Journal articles on the topic 'Nmap'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Nmap.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
WARD, ROD, ROSS SCRIVENER, and NICOLA SMART. "NMAP." CIN: Computers, Informatics, Nursing 22, no. 4 (2004): 227–31. http://dx.doi.org/10.1097/00024665-200407000-00011.
Full textRizky Chairil, Teuku, and Jenih Jenih. "Merancang Keamanan Jaringan Internet Menggunakan Program Network Mapper Di Linux Ubuntu." Jurnal Teknologi Informasi 9, no. 1 (2023): 45–55. http://dx.doi.org/10.52643/jti.v9i1.3174.
Full textSingh, Yuvraj. "Footprinting Using Nmap Authors Yuvraj Singh." Journal of Informatics Electrical and Electronics Engineering (JIEEE) 3, no. 2 (2022): 1–15. http://dx.doi.org/10.54060/jieee/003.02.004.
Full textSudirman, Dede, and Akma Nurul Yaqin. "Network Penetration dan Security Audit Menggunakan Nmap." SATIN - Sains dan Teknologi Informasi 7, no. 1 (2021): 32–44. http://dx.doi.org/10.33372/stn.v7i1.702.
Full textFahlevi, Muhammad Reza, and Dini Ridha Dwiki Putri. "ANALISIS MONITORING & KINERJA SISTEM KEAMANAN JARINGAN KOMPUTER MENGGUNAKAN NMAP (STUDI KASUS: RAZ HOTEL & CONVENTION MEDAN)." IT (INFORMATIC TECHNIQUE) JOURNAL 9, no. 1 (2021): 35. http://dx.doi.org/10.22303/it.9.1.2021.35-43.
Full textMira Orisa and Michael Ardita. "VULNERABILITY ASSESMENT UNTUK MENINGKATKAN KUALITAS KEMANAN WEB." Jurnal Mnemonic 4, no. 1 (2021): 16–19. http://dx.doi.org/10.36040/mnemonic.v4i1.3213.
Full textFauzi, Yudiansyah, and Rifky Aditia Hamdan. "Pendekatan Metodologis dalam Deteksi Ancaman Siber pada Server Hosting Menggunakan NMAP dan Metasploit." sudo Jurnal Teknik Informatika 4, no. 1 (2025): 1–10. https://doi.org/10.56211/sudo.v4i1.868.
Full textDwiyatno, Saleh. "ANALISIS MONITORING SISTEM JARINGAN KOMPUTER MENGGUNAKAN SOFTWARE NMAP." PROSISKO: Jurnal Pengembangan Riset dan Observasi Sistem Komputer 7, no. 2 (2020): 108–15. http://dx.doi.org/10.30656/prosisko.v7i2.2522.
Full textWołoszyn, Jacek, and Michał Wołoszyn. "Using Nmap and Python for an automated network security audit." Dydaktyka Informatyki 19 (December 7, 2024): 227–38. https://doi.org/10.15584/di.2024.19.19.
Full textRipai, Rizki, Riki Aldi Pari, Fajar Sidik, Sony Veri Shandy, and Fajar Mahardika. "Implementasi Layanan Cloudflare sebagai Mitigasi terhadap Ancaman Pemindaian dan Eksploitasi Siber Menggunakan Nmap dan Metasploit." sudo Jurnal Teknik Informatika 4, no. 1 (2025): 40–49. https://doi.org/10.56211/sudo.v4i1.902.
Full textVirk, Udayveer Singh, Devansh Verma, Gagandeep Singh, and Prof Sheetal Laroiya. "Cyber Network Sentinel: Unveiling the Realm of Intrusion Detection and Threat Mitigation." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 10 (2024): 1–6. http://dx.doi.org/10.55041/ijsrem38100.
Full textSilmina, Esi Putri, Arizona Firdonsyah, and Rovalia Adhella Attya Amanda. "ANALISIS KEAMANAN JARINGAN SISTEM INFORMASI SEKOLAH MENGGUNAKAN PENETRATION TEST DAN ISSAF." Transmisi 24, no. 3 (2022): 83–91. http://dx.doi.org/10.14710/transmisi.24.3.83-91.
