Academic literature on the topic 'AI in Penetration Testing'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'AI in Penetration Testing.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "AI in Penetration Testing"
Khedkar, Samruddhi S., and Prof. D. G. Ingale. "Automated Penetration Testing." International Journal of Ingenious Research, Invention and Development (IJIRID) 5, no. 3 (2024): 299–305. https://doi.org/10.5281/zenodo.13988309.
Full textAlaryani,, Meera, Shamsa Alremeithi, Fatima Al Ali, and Richard Ikuesan. "PentHack: AI-Enabled Penetration Testing Platform for Knowledge Development." European Conference on Cyber Warfare and Security 23, no. 1 (2024): 27–36. http://dx.doi.org/10.34190/eccws.23.1.2493.
Full textPatil, Manaswi, Devaki Thakare, Arzoo Bhure, Shweta Kaundanyapure, and Dr Ankit Mune. "An AI-Based Approach for Automating Penetration Testing." International Journal for Research in Applied Science and Engineering Technology 12, no. 4 (2024): 5019–28. http://dx.doi.org/10.22214/ijraset.2024.61113.
Full textThapaliya, Suman, and Saroj Dhital. "AI-Augmented Penetration Testing: A New Frontier in Ethical Hacking." International Journal of Atharva 3, no. 2 (2025): 28–37. https://doi.org/10.3126/ija.v3i2.80099.
Full textSandeep, Phanireddy. "Advancing Security: Penetration Testing in Web Applications Powered by Artificial Intelligence." INTERNATIONAL JOURNAL OF INNOVATIVE RESEARCH AND CREATIVE TECHNOLOGY 6, no. 4 (2020): 1–7. https://doi.org/10.5281/zenodo.14787314.
Full textSiva Krishna Jampani. "Revolutionizing Penetration Testing: AI-Powered Automation for Enterprise Security." International Journal of Scientific Research in Computer Science, Engineering and Information Technology 10, no. 6 (2024): 1562–69. https://doi.org/10.32628/cseit241061201.
Full textHoffmann, Joerg. "Simulated Penetration Testing: From "Dijkstra" to "Turing Test++"." Proceedings of the International Conference on Automated Planning and Scheduling 25 (April 8, 2015): 364–72. http://dx.doi.org/10.1609/icaps.v25i1.13684.
Full textKumar CSA, Ayush. "Ethical Hacking and Penetration Testing." International Scientific Journal of Engineering and Management 04, no. 04 (2025): 1–9. https://doi.org/10.55041/isjem02790.
Full textChamberlain, David, and Ellis Casey. "Capture the Flag with ChatGPT: Security Testing with AI ChatBots." International Conference on Cyber Warfare and Security 19, no. 1 (2024): 43–54. http://dx.doi.org/10.34190/iccws.19.1.2171.
Full textKozlovska, Mariia, Andrian Piskozub, and Volodymyr Khoma. "Artificial intelligence in penetration testing: leveraging AI for advanced vulnerability detection and exploitation." Advances in Cyber-Physical Systems 10, no. 1 (2025): 65–70. https://doi.org/10.23939/acps2025.01.065.
Full textDissertations / Theses on the topic "AI in Penetration Testing"
Nilsson, Robin. "Penetration testing of Android applications." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-280290.
Full textMcCallum, Adrian Bruce. "Cone penetration testing in polar snow." Thesis, University of Cambridge, 2012. https://www.repository.cam.ac.uk/handle/1810/244073.
Full textLu, Yuebin. "Deep penetration microindentation testing of polymers." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 2000. http://www.collectionscanada.ca/obj/s4/f2/dsk1/tape4/PQDD_0019/NQ58147.pdf.
Full textVernersson, Susanne. "Penetration Testing in a Web Application Environment." Thesis, Linnéuniversitetet, Institutionen för datavetenskap, fysik och matematik, DFM, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-8934.
Full textFinke, Kimberly Ann. "Piezocone penetration testing in Piedmont residual soils." Thesis, Georgia Institute of Technology, 1998. http://hdl.handle.net/1853/21452.
Full textHepton, Peter. "Shear wave velocity measurements during penetration testing." Thesis, Bangor University, 1989. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.330070.
Full textDazet, Eric Francis. "ANEX: Automated Network Exploitation through Penetration Testing." DigitalCommons@CalPoly, 2016. https://digitalcommons.calpoly.edu/theses/1592.
Full textCameron, Booth Louis, and Matay Mayrany. "IoT Penetration Testing: Hacking an Electric Scooter." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-254613.
Full textPozza, Simone. "Penetration testing negli ambienti Windows e Active Directory." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2020.
Find full textEid, Walid Khaled. "Scaling effect in cone penetration testing in sand." Diss., Virginia Polytechnic Institute and State University, 1987. http://hdl.handle.net/10919/49849.
