Academic literature on the topic 'Google Hacking Database'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Google Hacking Database.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Google Hacking Database"

1

Evangelista, João Rafael Gonçalves, Renato José Sassi, and Márcio Romero. "Google Hacking Database Attributes Enrichment and Conversion to Enable the Application of Machine Learning Techniques." Indian Journal Of Science And Technology 16, no. 42 (2023): 3771–77. http://dx.doi.org/10.17485/ijst/v16i42.1799.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

João, Rafael Gonçalves Evangelista, José Sassi Renato, and Romero Márcio. "Google Hacking Database Attributes Enrichment and Conversion to Enable the Application of Machine Learning Techniques." Indian Journal of Science and Technology 16, no. 42 (2023): 3771–77. https://doi.org/10.17485/IJST/v16i42.1799.

Full text
Abstract:
Abstract <strong>Objectives:</strong>&nbsp;Apply Natural Language Processing (NLP) to enrich Google Hacking Database (GHDB) with attributes and convert its textual values to ASCII, to enable the application of Machine Learning techniques to group Dorks by similarity and find vulnerabilities.&nbsp;<strong>Methods:</strong>&nbsp;The computational experiments were conducted in seven steps: Selection of the GHDB, Removal of Hyperlinks and Deletion of Attributes, Removal of the Site Parameter from Dorks, Removal of Outliers and Stopwords, Enrichment with NLP, Base Transformation, and Application of
APA, Harvard, Vancouver, ISO, and other styles
3

M R,, Ramya. "A STRONG AND PRACTICAL AUTHENTICATION MECHANISM USING PASSTEXT AND ONE MINUTE PASSCODE." International Scientific Journal of Engineering and Management 03, no. 04 (2024): 1–9. http://dx.doi.org/10.55041/isjem01671.

Full text
Abstract:
In this modern world, hacking is growing faster, and there is no privacy for personal data. Therefore, we have decided to create passwords using new methods. This project demonstrates that there is no secret shared between the user and strangers; it presents a one minute challenge to unlock private data. Our project generates random codes minute by minute, and each password is only valid for just one minute, which is called OMP (One Minute Passcode). Therefore, the user doesn't know the correct password at all times. These passkeys are then sent to the user's mobile phone using the Twilio meth
APA, Harvard, Vancouver, ISO, and other styles
4

Abinaya, R., A. Devapriya, and R. Purushothaman. "Cloud based accessibility of Electronic Health Record from android application." International Journal of Trend in Scientific Research and Development 2, no. 3 (2018): 551–54. https://doi.org/10.31142/ijtsrd10980.

Full text
Abstract:
The disabled persons need help from others for maintaining their medical details. To decrease their dependency, all health care centres uses a common database for storing and sharing the patient medical details among them. So, patients can access the details of medical history like past surgeries, medications, allergies, laboratory test etc., in the database from anywhere and anytime with user&#39;s comfortable. In the proposed system, the user both physician and patient can be able to view access and update the details by using the android application through their mobile phone in a secured w
APA, Harvard, Vancouver, ISO, and other styles
5

Heverin, Thomas. "Reconnaissance Techniques and Industrial Control System Tactics Knowledge Graph." European Conference on Cyber Warfare and Security 22, no. 1 (2023): 688–95. http://dx.doi.org/10.34190/eccws.22.1.1221.

Full text
Abstract:
In the initial stages of industrial control system (ICS) penetration testing, pentesters conduct reconnaissance by using various tools including Nmap, Shodan, Maltego, Google, Google Hacking Database (GHDB), Recon-ng and more. Testers use various reconnaissance techniques (RTs) within the tools to directly access ICS devices. Many novice ICS-pentesters stop their reconnaissance work upon successfully accessing an ICS device. However, continuing to conduct reconnaissance after initial access can lead to pentesters finding even more information to find more ICS devices, ICS networks, and ways to
APA, Harvard, Vancouver, ISO, and other styles
6

Sumeet, Gill, and Vij Priya. "Security ambiguity and vulnerability in G2C eGovernance system: Empirical evidences from Indian higher education." Indian Journal of Science and Technology 13, no. 34 (2020): 3515–20. https://doi.org/10.17485/IJST/v13i34.1373.

Full text
Abstract:
Abstract The Higher Education Institutions (HEIs) in India enhanced dependency on Information Communication Technology (ICT) based on G2C eGovernance applications persistently raised apprehension regarding cyber-attacks and breach of security.&nbsp;<strong>Objectives:</strong>The present study assesses the status of ambiguity and vulnerability pertaining to security aspects of HEIs G2C eGovernance web portals.&nbsp;<strong>Methods:</strong>Five prominent central and state HEIs i.e. Malaviya National Institute of Technology - Jaipur (MNIT), National Institute of Technology - Kurukshetra (NITK),
APA, Harvard, Vancouver, ISO, and other styles
7

Pradeep, D., and C. Sundar. "Big Data Analysis and Management of Healthcare Systems for Hacker Detection Based on Google Net Convolutional Neural Network." Journal of Medical Imaging and Health Informatics 11, no. 11 (2021): 2822–28. http://dx.doi.org/10.1166/jmihi.2021.3881.

