يعرض 1 - 20 نتائج من 410 نتيجة بحث عن '"Pentesting"', وقت الاستعلام: 0.55s تنقيح النتائج
  1. 1
    Academic Journal
  2. 2
    Academic Journal
  3. 3
    Academic Journal

    المصدر: Ciencia e Ingenieria Neogranadina; Vol. 34 No. 1 (2024); 11-22 ; Ciencia e Ingeniería Neogranadina; Vol. 34 Núm. 1 (2024); 11-22 ; Ciencia e Ingeniería Neogranadina; v. 34 n. 1 (2024); 11-22 ; 1909-7735 ; 0124-8170

    وصف الملف: application/pdf

    Relation: https://revistas.unimilitar.edu.co/index.php/rcin/article/view/7059/5888; S. Shah y B. M. Mehtre, “An overview of vulnerability assessment and penetration testing techniques”, Journal of Computer Virology and Hacking Techniques, vol. 11, no. 1, pp. 27-49, 2014.; U. Ravindran y R. V. Potukuchi, “A review on Web application vulnerability assessment and penetration testing”, Review of Computer Engineering Studies, vol. 9, no. 1, pp. 1-22, 2022.; L. Irwin, “Top 5 cyber security risks for businesses,” IT Governance UK Blog, 19 de jul. de 2022, [en línea], disponible en: https://www.itgovernance.co.uk/blog/top-5-cyber-security-risks-for-businesses. [Consultado: 19-Nov-2022].; Colombia Digital, 5 amenazas de ciberseguridad que en 2022 atacarán en Colombia, Corporación Colombia Digital, 26-ene-2022, [en línea], disponible en: https://colombiadigital.net/opinion/5-amenazas-de-ciberseguridad-que-en-2022-atacaran-en-colombia. [Consultado: 19-Nov-2022].; A. Mohan y D. G. Swaminathan, “Analysis of vulnerability assessment with penetration testing”, SSRN Electronic Journal, 2022.; S. Basu, “Difference between vulnerability assessment and penetration testing”, Astra Security Blog, 28-mar-2022, [en línea], disponible en: https://www.getastra.com/blog/security-audit/vulnerability-assessment-vs-penetration-testing/. [Consultado: 20-Nov-2022].; M. Finifter, D. Akhawe y D. Wagner, “An Empirical Study of Vulnerability Rewards Programs”, in 22nd USENIX Security Symposium (USENIX Security 13), Washington DC, USA, pp. 273-288, 2013.; D. R. McKinnel, T. Dargahi, A. Dehghantanha y K. K. R. Choo, “A systematic literature review and meta-analysis on artificial intelligence in penetration testing and Vulnerability Assessment”, Computers &; Electrical Engineering, vol. 75, pp. 175-188, 2019.; T. Wilhelm, Professional penetration testing creating and learning in a hacking lab, 2nd ed. Amsterdam: Syngress, an imprint of Elsevier, 2013.; L. Allen y K. Cardwell, Advanced penetration testing for highly secured environments: Employ the most advanced Pentesting techniques and tools to build highly secured systems and environments. Birmingham, UK; Packt Publishing, 2016.; I. Soria-Guzmán (Ed.), F. Briones-Medina, E. Cabañes-Martínez, A. Miranda-Díaz, J.M. Serralde-Ruiz y G. Wolf-Izsaevich, Ética hacker, seguridad y vigilancia. CDMX: Universidad del Claustro de Sor Juana, 2016.; M. G. Jaatun, D. S. Cruzes, K. Bernsmed, I. A. Tøndel y L. Røstad, “Software security maturity in public organisations”, Lecture Notes in Computer Science, pp.120-138, 2015.; H. Fryer y E. Simperl, “Web science challenges in researching Bug Bounties,” in: Proceedings of the 2017 ACM on Web Science Conference, Troy, New York, USA, 2017.; S. Ditlea, “Rewriting the Bible in 0’s and 1’s”, Technology review, vol. 102, no. 5, pp. 66-70, 1999.; Google, “Hacking Google, Episode 4, Bug-Bounty”, YouTube, 3-oct-2022, [en línea], disponible en: https://www.youtube.com/watchv=IoXiXlCNoXg [Consultado: 27-Nov-2022].; Hunter & Ready Inc., “VRTX poster, catalog number 102782474”, Computer History Museum, 1983, [en línea], disponible en: https://www.computerhistory.org/collections/catalog/102782474 [Consultado: 29-Nov-2022].; J. Wachs, “Making markets for information security: the role of online platforms in Bug-Bounty programs”, arXiv preprint arXiv:2204. 06905, 2022.; J. O’Hare y L. A. Shepherd, “Proposal of a Novel Bug-Bounty Implementation Using Gamification”, arXiv preprint arXiv:2009. 