Full textBooks on the topic "AI in Penetration Testing"
Mayne, Paul W. Cone penetration testing. Transportation Research Board, National Research Council, 2007.
Find full textAllsopp, Wil. Advanced Penetration Testing. John Wiley & Sons, Inc., 2017. http://dx.doi.org/10.1002/9781119367741.
Full textMessier, Ric. Penetration Testing Basics. Apress, 2016. http://dx.doi.org/10.1007/978-1-4842-1857-0.
Full textOriyano, Sean-Philip. Penetration Testing Essentials. John Wiley & Sons, Inc., 2017. http://dx.doi.org/10.1002/9781119419358.
Full textRelan, Kunal. iOS Penetration Testing. Apress, 2016. http://dx.doi.org/10.1007/978-1-4842-2355-0.
Full textGottardi, Guido, and Laura Tonni. Cone Penetration Testing 2022. CRC Press, 2022. http://dx.doi.org/10.1201/9781003308829.
Full textGottardi, Guido, and Laura Tonni. Cone Penetration Testing 2022. CRC Press, 2022. http://dx.doi.org/10.1201/9781003329091.
Full textBook chapters on the topic "AI in Penetration Testing"
Tehranipoor, Mark, Kimia Zamiri Azar, Navid Asadizanjani, Fahim Rahman, Hadi Mardani Kamali, and Farimah Farahmandi. "SoC Security Verification Using Fuzz, Penetration, and AI Testing." In Hardware Security. Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-58687-3_4.
Full textElashmawi, Walaa H., Heba Osman, Mahmoud Osama, and Nour Nader. "Development Generative AI for Cybersecurity: Evaluating Script Generation and Attack Classification in Penetration Testing." In Lecture Notes in Networks and Systems. Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-77229-0_6.
Full textLa, Vinh Hoa, Wissam Mallouli, Manh Dung Nguyen, et al. "Enhancing IoT Security in 6G Networks: AI-Based Intrusion Detection, Penetration Testing, and Blockchain-Based Trust Management (Work-in-Progress Paper)." In IFIP Advances in Information and Communication Technology. Springer Nature Switzerland, 2024. https://doi.org/10.1007/978-3-031-82065-6_5.
Full textHaber, Morey J., and Brad Hibbert. "Penetration Testing." In Asset Attack Vectors. Apress, 2018. http://dx.doi.org/10.1007/978-1-4842-3627-7_10.
Full textRahalkar, Sagar Ajay. "Penetration Testing." In Certified Ethical Hacker (CEH) Foundation Guide. Apress, 2016. http://dx.doi.org/10.1007/978-1-4842-2325-3_7.
Full textCaddy, Tom. "Penetration Testing." In Encyclopedia of Cryptography and Security. Springer US, 2011. http://dx.doi.org/10.1007/978-1-4419-5906-5_214.
Full textWeik, Martin H. "penetration testing." In Computer Science and Communications Dictionary. Springer US, 2000. http://dx.doi.org/10.1007/1-4020-0613-6_13787.
Full textSheikh, Ahmed. "Penetration Testing." In Certified Ethical Hacker (CEH) Preparation Guide. Apress, 2021. http://dx.doi.org/10.1007/978-1-4842-7258-9_16.
Full textMoallem, Abbas. "Penetration Testing." In Understanding Cybersecurity Technologies. CRC Press, 2021. http://dx.doi.org/10.1201/9781003038429-17.
Full textEdwards, Dr Jason. "Penetration Testing." In Critical Security Controls for Effective Cyber Defense. Apress, 2024. http://dx.doi.org/10.1007/979-8-8688-0506-6_18.
Full textConference papers on the topic "AI in Penetration Testing"
Sivakoumar, R., and Samson Reyas M. P. "Next-Gen Penetration Testing: AI, Automation & Beyond." In 2025 International Conference on Data Science, Agents & Artificial Intelligence (ICDSAAI). IEEE, 2025. https://doi.org/10.1109/icdsaai65575.2025.11011887.
Full textSalem, Maher, and Mohammad Mrian. "AI-Driven Penetration Testing: Automating Exploits with LLMs and Metasploit-A VSFTPD Case Study." In 2025 International Conference on New Trends in Computing Sciences (ICTCS). IEEE, 2025. https://doi.org/10.1109/ictcs65341.2025.10989363.
Full textSun, Yue, Cong Hou, and Yuyue Su. "Research on the Penetration Testing Model in the Vertical Field Using Generative AI Technology." In 2024 IEEE 8th Conference on Energy Internet and Energy System Integration (EI2). IEEE, 2024. https://doi.org/10.1109/ei264398.2024.10990542.
