Journal articles on the topic 'AI in Penetration Testing'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'AI in Penetration Testing.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Khedkar, Samruddhi S., and Prof. D. G. Ingale. "Automated Penetration Testing." International Journal of Ingenious Research, Invention and Development (IJIRID) 5, no. 3 (2024): 299–305. https://doi.org/10.5281/zenodo.13988309.
Full textAlaryani,, Meera, Shamsa Alremeithi, Fatima Al Ali, and Richard Ikuesan. "PentHack: AI-Enabled Penetration Testing Platform for Knowledge Development." European Conference on Cyber Warfare and Security 23, no. 1 (2024): 27–36. http://dx.doi.org/10.34190/eccws.23.1.2493.
Full textPatil, Manaswi, Devaki Thakare, Arzoo Bhure, Shweta Kaundanyapure, and Dr Ankit Mune. "An AI-Based Approach for Automating Penetration Testing." International Journal for Research in Applied Science and Engineering Technology 12, no. 4 (2024): 5019–28. http://dx.doi.org/10.22214/ijraset.2024.61113.
Full textThapaliya, Suman, and Saroj Dhital. "AI-Augmented Penetration Testing: A New Frontier in Ethical Hacking." International Journal of Atharva 3, no. 2 (2025): 28–37. https://doi.org/10.3126/ija.v3i2.80099.
Full textSandeep, Phanireddy. "Advancing Security: Penetration Testing in Web Applications Powered by Artificial Intelligence." INTERNATIONAL JOURNAL OF INNOVATIVE RESEARCH AND CREATIVE TECHNOLOGY 6, no. 4 (2020): 1–7. https://doi.org/10.5281/zenodo.14787314.
Full textSiva Krishna Jampani. "Revolutionizing Penetration Testing: AI-Powered Automation for Enterprise Security." International Journal of Scientific Research in Computer Science, Engineering and Information Technology 10, no. 6 (2024): 1562–69. https://doi.org/10.32628/cseit241061201.
Full textHoffmann, Joerg. "Simulated Penetration Testing: From "Dijkstra" to "Turing Test++"." Proceedings of the International Conference on Automated Planning and Scheduling 25 (April 8, 2015): 364–72. http://dx.doi.org/10.1609/icaps.v25i1.13684.
Full textKumar CSA, Ayush. "Ethical Hacking and Penetration Testing." International Scientific Journal of Engineering and Management 04, no. 04 (2025): 1–9. https://doi.org/10.55041/isjem02790.
Full textChamberlain, David, and Ellis Casey. "Capture the Flag with ChatGPT: Security Testing with AI ChatBots." International Conference on Cyber Warfare and Security 19, no. 1 (2024): 43–54. http://dx.doi.org/10.34190/iccws.19.1.2171.
Full textKozlovska, Mariia, Andrian Piskozub, and Volodymyr Khoma. "Artificial intelligence in penetration testing: leveraging AI for advanced vulnerability detection and exploitation." Advances in Cyber-Physical Systems 10, no. 1 (2025): 65–70. https://doi.org/10.23939/acps2025.01.065.
Full textÇaylı, Osman. "AI-Enhanced Cybersecurity Vulnerability-Based Prevention, Defense, and Mitigation using Generative AI." Orclever Proceedings of Research and Development 5, no. 1 (2024): 655–67. https://doi.org/10.56038/oprd.v5i1.616.
Full textDr., Anitha S., and D. Pravishka. "Intelligent Automation Framework for Penetration Testing and Security Assessment." Research and Reviews: Advancement in Cyber Security 2, no. 3 (2025): 39–45. https://doi.org/10.5281/zenodo.15583371.
Full textPratama, Derry, Naufal Suryanto, Andro Aprila Adiputra, et al. "CIPHER: Cybersecurity Intelligent Penetration-Testing Helper for Ethical Researcher." Sensors 24, no. 21 (2024): 6878. http://dx.doi.org/10.3390/s24216878.
Full textReddy Bhimanapati, Vijay Bhasker, Shalu Jain, and Pandi Kirupa Gopalakrishna Pandian. "Security Testing for Mobile Applications Using AI and ML Algorithms." Journal of Quantum Science and Technology 1, no. 2 (2024): 44–58. http://dx.doi.org/10.36676/jqst.v1.i2.15.
Full textGhanem, Mohamed C., and Thomas M. Chen. "Reinforcement Learning for Efficient Network Penetration Testing." Information 11, no. 1 (2019): 6. http://dx.doi.org/10.3390/info11010006.
Full textJha, Tapan Kumar. "Modern Web Application Penetration Testing Tools: A Comparative Analysis." International Journal of Recent Research and Review XVII, no. 4 (2024): 171–85. https://doi.org/10.62233/ijrrr26.
Full textXiao, Jin, Buhong Wang, Ruochen Dong, Zhengyang Zhao, and Bofu Zhao. "SatGuard: Satellite Networks Penetration Testing and Vulnerability Risk Assessment Methods." Aerospace 12, no. 5 (2025): 431. https://doi.org/10.3390/aerospace12050431.