Full textAl-Khazaali, Zaid, Ammar Al-Ghabban, Haneen Al-Musawi, Anwar Sabah, and Noor Al Mahdi. "Characteristics of Port Scan Traffic: A Case Study Using Nmap." Journal of Engineering and Sustainable Development 29, no. 1 (2025): 26–35. https://doi.org/10.31272/jeasd.2638.
Full textTaupaani, Reikal, and Ruki Harwahyu. "ZTSCAN: ENHANCING ZERO TRUST RESOURCE DISCOVERY WITH MASSCAN AND NMAP INTEGRATION." JITK (Jurnal Ilmu Pengetahuan dan Teknologi Komputer) 10, no. 4 (2025): 868–77. https://doi.org/10.33480/jitk.v10i4.6628.
Full textHeverin, Thomas, Elsa Deitz, Eve Cohen, and Jordana Wilkes. "Development and Analysis of a Reconnaissance-Technique Knowledge Graph." International Conference on Cyber Warfare and Security 18, no. 1 (2023): 128–36. http://dx.doi.org/10.34190/iccws.18.1.1041.
Full textDr.Harish, Joshi, Uzma Kausar Prof., Bawge Prof.Ashok, Unwaan Adiba, and Abdul Moiz Khadija. "A Systematic Method for Network Scanning in Penetration Testing Using NMap." Recent Trends in Analog Design and Digital Devices 8, no. 2 (2025): 13–19. https://doi.org/10.5281/zenodo.15542453.
Full textAlfin Syarifuddin Syahab. "ANALISIS AUDIT KEAMANAN INFORMASI WEBSITE MENGGUNAKAN METODE NETWORK MAPPER DAN QUALYS SSL." Jurnal Manajemen Informatika dan Sistem Informasi 6, no. 1 (2023): 39–47. http://dx.doi.org/10.36595/misi.v6i1.742.
Full textWard, Rod. "NMAP: the UK’s nursing Internet gateway." VINE 33, no. 2 (2003): 78–82. http://dx.doi.org/10.1108/03055720310509055.
Full textBai, Jin-He, and Alley E. Watada. "365 Induced Modified Atmosphere Maintains Quality of Packaged Fresh-cut Honeydew Cubes." HortScience 34, no. 3 (1999): 506D—506. http://dx.doi.org/10.21273/hortsci.34.3.506d.
Full textBarman, Fouz, Nora Alkaabi, Hamda Almenhali, Mahra Alshedi, and Richard Ikuesan. "A Methodical Framework for Conducting Reconnaissance and Enumeration in the Ethical Hacking Lifecycle." European Conference on Cyber Warfare and Security 22, no. 1 (2023): 54–64. http://dx.doi.org/10.34190/eccws.22.1.1438.
Full textEl-Hajj, Mohammed. "Leveraging Digital Twins and Intrusion Detection Systems for Enhanced Security in IoT-Based Smart City Infrastructures." Electronics 13, no. 19 (2024): 3941. http://dx.doi.org/10.3390/electronics13193941.
Full textHwang, Jungsik, and Minsoo Kim. "Effective Detecting Method of Nmap Idle Scan." JOURNAL OF ADVANCED INFORMATION TECHNOLOGY AND CONVERGENCE 9, no. 1 (2019): 1–10. http://dx.doi.org/10.14801/jaitc.2019.9.1.1.
Full textPratama, Nazril ardi Syah Putra, and Yustian Servanda. "Analisis Serangan Forensik Terhadap Serangan Ddos Ping Of Death Menggunakan Tools NMAP dan HPING3." Jurnal Sains dan Teknologi (JSIT) 4, no. 2 (2024): 209–16. http://dx.doi.org/10.47233/jsit.v4i2.1842.
Full textAksoy, Ahmet, Luis Valle, and Gorkem Kar. "Automated Network Incident Identification through Genetic Algorithm-Driven Feature Selection." Electronics 13, no. 2 (2024): 293. http://dx.doi.org/10.3390/electronics13020293.
Full textRosário, Marcos. "NUCLEI - Scan rápido e versátil." H2HC Magazine, no. 16 (October 22, 2022): 27–33. http://dx.doi.org/10.47986/16/1.
Full textArdiyansyah, Ferry, Kiki Setiawan, and Nandang Sutisna. "Implementasi IDS pada Jaringan Komputer Menggunakan Snort Berbasis Chatbot Telegram." MALCOM: Indonesian Journal of Machine Learning and Computer Science 4, no. 4 (2024): 1614–23. https://doi.org/10.57152/malcom.v4i4.1561.