10158, 2020.; A. Laszka, M. Zhao, A. Malbari y J. Grossklags, “The rules of Engagement for Bug-Bounty programs”, Financial Cryptography and Data Security, pp. 138-159, 2018.; P. García-Pérez, Bug-Bounty: de profesión “cazarre-compensas”. Móstoles, Madrid: ZeroxWord Computing, 2021.; O. Espino, “Bug-Bounty Collection: More than $$$$$ USD in rewards by legally hacking big companies”. Independiente, 2022.; J. Restrepo, “Lo que nadie te dijo antes de dedicarte al Bug-Bounty”, HackTheBox & RedTeamRD. 2020, [en línea], disponible en: https://www.youtube.com/watch?v=4SwV1TnkwJA [Consultado: 29-Nov-2022].; A. Laszka, M. Zhao y J. Grossklags, “Banishing misaligned incentives for validating reports in bug-bounty platforms”, Computer Security - ESORICS 2016, Heraklion, Creta, Grecia, pp. 161-178, 2016.; T. Walshe y A. C. Simpson, “Coordinated vulnerability disclosure programmer effectiveness: Issues and recommendations”, Computers & Security,vol. 123, p. 102936, 2022. https://doi.org/10.1016/j.cose.2022.102936.; H. Hata, M. Guo y M. A. Babar, “Understanding the Heterogeneity of Contributors in Bug-Bounty Programs”, in Proceedings of the 11th ACM/IEEE International Symposium on Empirical Software Engineering; and Measurement, Toronto, Ontario, Canada, pp. 223-228, 2017.; J. Peñalba, “The Worst Bug-Bounty Ever”, Rooted CON, 22-Ago-2017, [en línea], disponible en: https://www.youtube.com/watch?v=pf1TZn1YnXA [Consultado: 29-Nov-2022].; HackerOne, “The 2020 Hacker Report”, [en línea], 2020, disponible en: https://www.hackerone.com/sites/default/files/2020-04/the-2020-hacker-report.pdf [Consultado: 03-Dic-2022].; O. Akgul et al., “Bug hunters’ perspectives on the challenges and benefits of the Bug-Bounty”, in: 32nd USENIX Security Symposium (USENIX Security), Anaheim, California, USA, vol. 2301, 2023. https://doi.org/10.48550/arXiv.2301.04781.; S. Atefi, A. Sivagnanam, A. Ayman, J. Grossklags y A. Laszka, “The benefits of Vulnerability Discovery and Bug-Bounty programs: Case studies of chromium and firefox”, in: Proceedings of the ACM Web Conference 2023, Austin, Texas, USA, 2023. https://doi.org/10.1145/3543507.3583352.; A. Kuehn y M. Mueller, “Analyzing Bug-Bounty Programs: An Institutional Perspective on the Economics of Software Vulnerabilities”, TPRC Conference Paper, disponible en: https://ssrn.com/abstract=2418812; O. Akgul, T. Eghtesad, A. Elazari, O. Gnawali, J. Grossklags, M. L. Mazurek, D. Votipka y A. Laszka, “Proposal of a Novel Bug-Bounty Implementation Using Gamification”, arXiv preprint arXiv:2301.04781; L. Breidenbach, P. Daian, F. Tramèr y A. Juels, “Enter the Hydra: Towards Principled Bug Bounties and Exploit-Resistant Smart Contracts”, in: 27th USENIX Security Symposium (USENIX Security 18), Baltimore, Maryland, USA, pp. 1335-1352, 2018.; F. M. Teichmann y S. R. Boticiu, “An overview of the benefits, challenges, and legal aspects of penetration testing and red teaming”, International Cybersecurity Law Review, 2023. https://doi.org/10.1365/s43439-023-00100-2.; R. Böhme y M. Félegyházi, “Optimal Information Security Investment with penetration testing”, Lecture Notes in Computer Science, pp. 21-37, 2010.; Cobalt, “The State of Pentesting 2022”, 2022, [en línea], disponible en: https://www.cobalt.io/hubfs/State_of_Pentesting_2022.pdf. [Consultado: 07-Mar-2023].; A. Aibekova y V. Selvarajah, “Offensive security: Study on penetration testing attacks, methods, and their types”, 2022 IEEE International Conference on Distributed Computing and Electrical Circuits and Elec-; tronics (ICDCECE), Ballari, Karnataka, India, 2022. https://doi.org/10.1109/icdcece53908.2022.9792772.; M. Styles y T. Tryfonas, “Using penetration testing feedback to cultivate an atmosphere of proactive security amongst end‐users”, Information Management & Computer Security, vol. 17, no. 1, pp. 44-52, 2009.; S. Raj y N. K. Walia, “A study on Metasploit Framework: A pen-testing tool”, 2020 International Conference on Computational Performance Evaluation (ComPE), Jul. 2020. https://doi.org/10.1109/compe49325.2020.9200028.; S. S. Malladi y H. C. Subramanian, “Bug-Bounty programs for cybersecurity: Practices, issues, and recommendations”, IEEE Software, vol. 37, no. 1, pp. 31-39, Jan. 2020. https://doi.org/10.1109/ms.2018.2880508.; https://revistas.unimilitar.edu.co/index.php/rcin/article/view/7059