Full text
Abstract:
In recent times, Hacking has turn out to be more unfavorable than ever in all life fields, including the healthcare systems, with an increasing usage of information technology. By the expansion of technology development, the attacks number is too rising every few months in an exponential manner, which in turn makes the conventional IDS incapable to perceive. A healthcare system network intrusion detection method is proposed depending on the Google NET convolution neural network (Google NET). In healthcare system databases, intrusion detection (KDDs) can be seen as a search issue, which might b
APA, Harvard, Vancouver, ISO, and other styles
8

Noor Uddin Milon, Md, Provakar Ghose, Tania Chowdhury Pinky, Mst Nowshin Tabassum, Md Nazmul Hasan, and Maimuna Khatun. "An in-depth PRISMA based review of cybercrime in a developing economy: Examining sector-wide impacts, legal frameworks, and emerging trends in the digital era." Edelweiss Applied Science and Technology 8, no. 4 (2024): 2072–93. http://dx.doi.org/10.55214/25768484.v8i4.1583.

Full text
Abstract:
In today's digital age, the swift advancement of information and communication technology (ICT) has brought immense benefits to humanity, but it has also opened the door to various technological crimes, particularly cybercrime, which is becoming an increasingly significant issue in Bangladesh. This paper aspires to critically examine the nature and scope of cybercrime in Bangladesh, exploring its impact on individuals, businesses, and the economy as a whole. This study investigates the state of cybercrime in Bangladesh, its sector-wide impacts, and the effectiveness of existing legal governmen
APA, Harvard, Vancouver, ISO, and other styles
9

Martineau, Melissa, Elena Spiridon, and Mary Aiken. "A Comprehensive Framework for Cyber Behavioral Analysis Based on a Systematic Review of Cyber Profiling Literature." Forensic Sciences 3, no. 3 (2023): 452–77. http://dx.doi.org/10.3390/forensicsci3030032.

Full text
Abstract:
Cybercrime presents a significant threat to global society. With the number of cybercrimes increasing year after year and the financial losses escalating, law enforcement must advance its capacity to identify cybercriminals, collect probative evidence, and bring cybercriminals before the courts. Arguably to date, the approach to combatting cybercrime has been technologically centric (e.g., anti-virus, anti-spyware). Cybercrimes, however, are the result of human activities based on human motives. It is, therefore, important that any comprehensive law enforcement strategy for combatting cybercri
APA, Harvard, Vancouver, ISO, and other styles
10

Pergialiotis, Vasilios, Michail Panagiotopoulos, Antonios Koutras, et al. "The Impact of Positive Peritoneal Cytology on the Survival Rates of Early-Stage-Disease Endometrial Cancer Patients: Systematic Review and Meta-Analysis." Medicina 60, no. 5 (2024): 733. http://dx.doi.org/10.3390/medicina60050733.

Full text
Abstract:
Background and Objectives: The impact of positive peritoneal cytology has been a matter of controversy in early-stage endometrial cancer for several years. The latest staging systems do not take into consideration its presence; however, emerging evidence about its potential harmful effect on patient survival outcomes suggests otherwise. In the present systematic review and meta-analysis, we sought to accumulate current evidence. Materials and Methods: Medline, Scopus, the Cochrane Central Register of Controlled Trials CENTRAL, Google Scholar and Clinicaltrials.gov databases were searched for r
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Google Hacking Database"

1

"Document Grinding and Database Digging." In Google Hacking for Penetration Testers. Elsevier, 2005. http://dx.doi.org/10.1016/b978-193183636-4/50015-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Long, Johnny, Bill Gardner, and Justin Brown. "Document Grinding and Database Digging." In Google Hacking for Penetration Testers. Elsevier, 2016. http://dx.doi.org/10.1016/b978-0-12-802964-0.00004-0.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Long, Johnny. "Document Grinding and Database Digging." In Google Hacking for Penetration Testers Volume 2. Elsevier, 2008. http://dx.doi.org/10.1016/b978-159749176-1.50007-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Google Hacking Database"

1

Phulre, Ajay Kumar, Megha Kamble, and Sunil Phulre. "Content Management Systems hacking probabilities for Admin Access with Google Dorking and database code injection for web content security." In 2020 2nd International Conference on Data, Engineering and Applications (IDEA). IEEE, 2020. http://dx.doi.org/10.1109/idea49133.2020.9170655.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!