Full textDuarte, Felipe S. L. G., Fabio Sikansi, Francisco M. Fatore, Samuel G. Fadel, and Fernando V. Paulovich. "Nmap: A Novel Neighborhood Preservation Space-filling Algorithm." IEEE Transactions on Visualization and Computer Graphics 20, no. 12 (2014): 2063–71. http://dx.doi.org/10.1109/tvcg.2014.2346276.
Full textSaber, Verina Adel. "Exploring the Correlation Between Vulnerability Scanning and Nmap." International Journal of Intelligent Computing and Information Sciences 25, no. 1 (2025): 41–50. https://doi.org/10.21608/ijicis.2025.370530.1381.
Full textMahendra, Daniel Desma, and Fransiska Sisilia Mukti. "Sistem Deteksi dan Pengendalian Serangan Denial of Service pada Server Berbasis Snort dan Telegram-API." Techno.Com 21, no. 3 (2022): 511–22. http://dx.doi.org/10.33633/tc.v21i3.6466.
Full textAryapranata, Ariawan, Yuliansyah Al Rasyid, Yogi Priya Agsena, and Sigit Hermanto. "Keamanan Siber dalam Era Digital: Tantangan dan Solusi." Jurnal Esensi Infokom : Jurnal Esensi Sistem Informasi dan Sistem Komputer 8, no. 2 (2024): 109–14. http://dx.doi.org/10.55886/infokom.v8i2.932.
Full textR, Dr Raju,. "A Literature Survey on System Security and Network Vulnerability Assessment." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 04 (2024): 1–5. http://dx.doi.org/10.55041/ijsrem29695.
Full textMalinich, I. P., V. I. Mesyura, and I. R. Arseniuk. "Analysis of Traffic Usage by Scanning Computer Networks with Different Versions of Nmap." Visnyk of Vinnytsia Politechnical Institute 155, no. 2 (2021): 92–97. http://dx.doi.org/10.31649/1997-9266-2021-155-2-92-97.
Full textChalvatzis, Ilias. "Reproducible modelling and simulating security vulnerability scanners evaluation framework towards risk management assessment of small and medium enterprises business networks." Indian Journal of Science and Technology 13, no. 37 (2020): 3910–43. http://dx.doi.org/10.17485/ijst/v13i37.868.
Full textLucas, Renan Meira dos Santos, Antônio de Oliveira Domingues Marco, and Marcelo Revoredo Carlo. "LUNER: UM MECANISMO PARA DETECÇÃO DE VULNERABILIDADES EM SERVIÇOS DE REDE." Revistaft 26, no. 117 (2022): 09. https://doi.org/10.5281/zenodo.7486609.
Full textMcKerral, Linda J., and Reggie Y. C. Lo. "Construction and Characterization of an Acapsular Mutant of Mannheimia haemolytica A1." Infection and Immunity 70, no. 5 (2002): 2622–29. http://dx.doi.org/10.1128/iai.70.5.2622-2629.2002.
Full textMahesh, Yerramsetti Sri Uday Kiran Sai. "ScanMaster: Holistic Network Scanning Toolset." International Journal for Research in Applied Science and Engineering Technology 12, no. 4 (2024): 1927–33. http://dx.doi.org/10.22214/ijraset.2024.60230.
Full textIlias, Chalvatzis, A. Karras Dimitrios, and C. Papademetriou Rallis. "Reproducible modelling and simulating security vulnerability scanners evaluation framework towards risk management assessment of small and medium enterprises business networks." Indian Journal of Science and Technology 13, no. 37 (2020): 3910–43. https://doi.org/10.17485/IJST/v13i37.868.
Full textDwi Yulian Prakoso, Riyan. "IMPLEMENTASI LOW INTERACTION HONEYPOT DAN PORT KNOCKING UNTUK MENINGKATKAN KEAMANAN JARINGAN." Perwira Journal of Science & Engineering 2, no. 1 (2022): 16–23. http://dx.doi.org/10.54199/pjse.v2i1.96.
