Works matching DE "PENETRATION testing (Computer security)"
Results: 90
Cybersecurity Implications of IT and OT Convergence.
- Published in:
- Chemical Engineering, 2025, v. 122, n. 3, p. 28
- By:
- Publication type:
- Article
Efficient network attack path optimization method based on prior knowledge-based PPO algorithm.
- Published in:
- Cybersecurity (2523-3246), 2025, v. 8, n. 1, p. 1, doi. 10.1186/s42400-024-00288-8
- By:
- Publication type:
- Article
PenQA: A Comprehensive Instructional Dataset for Enhancing Penetration Testing Capabilities in Language Models.
- Published in:
- Applied Sciences (2076-3417), 2025, v. 15, n. 4, p. 2117, doi. 10.3390/app15042117
- By:
- Publication type:
- Article
Cybersecurity in the Dental Office: A Holistic Approach.
- Published in:
- Compendium of Continuing Education in Dentistry (15488578), 2018, v. 39, n. 6, p. 348
- By:
- Publication type:
- Article
VULNERABILITY ASSESSMENT AND PENETRATION TESTING ON THE XYZ WEBSITE USING NIST 800-115 STANDARD.
- Published in:
- Journal of Syntax Literate, 2022, v. 7, n. 1, p. 520, doi. 10.36418/syntax-literate.v7i1.5800
- By:
- Publication type:
- Article
Ready, Set, Sprint: US DOL Announces the Cybersecurity Sprint.
- Published in:
- 2022
- By:
- Publication type:
- Proceeding
A Downside to Red Teaming.
- Published in:
- ISSA Journal, 2016, v. 14, n. 12, p. 8
- By:
- Publication type:
- Article
Why Information Security Teams Fail.
- Published in:
- ISSA Journal, 2016, v. 14, n. 2, p. 28
- By:
- Publication type:
- Article
Assessment of Stress History of Jiangsu Clay Deposits from Seismic Piezocone Penetration Testing (SCPTU) Data.
- Published in:
- Marine Georesources & Geotechnology, 2015, v. 33, n. 4, p. 304, doi. 10.1080/1064119X.2013.872741
- By:
- Publication type:
- Article
Automated Penetration Testing Framework for Smart-Home-Based IoT Devices.
- Published in:
- Future Internet, 2022, v. 14, n. 5, p. N.PAG, doi. 10.3390/fi14100276
- By:
- Publication type:
- Article
Quantitative Penetration Testing with Item Response Theory.
- Published in:
- Journal of Information Assurance & Security, 2014, v. 9, n. 3, p. 118
- By:
- Publication type:
- Article
Quasar Remote Access Trojan feature extraction depending on Ethical Hacking.
- Published in:
- Technium, 2022, v. 4, n. 1, p. 68
- By:
- Publication type:
- Article
Interval-Valued Neutrosophic Sets-Based IVNS-RAM Method for Enhanced Security Evaluation in Computer Networks.
- Published in:
- Neutrosophic Sets & Systems, 2025, v. 77, p. 479
- By:
- Publication type:
- Article
Preventing Data Breaches by Learning from Competitors.
- Published in:
- CPA Journal, 2023, v. 93, n. 7/8, p. 74
- By:
- Publication type:
- Article
IVQF<sub>IoT</sub>: An intelligent vulnerability quantification framework for scoring internet of things vulnerabilities.
- Published in:
- Expert Systems, 2022, v. 39, n. 5, p. 1, doi. 10.1111/exsy.12829
- By:
- Publication type:
- Article
Ethical Hacking Solution to Defeat Cyber Attacks.
- Published in:
- Petroleum - Gas University of Ploiesti Bulletin, Technical Series, 2018, v. 70, n. 2, p. 29
- By:
- Publication type:
- Article
Enabling secure and efficient industry 4.0 transformation through trust-authorized anomaly detection in cloud environments with a hybrid AI approach.
- Published in:
- Optical & Quantum Electronics, 2024, v. 56, n. 2, p. 1, doi. 10.1007/s11082-023-05781-x
- By:
- Publication type:
- Article
基于元操作的智能合约漏洞检测方法.
