Showing 1 - 20 of 877

1

Hacker journeys: exploring paths in and out of illicit hacking through personal narratives.
Machande, Alina D. ; Joinson, Adam N. ; Smith, Laura G.E.
Behaviour & Information Technology. Dec2025, p1-18. 18p.

Academic journal
2

Intrusion detection in campus information systems through penetration tests.
Miftahuddin, Yusup ; Sholahuddin, Sholahuddin
AIP Conference Proceedings. 2025, Vol. 3351 Issue 1, p1-10. 10p.

INTRUSION detection syst... PENETRATION testing (Com... RANDOM forest algorithms INTERNET security MACHINE learning RISK assessment
Conference
3

PRWHA: RGB Image-Based Hybrid Attention for Cross-File SQLI/XSS Vulnerability Detection in PHP Web Applications.
Ren, Rong ; Song, Qingyu ; Zhang, Bing ; et al.
International Journal of Software Engineering & Knowledge Engineering. Mar2026, Vol. 36 Issue 3, p455-486. 32p.

Academic journal
4

This AI Tool Can Plan and Execute Penetration Tests on Its Own.
Harvey, Grant ; Ofonagoro, Joseph Chisom ; Ticong, Liz ; et al.
eWeek. 12/31/2025, pN.PAG-N.PAG. 1p.

Journal
5

Des outils et des services pour détecter les failles avant les hackers.
MAUGER, CHARLOTTE
IT for Business. oct2025, Issue 2309, p48-49. 2p.

Journal
6

MIT PENTESTING ZUM NÄCHSTEN LEVEL DER CYBERSICHERHEIT.
Digital Engineering. 2025, Issue 5, p20-21. 2p.

Journal
7

Attacke auf Anforderung.
Martin, Guntermann
Der Handel. 10/23/2025, Issue 5, p12-13. 2p.

Journal
8

Research on the Application of Deep Reinforcement Learning in Automated Penetration Testing Path Optimization and Decision Making.
Wei Li ; Zixuan Zhao ; Youchen Shi ; et al.
International Journal for Housing Science & Its Applications. 2025, Vol. 47 Issue 1, p236-247. 22p.

REINFORCEMENT learning PENETRATION testing (Com... DECISION making
Academic journal
9

One of the Best Hackers in the Country is an AI Bot.
Bass, Dina
Bloomberg.com. 6/24/2025, p29-29. 1p.

Journal
10

A directed greybox fuzzer for windows applications.
Ren, Xin ; Wang, Peng-fei ; Zhou, Xu ; et al.
Scientific Reports. 7/8/2025, Vol. 15 Issue 1, p1-18. 18p.

PENETRATION testing (Com... COMPUTER software testin... APPLICATION software
Academic journal
11

Statistical Analysis of Unique Web Application Vulnerabilities: A Quantitative Assessment of Scanning Tool Efficiency.
Zogaj, Gani ; Ismaili, Florie ; Idrizi, Ermira ; et al.
SEEU Review. Jun2025, Vol. 20 Issue 1, p136-152. 17p.

WEB-based user interface... PENETRATION testing (Com... STANDARD deviations INTERNET security STATISTICS
Academic journal
12

Design and implementation of an intelligent and secure vulnerability assessment framework.
Jaleel, Uruj ; Lalmawipuii, R.
AIP Conference Proceedings; 2026, Vol. 3345 Issue 1, p1-6, 6p

INTERNET of things MACHINE learning PENETRATION testing (Com... DATA integrity ARTIFICIAL intelligence KNOWLEDGE transfer
Conference
13

Directed fuzzing based on path constraints and deviation path correction.
Zuo, Hongsheng ; Fang, Yong ; Jia, Peng ; et al.
Information & Software Technology. Dec2025, Vol. 188, pN.PAG-N.PAG. 1p.

Academic journal
14
15

Detection of cyber attacks using machine learning techniques.
Prasanthi, Guttumukkala ; Manisha, Golla ; Shriya, Nayakudu ; et al.
AIP Conference Proceedings; 2025, Vol. 3361 Issue 1, p1-7, 7p

INTRUSION detection syst... MACHINE learning CYBERTERRORISM DECISION trees RANDOM forest algorithms PENETRATION testing (Com...
Conference
16

STAY AHEAD OF THREATS WITH AUTOMATED PATCH MANAGEMENT.
Sibanda, Isla
Computer Weekly. 1/28/2025, p18-22. 5p.

Journal
17

Best Practices for Keeping Your CMS Updated and Secure.
Business Post Nigeria. 2/14/2025, pN.PAG-N.PAG. 1p.

Journal
18

МЕТОДИКА ВИКОНАННЯ ТЕСТІВ НА ПРОНИКНЕНН...
Яцків, В. В. ; Яцків, Н. Г. ; Возняк, С. І. ; et al.
Informatics & Mathematical Methods in Simulation / Informatika ta Matematičnì Metodi v Modelûvannì. 2025, Vol. 15 Issue 2, p288-296. 9p.

PENETRATION testing (Com... INTERNET security RESEARCH methodology SCHOLARLY method
Academic journal
19

Interval-Valued Neutrosophic Sets-Based IVNS-RAM Method for Enhanced Security Evaluation in Computer Networks.
Lei Yang ; Junyan Niu ; Jiangfeng Li
Neutrosophic Sets & Systems. 2025, Vol. 77, p479-491. 13p.

PENETRATION testing (Com... GROUP decision making RANDOM access memory SECURITY systems DATA security failures
Academic journal
20

Penetration Testing and Attack Automation Simulation: Deep Reinforcement Learning Approach.
Jabr, Ismael ; Salman, Yanal ; Shqair, Motasem ; et al.
An-Najah University Journal for Research, A: Natural Sciences. Feb2025, Vol. 39 Issue 1, p7-14. 8p.

COMPUTER security PENETRATION testing (Com... DEEP reinforcement learn... DATABASES VIRTUAL reality REINFORCEMENT learning
Academic journal

Filter