Journal articles on the topic 'Penetration testing (Computer security)'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Penetration testing (Computer security).'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Singh, Tarandeep, Akshat Bajpai, and Samiksha Shukla. "Ethical Hacking and Penetration Testing." International Journal for Research in Applied Science and Engineering Technology 12, no. 4 (April 30, 2024): 2924–30. http://dx.doi.org/10.22214/ijraset.2024.60506.
Full textBoyanov, Petar. "VULNERABILITY PENETRATION TESTING THE COMPUTER AND NETWORK RESOURCES OF WINDOWS BASED OPERATING SYSTEMS." Journal scientific and applied research 5, no. 1 (May 6, 2014): 85–92. http://dx.doi.org/10.46687/jsar.v5i1.113.
Full textNarayana Rao, T. Venkat, and Vemula Shravan. "Metasploit Unleashed Tool for Penetration Testing." International Journal on Recent and Innovation Trends in Computing and Communication 7, no. 4 (April 26, 2019): 16–20. http://dx.doi.org/10.17762/ijritcc.v7i4.5285.
Full textTang, Tian, Mu-Chuan Zhou, Yi Quan, Jun-Liang Guo, V. S. Balaji, V. Gomathi, and V. Elamaran. "Penetration Testing and Security Assessment of Healthcare Records on Hospital Websites." Journal of Medical Imaging and Health Informatics 10, no. 9 (August 1, 2020): 2242–46. http://dx.doi.org/10.1166/jmihi.2020.3138.
Full textSriNithi, D., G. Elavarasi, T. F. Michael Raj, and P. Sivaprakasam. "Improving Web Application Security Using Penetration Testing." Research Journal of Applied Sciences, Engineering and Technology 8, no. 5 (August 5, 2014): 658–63. http://dx.doi.org/10.19026/rjaset.8.1019.
Full textLi, Chengcheng. "Penetration Testing Curriculum Development in Practice." Journal of Information Technology Education: Innovations in Practice 14 (2015): 085–99. http://dx.doi.org/10.28945/2189.
Full textMudiyanselage, Akalanka Karunarathne, and Lei Pan. "Security test MOODLE: a penetration testing case study." International Journal of Computers and Applications 42, no. 4 (November 13, 2017): 372–82. http://dx.doi.org/10.1080/1206212x.2017.1396413.
Full textYeo, John. "Using penetration testing to enhance your company's security." Computer Fraud & Security 2013, no. 4 (April 2013): 17–20. http://dx.doi.org/10.1016/s1361-3723(13)70039-3.
Full textBhardwaj, Barkha, and Shivam Tiwari. "Penetration Testing and Data Privacy: An In-Depth Review." Journal of Cyber Security in Computer System 2, no. 1 (February 23, 2023): 18–22. http://dx.doi.org/10.46610/jcscs.2023.v02i01.003.
Full textGunawan, Teddy Surya, Muhammad Kasim Lim, Mira Kartiwi, Noreha Abdul Malik, and Nanang Ismail. "Penetration Testing using Kali Linux: SQL Injection, XSS, Wordpres, and WPA2 Attacks." Indonesian Journal of Electrical Engineering and Computer Science 12, no. 2 (November 1, 2018): 729. http://dx.doi.org/10.11591/ijeecs.v12.i2.pp729-737.
Full textKondelwar, Dr Mrs Anuradha, Nikhil Hingawe, Ankit Bachar, Greenkumar Bisen, Karan Bhosale, and Gajendra Tandekar. "CyberX: Own Server Based Windows OS and Penetration Testing." International Journal for Research in Applied Science and Engineering Technology 10, no. 3 (March 31, 2022): 1499–502. http://dx.doi.org/10.22214/ijraset.2022.40917.
Full textSatria, Deni, Alde Alanda, Aldo Erianda, and Deddy Prayama. "Network Security Assessment Using Internal Network Penetration Testing Methodology." JOIV : International Journal on Informatics Visualization 2, no. 4-2 (October 6, 2018): 360. http://dx.doi.org/10.30630/joiv.2.4-2.190.