  4. 4
    Conference

    المساهمون: Varela Vaca, Ángel Jesús, Ceballos Guerrero, Rafael, Reina Quintero, Antonia María

    مصطلحات موضوعية: Pentesting, Industria 5.0, Ciberseguridad

    Relation: Jornadas Nacionales de Investigación en Ciberseguridad (JNIC) (9ª.2024. Sevilla) (2024), pp. 30-37.; Sevilla; https://idus.us.es/handle//11441/159385

  5. 5
    Academic Journal

    المصدر: Ciencia Huasteca Boletín Científico de la Escuela Superior de Huejutla; Vol 12 No 24 (2024): Ciencia Huasteca Boletín Científico de la Escuela Superior de Huejutla; 31-35 ; Ciencia Huasteca Boletín Científico de la Escuela Superior de Huejutla; Vol. 12 Núm. 24 (2024): Ciencia Huasteca Boletín Científico de la Escuela Superior de Huejutla; 31-35 ; 2007-493X ; 10.29057/esh.v12i24

    مصطلحات موضوعية: Pentesting, tools, vulnerabilities, herramientas, vulnerabilidades

    وصف الملف: application/pdf

  6. 6
    Conference
  7. 7
    Conference

    المصدر: European conference on cyber warfare and security: Proceedings of the 22nd European conference on cyber warfare and security., Reading : Academic Conferences International Limited, 2023, vol. 22, no. 1, p. 294-302. ; ISSN 2048-8602 ; eISSN 2048-8610

    وصف الملف: application/pdf

  8. 8
  9. 9
    Academic Journal
  10. 10
  11. 11
    Conference

    المساهمون: Universidad de Sevilla. Departamento de Lenguajes y Sistemas Informáticos, Universidad de Sevilla. TIC-258: Data-centric Computing Research Hub, Ministerio de Ciencia, Innovación y Universidades (MICINN). España, Junta de Andalucía

    Relation: SPLC 2020: 24th ACM Conference on Systems and Software Product Line (2020).; RTI2018-094283-B-C33 (ECLIPSE); P20-01224 (COPERNICA); US-1381375 (METAMORFOSIS); New York, USA; https://idus.us.es/handle//11441/138257

  12. 12
    Conference

    المساهمون: Universidad de Sevilla. Departamento de Lenguajes y Sistemas Informáticos, Universidad de Sevilla. TIC021: Engineering and Science for Software Systems, Ministerio de Ciencia, Innovación y Universidades (MICINN). España, Junta de Andalucía

    مصطلحات موضوعية: Audit, Cybersecurity, Odoo, Healthcare, Pentest, Pentesting, Security

    Relation: WEBIST 2021: 17th International Conference on Web Information Systems and Technologies (2021), pp. 482-489.; PID2019-105455GB-C31; US-1251532; https://www.scitepress.org/Link.aspx?doi=10.5220/0010714500003058; Setúbal, Portugal; https://idus.us.es/handle//11441/135190

  13. 13
    Conference
  14. 14
    Academic Journal
  15. 15
    Academic Journal

    وصف الملف: application/pdf; 21554-21562; fulltext

    Relation: IEEE Access; 10; 783287; 304970; info:eu-repo/grantAgreement/EC/H2020/783287/EU//ATM-Cybersec; European Commission; Research Council of Finland; Euroopan komissio; Suomen Akatemia; CONVID_104251707

  16. 16
    Academic Journal

    المصدر: Pro Sciences; Vol. 6 No. 42 (2022): marzo; 421-444 ; Pro Sciences: Revista de Producción, Ciencias e Investigación; Vol. 6 Núm. 42 (2022): marzo; 421-444 ; 2588-1000

    مصطلحات موضوعية: hackeo ético, pentesting, sitio web, OWASP

    وصف الملف: application/pdf

  17. 17
    Dissertation/ Thesis
  18. 18
  19. 19
    Academic Journal
  20. 20