Full textJyoti Singh. "Web Application Development and Cybersecurity: Integrating APIs, Logging, and Defense Mechanisms." Panamerican Mathematical Journal 35, no. 1 (2024): 199–207. https://doi.org/10.52783/pmj.v35.i1.5049.
Full textNURILAHI, DESI KURNIA, RIZAL MUNADI, SYAHRIAL SYAHRIAL, and AL BAHRI. "Penerapan Metode Naïve Bayes pada Honeypot Dionaea dalam Mendeteksi Serangan Port Scanning." ELKOMIKA: Jurnal Teknik Energi Elektrik, Teknik Telekomunikasi, & Teknik Elektronika 10, no. 2 (2022): 309. http://dx.doi.org/10.26760/elkomika.v10i2.309.
Full textDeekshith, V. K., Chandran a. T. V. Karthika, P. V. Nidhisree, and Rashm. "Netobile: Network Vulnerability Scanner." International Journal of Innovative Science and Research Technology 8, no. 4 (2023): 2019–21. https://doi.org/10.5281/zenodo.7927522.
Full textDeekshith, V. K., Chandran Karthika, P. V. Nidhisree, and T. V. Rashma. "Netobile: Network Vulnerability Scanner." International Journal of Innovative Science and Research Technology 8, no. 4 (2023): 2019–21. https://doi.org/10.5281/zenodo.7927531.
Full textForeman, Justin, Willie L. Waters, Charles A. Kamhoua, Ahmed H. Anwar Hemida, Jaime C. Acosta, and Blessing C. Dike. "Detection of Hacker Intention Using Deep Packet Inspection." Journal of Cybersecurity and Privacy 4, no. 4 (2024): 794–804. http://dx.doi.org/10.3390/jcp4040037.
Full textTanaka, Kanji, and Shogo Hanada. "Unsupervised Part-Based Scene Modeling for Map Matching." Journal of Advanced Computational Intelligence and Intelligent Informatics 19, no. 4 (2015): 523–31. http://dx.doi.org/10.20965/jaciii.2015.p0523.
Full textMuhammad Anis Al Hilmi, Fauziah Herdiyanti, Renol Burjulius, and Sonty Lena. "Pengujian Keamanan Sistem Operasi Linux Studi Kasus : Celah Keamanan FTP pada Metasploitable2." IKRA-ITH Informatika : Jurnal Komputer dan Informatika 8, no. 1 (2024): 110–15. http://dx.doi.org/10.37817/ikraith-informatika.v8i1.3205.
Full textBagyalakshmi, G., G. Rajkumar, N. Arunkumar, et al. "Network Vulnerability Analysis on Brain Signal/Image Databases Using Nmap and Wireshark Tools." IEEE Access 6 (2018): 57144–51. http://dx.doi.org/10.1109/access.2018.2872775.
Full textKaushik, Sanskar, Arifa Bhutto, and Bishwajeet Pandey. "Efficient Information Gathering using NMAP and NBTSCAN: Case study on 172.19.19.0 IP Address." Indian Journal of Science and Technology 12, no. 28 (2019): 1–13. http://dx.doi.org/10.17485/ijst/2019/v12i28/147004.
Full textPebrianto, Juri. "Perlindungan Port dari Pemindaian NMAP dan Meningkatkan Efisiensi IPv4 dengan MikroTik dan Nginx." Media Jurnal Informatika 16, no. 1 (2024): 54. http://dx.doi.org/10.35194/mji.v16i1.4012.
Full textPrana Walidin, Adamsyach, Fahra Pebiana Putri, and Dedy Kiswanto. "KALI LINUX SEBAGAI ALAT ANALISIS KEAMANAN JARINGAN MELALUI PENGGUNAAN NMAP, WIRESHARK, DAN METASPLOIT." JATI (Jurnal Mahasiswa Teknik Informatika) 9, no. 1 (2024): 1188–96. https://doi.org/10.36040/jati.v9i1.12661.
Full textRizki Andrian Fitra, Muhammad, Ali Afrrahman S. Effendi, Selfi Audy Priscilia, and Dedy Kiswanto. "UJI PENETRASI MENGGUNAKAN HYDRA DAN METASPLOIT PADA PROTOKOL SECURE SHELL." JATI (Jurnal Mahasiswa Teknik Informatika) 9, no. 1 (2024): 1017–24. https://doi.org/10.36040/jati.v9i1.12583.
Full text