Full textYusnanto, Tri, Muhammad Abdul Muin, and Sugeng Wahyudiono. "Analisa Infrastruktur Jaringan Wireless dan Local Area Network (WLAN) Meggunakan Wireshark Serta Metode Penetration Testing Kali Linux." Journal on Education 4, no. 4 (August 30, 2022): 1470–76. http://dx.doi.org/10.31004/joe.v4i4.2175.
Full textYusuf, Rangga Renaldi, and Teguh Nurhadi Suharsono. "PENGUJIAN KEAMANAN DENGAN METODE OWASP TOP 10 PADA WEBSITE EFORM HELPDESK." Prosiding Seminar Sosial Politik, Bisnis, Akuntansi dan Teknik 5 (December 9, 2023): 402. http://dx.doi.org/10.32897/sobat.2023.5.0.3132.
Full textElstial, Ahmed, Khlifa Masoud, Nowh Saad, and Talal Gigma. "Enhancing Cybersecurity through Effective penetration testing and Vulnerability Scanning." International Science and Technology Journal 34, no. 1 (April 1, 2024): 1–16. http://dx.doi.org/10.62341/nakt1429.
Full textRaja Sekhar, K., Pavanasurya M, Komal Bharti, and Dhanya G. "A systematic review of vulnerability analysis & penetration testing tools." International Journal of Engineering & Technology 7, no. 1.1 (December 21, 2017): 411. http://dx.doi.org/10.14419/ijet.v7i1.1.9944.
Full textAshwini Bari, Anil Yadav, Sahil Suman, Ramit Ranjan. "Cyber Security Practices Ethical Hacking and its Significance in Modern." Tuijin Jishu/Journal of Propulsion Technology 43, no. 4 (November 26, 2022): 199–201. http://dx.doi.org/10.52783/tjjpt.v43.i4.2335.
Full textAstrida, Deuis Nur, Agung Restu Saputra, and Akhmad Ikhza Assaufi. "Analysis and Evaluation of Wireless Network Security with the Penetration Testing Execution Standard (PTES)." Sinkron 7, no. 1 (January 13, 2022): 147–54. http://dx.doi.org/10.33395/sinkron.v7i1.11249.
Full textZhang, Haichun, Jie Wang, Yijie Wang, Minfeng Li, Jinghan Song, and Zhenglin Liu. "ICVTest: A Practical Black-Box Penetration Testing Framework for Evaluating Cybersecurity of Intelligent Connected Vehicles." Applied Sciences 14, no. 1 (December 25, 2023): 204. http://dx.doi.org/10.3390/app14010204.
Full textGunawan, Teddy Surya, Muhammad Kassim Lim, Nurul Fariza Zulkurnain, and Mira Kartiwi. "On the Review and Setup of Security Audit using Kali Linux." Indonesian Journal of Electrical Engineering and Computer Science 11, no. 1 (July 1, 2018): 51. http://dx.doi.org/10.11591/ijeecs.v11.i1.pp51-59.
Full textAlanda, Alde, Deni Satria, M. Isthofa Ardhana, Andi Ahmad Dahlan, and Hanriyawan Adnan Mooduto. "Web Application Penetration Testing Using SQL Injection Attack." JOIV : International Journal on Informatics Visualization 5, no. 3 (September 27, 2021): 320. http://dx.doi.org/10.30630/joiv.5.3.470.
Full textLu, He-Jun, and Yang Yu. "Research on WiFi Penetration Testing with Kali Linux." Complexity 2021 (February 27, 2021): 1–8. http://dx.doi.org/10.1155/2021/5570001.
Full textAkhilesh, Rohit, Oliver Bills, Naveen Chilamkurti, and Mohammad Jabed Morshed Chowdhury. "Automated Penetration Testing Framework for Smart-Home-Based IoT Devices." Future Internet 14, no. 10 (September 27, 2022): 276. http://dx.doi.org/10.3390/fi14100276.
Full textSemenov, Serhii, Cao Weilin, Liqiang Zhang, and Serhii Bulba. "AUTOMATED PENETRATION TESTING METHOD USING DEEP MACHINE LEARNING TECHNOLOGY." Advanced Information Systems 5, no. 3 (October 18, 2021): 119–27. http://dx.doi.org/10.20998/2522-9052.2021.3.16.