Full textDamilola Oluwaseun Ogundipe, Sodiq Odetunde Babatunde, and Emmanuel Adeyemi Abaku. "AI AND PRODUCT MANAGEMENT: A THEORETICAL OVERVIEW FROM IDEA TO MARKET." International Journal of Management & Entrepreneurship Research 6, no. 3 (2024): 950–69. http://dx.doi.org/10.51594/ijmer.v6i3.965.
Full textShatson Pamba Fasco. "Neuromorphic computing for real-time adaptive penetration testing: analysis of human intuition in AI-dominated work space." World Journal of Advanced Research and Reviews 24, no. 3 (2024): 2038–51. https://doi.org/10.30574/wjarr.2024.24.3.3860.
Full textShatson, Pamba Fasco. "Neuromorphic computing for real-time adaptive penetration testing: analysis of human intuition in AI-dominated work space." World Journal of Advanced Research and Reviews 24, no. 3 (2024): 2038–51. https://doi.org/10.5281/zenodo.15209149.
Full textSafhi, Amine el Mahdi, Gilberto Cidreira Keserle, and Stéphanie C. Blanchard. "AI-Driven Non-Destructive Testing Insights." Encyclopedia 4, no. 4 (2024): 1760–69. http://dx.doi.org/10.3390/encyclopedia4040116.
Full textJha, Tapan Kumar, and Riddhi Soral. "Virtual Penetration Testing (VPT): A Next-Gen Approach To Web Application Security." International Journal of Recent Research and Review XVIII, no. 1 (2025): 281–98. https://doi.org/10.62233/ijrrr25.
Full textTolkachova, Anastasiia, and Andriian Piskozub. "METHODS FOR TESTING THE SECURITY OF WEB APPLICATIONS." Cybersecurity: Education, Science, Technique 2, no. 26 (2024): 115–22. https://doi.org/10.28925/2663-4023.2024.26.668.
Full textJeong, Sanghyeok, Jooheon Park, Jinyoung Yoon, and Jaesung Kim. "AI-Based Nondestructive Quality Evaluation of Friction Stir Welded Joints in Aluminum Parts for Electric Vehicles." Journal of Welding and Joining 43, no. 1 (2025): 30–38. https://doi.org/10.5781/jwj.2025.43.1.3.
Full textAl-Saudi, Mustafa Salim Mohammed, and Kassem Hamze. "Artificial Intelligence-Driven Penetration Testing for Wireless Networks: Enhancing Security Vulnerability Detection Using CNN Models." International Research Journal of Innovations in Engineering and Technology 08, no. 05 (2024): 232–37. http://dx.doi.org/10.47001/irjiet/2024.805034.
Full textAlazba, A. A., Mohamed A. Mattar, Ahmed El-Shafei, Farid Radwan, Mahmoud Ezzeldin, and Nasser Alrdyan. "Comparative Analysis of ANN, GEP, and Water Advance Power Function for Predicting Infiltrated Water Volume in Furrow of Permeable Surface." Water 17, no. 9 (2025): 1304. https://doi.org/10.3390/w17091304.
Full text.GANESH, Mr. "Intelligence Technique for Fixing Vulnerabilities in Mobile Applications." INTERNATIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 04 (2025): 1–9. https://doi.org/10.55041/ijsrem46379.
Full textAdekunle, Temitope Samson, Oluwaseyi Omotayo Alabi, Morolake Oladayo Lawrence, Godwin Nse Ebong, Grace Oluwamayowa Ajiboye, and Temitope Abiodun Bamisaye. "The Use of AI to Analyze Social Media Attacks for Predictive Analytics." Journal of Computing Theories and Applications 2, no. 2 (2024): 169–78. http://dx.doi.org/10.62411/jcta.10120.
Full textAdekunle, Temitope, Morolake Lawrence, Oluwaseyi Alabi, Godwin Ebong, Grace Ajiboye, and Temitope Bamisaye. "The Use of AI to Analyze Social Media Attacks for Predictive Analytics." American Journal of Operations Management and Information Systems 9, no. 1 (2024): 17–24. http://dx.doi.org/10.11648/j.ajomis.20240901.12.
Full textElkatatny, Salaheldin. "Real-Time Prediction of Rate of Penetration in S-Shape Well Profile Using Artificial Intelligence Models." Sensors 20, no. 12 (2020): 3506. http://dx.doi.org/10.3390/s20123506.
Full textAlsuhaibani, Eyad. "Nondestructive Testing of Externally Bonded FRP Concrete Structures: A Comprehensive Review." Polymers 17, no. 9 (2025): 1284. https://doi.org/10.3390/polym17091284.
Full textMahdi, Doaa S., Emad A. Al-Khdheeawi, and Yujie Yuan. "AI-Based Estimation of Poisson’s Ratio for Carbonate Formations Using Drilling Parameters in a Southern Iraqi Oil Field." Journal of Petroleum Research and Studies 15, no. 2 (2025): 44–59. https://doi.org/10.52716/jprs.v15i2.1072.