- Published in:
- Electronic Science & Technology, 2024, v. 37, n. 9, p. 64, doi. 10.16180/j.cnki.issn1007-7820.2024.09.010
- By:
- Publication type:
- Article
DETERMINATION OF GSM SIGNAL PENETRATION LOSS IN SOME SELECTED BUILDINGS IN RIVERS STATE, NIGERIA.
- Published in:
- Nigerian Journal of Technology, 2015, v. 34, n. 3, p. 609, doi. 10.4314/njt.v34i3.26
- By:
- Publication type:
- Article
Distributed code behavior vulnerability with nano science fuzzy scanning algorithm based on machine learning.
- Published in:
- Applied Nanoscience, 2023, v. 13, n. 3, p. 2073, doi. 10.1007/s13204-021-02119-5
- By:
- Publication type:
- Article
Security Awareness in Smart Homes and Internet of Things Networks through Swarm-Based Cybersecurity Penetration Testing.
- Published in:
- Information (2078-2489), 2023, v. 14, n. 10, p. 536, doi. 10.3390/info14100536
- By:
- Publication type:
- Article
A Novel System Hardening Technique Against Malicious Penetration Attempts.
- Published in:
- IUP Journal of Computer Sciences, 2014, v. 8, n. 1, p. 7
- By:
- Publication type:
- Article
DETECTING SECURITY VULNERABILITIES ON INTERNET-CONNECTED DEVICES.
- Published in:
- Annals of DAAAM & Proceedings, 2023, v. 34, p. 103, doi. 10.2507/34th.daaam.proceedings.015
- By:
- Publication type:
- Article
Cyber-Attack Penetration Test and Vulnerability Analysis.
- Published in:
- International Journal of Online Engineering, 2017, v. 13, n. 1, p. 125, doi. 10.3991/ijoe.v13i01.6407
- By:
- Publication type:
- Article
Sugar as an Analogue for Snow in Penetration Testing: A Preliminary Comparison.
- Published in:
- Powders, 2022, v. 1, n. 1, p. 33, doi. 10.3390/powders1010004
- By:
- Publication type:
- Article
Discernment and Enumeration of Security Vulnerabilities Present in Docker Images.
- Published in:
- Grenze International Journal of Engineering & Technology (GIJET), 2024, v. 10, n. 2, Part 2, p. 754
- By:
- Publication type:
- Article
Vulnerability Scanning by CPE-CVE Matching.
- Published in:
- Grenze International Journal of Engineering & Technology (GIJET), 2024, v. 10, n. 1, Part 2, p. 1289
- By:
- Publication type:
- Article
Freedom to Hack.
- Published in:
- Ohio State Law Journal, 2019, v. 80, n. 3, p. 455
- By:
- Publication type:
- Article
Establishing IoT Cyber Hygiene Frameworks with Continuous Monitoring and Risk Assessment in Smart City Infrastructures.
- Published in:
- International Journal of Wireless & Ad Hoc Communication, 2023, v. 7, n. 2, p. 41, doi. 10.54216/IJWAC.070203
- By:
- Publication type:
- Article
Security Validation in OpenStack: A Comprehensive Evaluation.
- Published in:
- Journal of Cybersecurity & Information Management, 2024, v. 14, n. 1, p. 79, doi. 10.54216/JCIM.140106
- By:
- Publication type:
- Article
Modelling and Intelligent Decision of Partially Observable Penetration Testing for System Security Verification.
- Published in:
- Systems, 2024, v. 12, n. 12, p. 546, doi. 10.3390/systems12120546
- By:
- Publication type:
- Article
Vulnerability analysis based on Software Bill of Materials (SBOM): A model proposal for automated vulnerability scanning for CI/CD pipelines.
- Published in:
- International Journal of Information Security Science, 2024, v. 13, n. 2, p. 33, doi. 10.55859/ijiss.1455039
- By:
- Publication type:
- Article
ETHICAL HACKING OF WIRELESS NETWORKS IN KALI LINUX ENVIRONMENT.
- Published in:
- Annals of the Faculty of Engineering Hunedoara - International Journal of Engineering, 2018, v. 16, n. 3, p. 181
- By:
- Publication type:
- Article
Penetration Testing Framework using the Q Learning Ensemble Deep CNN Discriminator Framework.