Full textAltulaihan, Esra Abdullatif, Abrar Alismail, and Mounir Frikha. "A Survey on Web Application Penetration Testing." Electronics 12, no. 5 (March 4, 2023): 1229. http://dx.doi.org/10.3390/electronics12051229.
Full textAlhamed, Mariam, and M. M. Hafizur Rahman. "A Systematic Literature Review on Penetration Testing in Networks: Future Research Directions." Applied Sciences 13, no. 12 (June 9, 2023): 6986. http://dx.doi.org/10.3390/app13126986.
Full textAl-Khannak, Rafid, and Sajjan Singh Nehal. "Penetration Testing for the Cloud-Based Web Application." WSEAS TRANSACTIONS ON COMPUTERS 22 (August 29, 2023): 104–13. http://dx.doi.org/10.37394/23205.2023.22.13.
Full textChamberlain, David, and Ellis Casey. "Capture the Flag with ChatGPT: Security Testing with AI ChatBots." International Conference on Cyber Warfare and Security 19, no. 1 (March 21, 2024): 43–54. http://dx.doi.org/10.34190/iccws.19.1.2171.
Full textTran, Khuong, Maxwell Standen, Junae Kim, David Bowman, Toby Richer, Ashlesha Akella, and Chin-Teng Lin. "Cascaded Reinforcement Learning Agents for Large Action Spaces in Autonomous Penetration Testing." Applied Sciences 12, no. 21 (November 7, 2022): 11265. http://dx.doi.org/10.3390/app122111265.
Full textAbdulghaffar, Khaled, Nebrase Elmrabit, and Mehdi Yousefi. "Enhancing Web Application Security through Automated Penetration Testing with Multiple Vulnerability Scanners." Computers 12, no. 11 (November 15, 2023): 235. http://dx.doi.org/10.3390/computers12110235.
Full textAnuththara, G. H. N., S. S. U. Senadheera, S. M. T. V. Samarasekara, K. M. G. T. Herath, M. V. N. Godapitiya, and Dr D. I. De Silva. "A Study of The Effectiveness of Code Review in Detecting Security Vulnerabilities." International Journal of Recent Technology and Engineering (IJRTE) 12, no. 2 (July 30, 2023): 11–19. http://dx.doi.org/10.35940/ijrte.b7671.0712223.
Full textQuroturohman, Denis. "PENETRATION TESTING DALAM FORENSIK DIGITAL PADA JARINGAN FAKULTAS TEKNIK UNIVERSITAS IBN KHALDUN BOGOR DENGAN PING OF DEATH." Jurnal Inovatif : Inovasi Teknologi Informasi dan Informatika 4, no. 2 (November 3, 2021): 81. http://dx.doi.org/10.32832/inova-tif.v4i2.5812.
Full textNedyalkov, Ivan. "Study the Level of Network Security and Penetration Tests on Power Electronic Device." Computers 13, no. 3 (March 19, 2024): 81. http://dx.doi.org/10.3390/computers13030081.
Full textFitriana, Dina Nurika Fitriana, Putri Elfa Mas’udia, and Mila Kusumawardani. "NIST SP 800-115 Framework Implementation using Black Box Method on Security Gaps Testing on JTD Polinema’s Official Website." jartel 13, no. 4 (December 22, 2023): 328–35. http://dx.doi.org/10.33795/jartel.v13i4.557.
Full textSchiller, Thomas, Bruce Caulkins, Annie S. Wu, and Sean Mondesire. "Security Awareness in Smart Homes and Internet of Things Networks through Swarm-Based Cybersecurity Penetration Testing." Information 14, no. 10 (September 30, 2023): 536. http://dx.doi.org/10.3390/info14100536.
Full textYi, Junkai, and Xiaoyan Liu. "Deep Reinforcement Learning for Intelligent Penetration Testing Path Design." Applied Sciences 13, no. 16 (August 21, 2023): 9467. http://dx.doi.org/10.3390/app13169467.
Full textAndria, Andria, and Ridho Pamungkas. "Penetration Testing Database Menggunakan Metode SQL Injection Via SQLMap di Termux." Indonesian Journal of Applied Informatics 5, no. 1 (April 18, 2021): 1. http://dx.doi.org/10.20961/ijai.v5i1.40845.
