-
1Academic Journal
المؤلفون: Moreno, Ariadna Claudia1 (AUTHOR) amorenor2300@alumno.ipn.mx, Hernandez-Suarez, Aldo1 (AUTHOR) alhernandezsu@ipn.mx, Sanchez-Perez, Gabriel1 (AUTHOR) gasanchezp@ipn.mx, Toscano-Medina, Linda Karina1 (AUTHOR) ltoscano@ipn.mx, Perez-Meana, Hector1 (AUTHOR) hmperezm@ipn.mx, Portillo-Portillo, Jose1 (AUTHOR) jportillop@ipn.mx, Olivares-Mercado, Jesus1 (AUTHOR) jolivares@ipn.mx, García Villalba, Luis Javier2 (AUTHOR) javiergv@fdi.ucm.es
المصدر: Sensors (14248220). Jan2025, Vol. 25 Issue 1, p211. 40p.
مصطلحات موضوعية: *PENETRATION testing (Computer security), *INFORMATION technology, *REINFORCEMENT learning, *OFFENSIVE behavior, *TEST systems
-
2Academic Journal
المؤلفون: Lei Yang1 13785176341@163.com, Junyan Niu1 16603115775@163.com, Jiangfeng Li2 jiangfengli2000@jju.edu.cn
المصدر: Neutrosophic Sets & Systems. 2025, Vol. 77, p479-491. 13p.
مصطلحات موضوعية: *PENETRATION testing (Computer security), *GROUP decision making, *RANDOM access memory, *SECURITY systems, *DATA security failures
-
3Academic Journal
المؤلفون: SENTHILRAJA, P1 (AUTHOR) visitsenthilraja@gmail.com, NANCY, P2 (AUTHOR), SHERINE GLORY, J3 (AUTHOR), MANISHA, G3 (AUTHOR)
المصدر: Sādhanā: Academy Proceedings in Engineering Sciences. Sep2024, Vol. 49 Issue 3, p1-19. 19p.
-
4Academic Journal
Alternate Title: Smart Contract Vulnerability Detection Method Based on Meta-Operation.
المصدر: Electronic Science & Technology. 2024, Vol. 37 Issue 9, p64-71. 8p.
مصطلحات موضوعية: *PENETRATION testing (Computer security), *LOGIC, *CONTRACTS, *CUSTOMIZATION, *SCALABILITY
-
5Academic Journal
المصدر: Computers (2073-431X); Jan2025, Vol. 14 Issue 1, p24, 25p
مصطلحات موضوعية: WORLD Wide Web, DIGITAL technology, DATA privacy, PENETRATION testing (Computer security), INTERNET security
-
6Academic Journal
المؤلفون: Liu, Xiaojian, Zhang, Yangyang, Li, Wenpeng, Gu, Wen
المصدر: Systems; Dec2024, Vol. 12 Issue 12, p546, 16p
-
7Conference
المؤلفون: Kasmawi1 (AUTHOR) kasmawi@polbeng.ac.id, Hidayasari, Nurmi1 (AUTHOR) nurmihidayasari@polbeng.ac.id, Mansur1 (AUTHOR) mansur.polbeng82@gmail.com
المصدر: AIP Conference Proceedings. 2023, Vol. 2665 Issue 1, p1-7. 7p.
مصطلحات موضوعية: *HIGHER education, *PENETRATION testing (Computer security), *WEBSITES, *WEB development, *CYBERTERRORISM
-
8Conference
المؤلفون: Henge, Santosh Kumar1 (AUTHOR) santosh24372@lpu.co.in, Dhiman, Pooja1 (AUTHOR) poojadhiman25@yahoo.co.in
المصدر: AIP Conference Proceedings. 2023, Vol. 2800 Issue 1, p1-12. 12p.
