 5, p. 1, doi. 10.1111/exsy.12829
- By:
- Publication type:
- Article
Assessment of Stress History of Jiangsu Clay Deposits from Seismic Piezocone Penetration Testing (SCPTU) Data.
- Published in:
- Marine Georesources & Geotechnology, 2015, v. 33, n. 4, p. 304, doi. 10.1080/1064119X.2013.872741
- By:
- Publication type:
- Article
Quantitative Penetration Testing with Item Response Theory.
- Published in:
- Journal of Information Assurance & Security, 2014, v. 9, n. 3, p. 118
- By:
- Publication type:
- Article
Freedom to Hack.
- Published in:
- Ohio State Law Journal, 2019, v. 80, n. 3, p. 455
- By:
- Publication type:
- Article
Efficient network attack path optimization method based on prior knowledge-based PPO algorithm.
- Published in:
- Cybersecurity (2523-3246), 2025, v. 8, n. 1, p. 1, doi. 10.1186/s42400-024-00288-8
- By:
- Publication type:
- Article
Assume Breach to Gain Advantage.
- Published in:
- ISACA Journal, 2025, n. 1, p. 6
- By:
- Publication type:
- Article
Innovating Resilience.
- Published in:
- ISACA Journal, 2021, n. 3, p. 14
- By:
- Publication type:
- Article
An Automated Penetration Testing Framework Based on Hierarchical Reinforcement Learning.
- Published in:
- Electronics (2079-9292), 2024, v. 13, n. 21, p. 4311, doi. 10.3390/electronics13214311
- By:
- Publication type:
- Article
Comprehensive Security for IoT Devices with Kubernetes and Raspberry Pi Cluster.
- Published in:
- Electronics (2079-9292), 2024, v. 13, n. 9, p. 1613, doi. 10.3390/electronics13091613
- By:
- Publication type:
- Article
Enhancing Zero Trust Models in the Financial Industry through Blockchain Integration: A Proposed Framework.
- Published in:
- Electronics (2079-9292), 2024, v. 13, n. 5, p. 865, doi. 10.3390/electronics13050865
- By:
- Publication type:
- Article
Detection of Web Cross-Site Scripting (XSS) Attacks.
- Published in:
- Electronics (2079-9292), 2022, v. 11, n. 14, p. N.PAG, doi. 10.3390/electronics11142212
- By:
- Publication type:
- Article
An Environment-Specific Prioritization Model for Information-Security Vulnerabilities Based on Risk Factor Analysis.
- Published in:
- Electronics (2079-9292), 2022, v. 11, n. 9, p. N.PAG, doi. 10.3390/electronics11091334
- By:
- Publication type:
- Article
Information Security in Wireless Network and Ethical Hacking.
- Published in:
- International Journal of Computer Science & Management Studies, 2021, v. 42, n. 2, p. 4
- By:
- Publication type:
- Article