Full textGhule, Pallavi Shivaji. "Use of Nanotechnology in Cosmetics and Cosmeceuticals." International Journal for Research in Applied Science and Engineering Technology 12, no. 10 (2024): 160–67. http://dx.doi.org/10.22214/ijraset.2024.64488.
Full textA.Shaji, George, and S.Sagayarajan. "Securing Cloud Application Infrastructure: Understanding the Penetration Testing Challenges of IaaS, PaaS, and SaaS Environments." Partners Universal International Research Journal (PUIRJ) ISSN: 2583-5602 02, no. 01 (2023): 24–34. https://doi.org/10.5281/zenodo.7723187.
Full textAnikin, Nikita, Anastasiia Dik, Diana Yambrovskaya, Ksenia Mikhaylova, Taras Markvashev, and Elena Petrenko. "The Role of Interactive Technologies in Optimizing the Process of Patient Treatment: Prospects and Challenges for Health Care." Journal of Complementary Medicine Research 14, no. 3 (2023): 106. http://dx.doi.org/10.5455/jcmr.2023.14.03.19.
Full textOmidian, Hossein, and Sumana Dey Chowdhury. "Multifunctional Hydrogel Microneedles (HMNs) in Drug Delivery and Diagnostics." Gels 11, no. 3 (2025): 206. https://doi.org/10.3390/gels11030206.
Full textVladimer Tsimakuridze, Vladimer Tsimakuridze. "Possibilities of Practical Use of Artificial Intelligence in Marketing Processes." Economics 106, no. 3-5 (2024): 28–34. http://dx.doi.org/10.36962/ecs106/3-5/2024-28.
Full textKumar, Sahil, Rabia Afzaal, Riffat Bibi, et al. "SYNERGIZING AI, IOT, AND NANOTECHNOLOGY FOR INNOVATIVE MEDICAL DIAGNOSTICS AND THERAPEUTIC SOLUTIONS." Journal of Neonatal Surgery 14, no. 20S (2025): 334–45. https://doi.org/10.63682/jns.v14i20s.5019.
Full textAl-Omari, Ahmad H., Ahmad Ghazi Alshanty, Ayoub Alsarhan, and Saifullah A. Omari. "OTP security in wallet systems: A vulnerability assessment." International Journal of Innovative Research and Scientific Studies 8, no. 2 (2025): 2356–71. https://doi.org/10.53894/ijirss.v8i2.5691.
Full textFiorentini, Nicholas, and Massimo Losa. "Road Detection, Monitoring, and Maintenance Using Remotely Sensed Data." Remote Sensing 17, no. 5 (2025): 917. https://doi.org/10.3390/rs17050917.
Full textAitkhozhayeva, Yevgeniya, Aasso Ziro, Zhanshuak Zhaibergenova, and Aliya Baltabay. "PENETRATION TESTING." BULLETIN 6, no. 376 (2018): 39–44. http://dx.doi.org/10.32014/2018.2518-1467.25.
Full textHardy, Gary. "Penetration testing." Computers & Security 16, no. 6 (1997): 524. http://dx.doi.org/10.1016/s0167-4048(97)84691-3.
Full textGupta, Ujjwal. "Web Penetration Testing." International Journal for Research in Applied Science and Engineering Technology 8, no. 5 (2020): 56–60. http://dx.doi.org/10.22214/ijraset.2020.5011.
Full textLaBarge, Ralph. "Cloud Penetration Testing." International Journal on Cloud Computing: Services and Architecture 2, no. 6 (2012): 43–62. http://dx.doi.org/10.5121/ijccsa.2012.2604.
Full textArkin, B., S. Stender, and G. McGraw. "Software penetration testing." IEEE Security and Privacy Magazine 3, no. 1 (2005): 84–87. http://dx.doi.org/10.1109/msp.2005.23.
Full textThompson, H. H. "Application penetration testing." IEEE Security and Privacy Magazine 3, no. 1 (2005): 66–69. http://dx.doi.org/10.1109/msp.2005.3.
Full textBishop, Matt. "About Penetration Testing." IEEE Security & Privacy Magazine 5, no. 6 (2007): 84–87. http://dx.doi.org/10.1109/msp.2007.159.
Full textMIHALACHE, Denisa-Nicoleta. "Cloud Penetration Testing." International Journal of Information Security and Cybercrime 12, no. 2 (2023): 49–54. http://dx.doi.org/10.19107/ijisc.2023.02.06.
Full textRalph, LaBarge1 and Thomas McGuire2. "CLOUD PENETRATION TESTING." International Journal on Cloud Computing: Services and Architecture (IJCCSA) 2, December (2018): 01–20. https://doi.org/10.5281/zenodo.1435315.
Full textBrito, Thawane Rodrigues, David Pessoa Guedes, José Reinaldo Moreira da Silva, Edy Eime Pereira Baraúna, and Juarez Benigno Paes. "Influence of chromated copper arsenate type-C concentration on the quality of treated fence posts." Research, Society and Development 11, no. 4 (2022): e21411427088. http://dx.doi.org/10.33448/rsd-v11i4.27088.
Full text