Full textBianou, Stanislas G., and Rodrigue G. Batogna. "PENTEST-AI, an LLM-Powered Multi-Agents Framework for Penetration Testing Automation Leveraging Mitre Attack." In 2024 IEEE International Conference on Cyber Security and Resilience (CSR). IEEE, 2024. http://dx.doi.org/10.1109/csr61664.2024.10679480.
Full textWang, Wei-Che. "Legal, Policy, and Compliance Issues in Using AI for Security: Using Taiwan's Cybersecurity Management Act and Penetration Testing as Examples." In 2024 16th International Conference on Cyber Conflict: Over the Horizon (CyCon). IEEE, 2024. http://dx.doi.org/10.23919/cycon62501.2024.10685586.
Full textB M, Chandrakala, Annapurna P. Patil, Girija R, et al. "RESPLOIT FRAMEWORK FOR PENETRATION TESTING." In First International Conference on Computer, Computation and Communication (IC3C-2025). River Publishers, 2025. https://doi.org/10.13052/rp-9788743808268a006.
Full textHuang, Yu, Alex Yu, Louis Liu, and Xijiang Lin. "AI Driven Testing." In 2024 IEEE International Test Conference in Asia (ITC-Asia). IEEE, 2024. http://dx.doi.org/10.1109/itc-asia62534.2024.10661318.
Full textGardner, Evan, Gurmeet Singh, and Weihao Qu. "Penetration Testing Operating Systems: Exploiting Vulnerabilities." In 2024 International Conference on Communications, Computing, Cybersecurity, and Informatics (CCCI). IEEE, 2024. http://dx.doi.org/10.1109/ccci61916.2024.10736454.
Full textBadarneh, Hazem Jihad, Loai Ahmad Attiany, Mahmoud Asassfeh, et al. "The power of Network Penetration Testing." In 2024 25th International Arab Conference on Information Technology (ACIT). IEEE, 2024. https://doi.org/10.1109/acit62805.2024.10877214.
Full textVadla, Karthik, K. Gayathri Teja, Shaik Amanuddin, Anjali Bhatta, and M. Rajeshwar. "Integrating Penetration Testing Tools into a Website." In 2024 15th International Conference on Computing Communication and Networking Technologies (ICCCNT). IEEE, 2024. http://dx.doi.org/10.1109/icccnt61001.2024.10724706.
Full textReports on the topic "AI in Penetration Testing"
Wiemer, G. Cone penetration testing. Natural Resources Canada/ESS/Scientific and Technical Publishing Services, 2016. http://dx.doi.org/10.4095/297874.
Full textKurfurst, P. J., and D. J. Woeller. Cone Penetration Testing of Unit B. Natural Resources Canada/ESS/Scientific and Technical Publishing Services, 1991. http://dx.doi.org/10.4095/132230.
Full textClauss, D. B. Severe accident testing of electrical penetration assemblies. Office of Scientific and Technical Information (OSTI), 1989. http://dx.doi.org/10.2172/5265225.
Full textConstantine, Monica M., and Jacob W. Ulvila. Testing and Evaluating C3I Systems That Employ AI. Volume 2. Compendium of Lessons Learned from Testing AI Systems in the Army. Defense Technical Information Center, 1991. http://dx.doi.org/10.21236/ada266359.
Full textMacedo, Jorge, Paul Mayne, Sheng Dai, et al. Cone Penetration Testing for Illinois Subsurface Characterization and Geotechnical Design. Illinois Center for Transportation, 2024. http://dx.doi.org/10.36501/0197-9191/24-013.
Full textWilke, Rudeger, and Jia Belanger. Towards AI Based Data Classification for Decision Making During Testing. Office of Scientific and Technical Information (OSTI), 2025. https://doi.org/10.2172/2516874.
Full textAiken, Catherine. Classifying AI Systems. Center for Security and Emerging Technology, 2021. http://dx.doi.org/10.51593/20200025.
Full textRohay, V. J. Electronic cone penetration testing at the Hanford Site, 200 West Area. Office of Scientific and Technical Information (OSTI), 1993. http://dx.doi.org/10.2172/10177016.
Full textAdelman, Leonard, Jacob W. Ulvila, and Paul E. Lehner. Testing and Evaluating C3I Systems That Employ AI. Volume 1. Handbook for Testing Expert Systems. Defense Technical Information Center, 1991. http://dx.doi.org/10.21236/ada266358.
Full textUlvila, Jacob W., Leonard Adelman, Monica M. Constantine, Paul E. Lehner, and Elissa Gilbert. Testing and Evaluating C3I Systems That Employ AI. Volume 4. Published Articles. Defense Technical Information Center, 1991. http://dx.doi.org/10.21236/ada266361.
Full text