Academic literature on the topic 'Google Hacking Database'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Google Hacking Database.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Google Hacking Database"
Evangelista, João Rafael Gonçalves, Renato José Sassi, and Márcio Romero. "Google Hacking Database Attributes Enrichment and Conversion to Enable the Application of Machine Learning Techniques." Indian Journal Of Science And Technology 16, no. 42 (2023): 3771–77. http://dx.doi.org/10.17485/ijst/v16i42.1799.
Full textJoão, Rafael Gonçalves Evangelista, José Sassi Renato, and Romero Márcio. "Google Hacking Database Attributes Enrichment and Conversion to Enable the Application of Machine Learning Techniques." Indian Journal of Science and Technology 16, no. 42 (2023): 3771–77. https://doi.org/10.17485/IJST/v16i42.1799.
Full textM R,, Ramya. "A STRONG AND PRACTICAL AUTHENTICATION MECHANISM USING PASSTEXT AND ONE MINUTE PASSCODE." International Scientific Journal of Engineering and Management 03, no. 04 (2024): 1–9. http://dx.doi.org/10.55041/isjem01671.
Full textAbinaya, R., A. Devapriya, and R. Purushothaman. "Cloud based accessibility of Electronic Health Record from android application." International Journal of Trend in Scientific Research and Development 2, no. 3 (2018): 551–54. https://doi.org/10.31142/ijtsrd10980.
Full textHeverin, Thomas. "Reconnaissance Techniques and Industrial Control System Tactics Knowledge Graph." European Conference on Cyber Warfare and Security 22, no. 1 (2023): 688–95. http://dx.doi.org/10.34190/eccws.22.1.1221.
Full textSumeet, Gill, and Vij Priya. "Security ambiguity and vulnerability in G2C eGovernance system: Empirical evidences from Indian higher education." Indian Journal of Science and Technology 13, no. 34 (2020): 3515–20. https://doi.org/10.17485/IJST/v13i34.1373.
Full textPradeep, D., and C. Sundar. "Big Data Analysis and Management of Healthcare Systems for Hacker Detection Based on Google Net Convolutional Neural Network." Journal of Medical Imaging and Health Informatics 11, no. 11 (2021): 2822–28. http://dx.doi.org/10.1166/jmihi.2021.3881.
Full textNoor Uddin Milon, Md, Provakar Ghose, Tania Chowdhury Pinky, Mst Nowshin Tabassum, Md Nazmul Hasan, and Maimuna Khatun. "An in-depth PRISMA based review of cybercrime in a developing economy: Examining sector-wide impacts, legal frameworks, and emerging trends in the digital era." Edelweiss Applied Science and Technology 8, no. 4 (2024): 2072–93. http://dx.doi.org/10.55214/25768484.v8i4.1583.
Full textMartineau, Melissa, Elena Spiridon, and Mary Aiken. "A Comprehensive Framework for Cyber Behavioral Analysis Based on a Systematic Review of Cyber Profiling Literature." Forensic Sciences 3, no. 3 (2023): 452–77. http://dx.doi.org/10.3390/forensicsci3030032.
Full textPergialiotis, Vasilios, Michail Panagiotopoulos, Antonios Koutras, et al. "The Impact of Positive Peritoneal Cytology on the Survival Rates of Early-Stage-Disease Endometrial Cancer Patients: Systematic Review and Meta-Analysis." Medicina 60, no. 5 (2024): 733. http://dx.doi.org/10.3390/medicina60050733.
Full textBook chapters on the topic "Google Hacking Database"
"Document Grinding and Database Digging." In Google Hacking for Penetration Testers. Elsevier, 2005. http://dx.doi.org/10.1016/b978-193183636-4/50015-4.
Full textLong, Johnny, Bill Gardner, and Justin Brown. "Document Grinding and Database Digging." In Google Hacking for Penetration Testers. Elsevier, 2016. http://dx.doi.org/10.1016/b978-0-12-802964-0.00004-0.
Full textLong, Johnny. "Document Grinding and Database Digging." In Google Hacking for Penetration Testers Volume 2. Elsevier, 2008. http://dx.doi.org/10.1016/b978-159749176-1.50007-2.
Full textConference papers on the topic "Google Hacking Database"
Phulre, Ajay Kumar, Megha Kamble, and Sunil Phulre. "Content Management Systems hacking probabilities for Admin Access with Google Dorking and database code injection for web content security." In 2020 2nd International Conference on Data, Engineering and Applications (IDEA). IEEE, 2020. http://dx.doi.org/10.1109/idea49133.2020.9170655.
Full text