- Published in:
- International Journal of Advanced Computer Science & Applications, 2024, v. 15, n. 3, p. 845, doi. 10.14569/ijacsa.2024.0150385
- By:
- Publication type:
- Article
GPS diving computer for underwater tracking and mapping.
- Published in:
- Underwater Technology, 2012, v. 30, n. 4, p. 189, doi. 10.3723/ut.30.189
- By:
- Publication type:
- Article
COMPUTER SYSTEMS TECHNOLOGIES USED IN TOURISM ACTIVITIES.
- Published in:
- Annals (Constanţa Maritime University), 2016, v. 17, n. 25, p. 239
- By:
- Publication type:
- Article
Enhancing Microservice Security Through Vulnerability-Driven Trust in the Service Mesh Architecture.
- Published in:
- Sensors (14248220), 2025, v. 25, n. 3, p. 914, doi. 10.3390/s25030914
- By:
- Publication type:
- Article
Analysis of Autonomous Penetration Testing Through Reinforcement Learning and Recommender Systems.
- Published in:
- Sensors (14248220), 2025, v. 25, n. 1, p. 211, doi. 10.3390/s25010211
- By:
- Publication type:
- Article
Editorial: AI meets cybersecurity.
- Published in:
- 2023
- By:
- Publication type:
- Editorial
Hierarchical reinforcement learning for efficient and effective automated penetration testing of large networks.
- Published in:
- Journal of Intelligent Information Systems, 2023, v. 60, n. 2, p. 281, doi. 10.1007/s10844-022-00738-0
- By:
- Publication type:
- Article
Why do young people start and continue with ethical hacking? A qualitative study on individual and social aspects in the lives of ethical hackers.
- Published in:
- Criminology & Public Policy, 2023, v. 22, n. 4, p. 803, doi. 10.1111/1745-9133.12650
- By:
- Publication type:
- Article
AN ONLINE SQL VULNERABILITY ASSESSMENT TOOL AND IT'S IMPACT ON SMEs.
- Published in:
- International Journal of Advanced Research in Computer Science, 2022, v. 13, n. 5, p. 23, doi. 10.26483/ijarcs.v13i5.6903
- By:
- Publication type:
- Article
Penetration Testing -- Reconnaissance with NMAP Tool.
- Published in:
- International Journal of Advanced Research in Computer Science, 2017, v. 8, n. 3, p. 844
- By:
- Publication type:
- Article
Penetration Testing Exploitation of Windows XP SP0.
- Published in:
- International Journal of Advanced Research in Computer Science, 2017, v. 8, n. 3, p. 839
- By:
- Publication type:
- Article
A study on Penetration Testing.
- Published in:
- International Journal of Advanced Research in Computer Science, 2011, v. 2, n. 5, p. 396
- By:
- Publication type:
- Article
Washington's Cyber Quandary.
- Published in:
- Journal: American Water Works Association, 2024, v. 116, n. 4, p. 5, doi. 10.1002/awwa.2259
- By:
- Publication type:
- Article
DAVS: Dockerfile Analysis for Container Image Vulnerability Scanning.
- Published in:
- Computers, Materials & Continua, 2022, v. 72, n. 1, p. 1699, doi. 10.32604/cmc.2022.025096
- By:
- Publication type:
- Article
INVESTIGATION OF THE METHOD OF EVALUATING THE EFFECTIVENESS OF THE INFORMATION SECURITY SYSTEM BASED ON FUZZY INFERENCE.
- Published in:
- Scientific Journal of Astana IT University, 2023, v. 13, p. 52, doi. 10.37943/13DZEV3953
- By:
- Publication type:
- Article
Conception of Security Defence in Integrated Video Monitoring Systems for Railways.
- Published in:
- Railway Signalling & Communication Engineering, 2024, v. 21, n. 6, p. 53, doi. 10.3969/j.issn.1673-4440.2024.06.009
- By:
- Publication type:
- Article
An Automated Penetration Testing Framework Based on Hierarchical Reinforcement Learning.
- Published in:
- Electronics (2079-9292), 2024, v. 13, n. 21, p. 4311, doi. 10.3390/electronics13214311
- By:
- Publication type:
- Article