مصطلحات موضوعية: *PENETRATION testing (Computer security), *INTERNET security, *COMPUTER network security, *BUSINESS enterprises, *BIOMETRIC identification, *DATA entry
-
9Academic Journal
المؤلفون: Joshua H. Tyler, Mohamed K. M. Fadul, Matthew R. Hilling, Donald R. Reising, T. Daniel Loveless
المصدر: Discover Internet of Things, Vol 4, Iss 1, Pp 1-21 (2024)
مصطلحات موضوعية: Specific emitter identification, RF-fingerprinting, IoT security, Internet of things, Adversaries, Penetration testing, Computer engineering. Computer hardware, TK7885-7895, Computer software, QA76.75-76.765
وصف الملف: electronic resource
Relation: https://doaj.org/toc/2730-7239
-
10Academic Journal
المؤلفون: Anisa Sholawati, Hario Jati Setyadi, Amin Padmo Azam Masa
المصدر: Techno, Vol 25, Iss 2, Pp 73-86 (2024)
مصطلحات موضوعية: penetration testing, website siplo, sistem keamanan, framework issaf, owasp top 10, Technology, Engineering (General). Civil engineering (General), TA1-2040
وصف الملف: electronic resource
-
11Academic Journal
المؤلفون: Railkar Dipali, Joshi Shubhalaxmi
المصدر: Cybernetics and Information Technologies, Vol 24, Iss 3, Pp 182-196 (2024)
مصطلحات موضوعية: deep learning, penetration testing, q-learning, adaptive hunt tuner algorithm, deep convolutional neural network, Cybernetics, Q300-390
وصف الملف: electronic resource
Relation: https://doaj.org/toc/1314-4081
-
12Academic Journal
المصدر: Ilkom Jurnal Ilmiah, Vol 16, Iss 2, Pp 161-171 (2024)
مصطلحات موضوعية: information security, penetration testing, security, vulnerability, vulnerability assessment and penetration testing (vapt), Electronic computers. Computer science, QA75.5-76.95
وصف الملف: electronic resource
-
13Academic Journal
المؤلفون: Ali, Mohammad1 (AUTHOR) 0321563379@student.wub.edu.bd, Ullah, Ahsan1 (AUTHOR) ahsan.ullah@cse.wub.edu.bd, Islam, Md. Rashedul1 (AUTHOR) 0321563380@student.wub.edu.bd, Hossain, Rifat1 (AUTHOR) 0321563395@student.wub.edu.bd
المصدر: Computers & Security. Mar2025, Vol. 150, pN.PAG-N.PAG. 1p.
مصطلحات موضوعية: *SOFTWARE reliability, *DATA security, *COMPUTER network security, PENETRATION testing (Computer security), COMPUTER software security
-
14Academic Journal
المؤلفون: Gürfidan, Remzi
المصدر: Applied Sciences (2076-3417); Nov2024, Vol. 14 Issue 21, p9697, 14p
-
15Academic Journal
المؤلفون: Liu, Hongri, Liu, Chuhan, Wu, Xiansheng, Qu, Yun, Liu, Hongmei
المصدر: Electronics (2079-9292); Nov2024, Vol. 13 Issue 21, p4311, 22p
مصطلحات موضوعية: PENETRATION testing (Computer security), MARKOV processes, REINFORCEMENT learning
-
16Academic Journal
المؤلفون: Chen, Ziyang, Kang, Fei, Xiong, Xiaobing, Shu, Hui
المصدر: Applied Sciences (2076-3417); Sep2024, Vol. 14 Issue 18, p8355, 27p
-
17Academic Journal
المؤلفون: Modesti, Paolo, Golightly, Lewis, Holmes, Louis, Opara, Chidimma, Moscini, Marco
المصدر: Journal of Cybersecurity & Privacy; Sep2024, Vol. 4 Issue 3, p410-448, 39p
مصطلحات موضوعية: PENETRATION testing (Computer security), SOURCE code, COMPUTER software, CLASSIFICATION, SURVEYS
-
18Academic Journal
المؤلفون: Noordegraaf, Judith E.1, Weulen Kranenbarg, Marleen2 m.weulenkranenbarg@vu.nl
المصدر: Criminology & Public Policy. Nov2023, Vol. 22 Issue 4, p803-824. 22p.
مصطلحات موضوعية: *PENETRATION testing (Computer security), *COMPUTER hackers, *SELF-perception, *INTERNET security, *QUALITATIVE research
-
19Academic Journal
المؤلفون: Zegang Li, Qian Zhang, Guangwen Yang
المصدر: Engineering Reports, Vol 7, Iss 1, Pp n/a-n/a (2025)
مصطلحات موضوعية: asynchronous RL, optimizations, partial observable, penetration testing, Engineering (General). Civil engineering (General), TA1-2040, Electronic computers. Computer science, QA75.5-76.95
وصف الملف: electronic resource
Relation: https://doaj.org/toc/2577-8196
-
20
المؤلفون: Forsberg, Albin, Iwaya, Leonardo Horn, 1988
المصدر: Secure IT Systems. :364-381
مصطلحات موضوعية: Security, Penetration Testing, Security Testing, Mobile Health, mHealth, Health and Fitness Apps
وصف الملف: print