Full textDyce, Keir, and Mary Barrett. "Taking Care of (E)-Business?: Australian IT Professionals’ Views of Wireless Network Vulnerability Assessments." Journal of Theoretical and Applied Electronic Commerce Research 1, no. 2 (August 1, 2006): 79–89. http://dx.doi.org/10.3390/jtaer1020015.
Full textHamza, Sahriar, Nur Humaira Abri, and Abdul Haris Muhammad. "Analisis Keamanan Jaringan Wireless Lan Menggunakan Tiga Metode Penetration Testing, Wardriving Attack, And Square Studi Kasus : PT. Telekomunikasi Cabang Ternate." Jurnal Teknik Informatika (J-Tifa) 6, no. 1 (March 30, 2023): 7–11. http://dx.doi.org/10.52046/j-tifa.v6i2.1599.
Full textShahid, Jahanzeb, Muhammad Khurram Hameed, Ibrahim Tariq Javed, Kashif Naseer Qureshi, Moazam Ali, and Noel Crespi. "A Comparative Study of Web Application Security Parameters: Current Trends and Future Directions." Applied Sciences 12, no. 8 (April 18, 2022): 4077. http://dx.doi.org/10.3390/app12084077.
Full textZhao, Letao. "Navigating the Cyber Kill Chain: A modern approach to pentesting." Applied and Computational Engineering 38, no. 1 (January 22, 2024): 170–75. http://dx.doi.org/10.54254/2755-2721/38/20230549.
Full textJovanović, Siniša, Danijela Protić, Vladimir Antić, Milena Grdović, and Dejan Bajić. "Security of wireless keyboards: Threats, vulnerabilities and countermeasures." Vojnotehnicki glasnik 71, no. 2 (2023): 296–315. http://dx.doi.org/10.5937/vojtehg71-43239.
Full textRiadi, Imam, and Eddy Irawan Aristianto. "An Analysis of Vulnerability Web Against Attack Unrestricted Image File Upload." Computer Engineering and Applications Journal 5, no. 1 (January 31, 2016): 19–28. http://dx.doi.org/10.18495/comengapp.v5i1.161.
Full textKorniyenko, Bogdan, and Liliya Galata. "MODELING OF INFORMATION SECURITY SYSTEM IN COMPUTER NETWORK." Information systems and technologies security, no. 1 (1) (2019): 36–41. http://dx.doi.org/10.17721/ists.2019.1.36-41.
Full textZhang, Yue, Jingju Liu, Shicheng Zhou, Dongdong Hou, Xiaofeng Zhong, and Canju Lu. "Improved Deep Recurrent Q-Network of POMDPs for Automated Penetration Testing." Applied Sciences 12, no. 20 (October 14, 2022): 10339. http://dx.doi.org/10.3390/app122010339.
Full textHaeruddin, Haeruddin. "Analisa dan Implementasi Sistem Keamanan Router Mikrotik dari Serangan Winbox Exploitation, Brute-Force, DoS." JURNAL MEDIA INFORMATIKA BUDIDARMA 5, no. 3 (July 31, 2021): 848. http://dx.doi.org/10.30865/mib.v5i3.2979.
Full textAlbahar, Marwan, Dhoha Alansari, and Anca Jurcut. "An Empirical Comparison of Pen-Testing Tools for Detecting Web App Vulnerabilities." Electronics 11, no. 19 (September 21, 2022): 2991. http://dx.doi.org/10.3390/electronics11192991.
Full textXu, Xiao Bin. "Research on the Actual Combat-Oriented Mode of Network Security Supervision Based on Networked Resources." Advanced Materials Research 791-793 (September 2013): 1710–15. http://dx.doi.org/10.4028/www.scientific.net/amr.791-793.1710.
Full textWang, Xinli, and Yan Bai. "Introducing Penetration Test with Case Study and Course Project in Cybersecurity Education." Journal of The Colloquium for Information Systems Security Education 9, no. 1 (March 8, 2022): 6. http://dx.doi.org/10.53735/cisse.v9i1.148.
Full textLiao, Yan. "Enhancing Industrial Control Network Security Through Vulnerability Detection and Attack Graph Analysis." Scalable Computing: Practice and Experience 25, no. 1 (January 4, 2024): 65–74. http://dx.doi.org/10.12694/scpe.v25i1.2254.
Full text