Showing 1 - 20
of 877
- 1
- 2
Pagination
Hacker journeys: exploring paths in and out of illicit hacking through personal narratives.
Machande, Alina D. ; Joinson, Adam N. ; Smith, Laura G.E.
Behaviour & Information Technology. Dec2025, p1-18. 18p.
Intrusion detection in campus information systems through penetration tests.
Miftahuddin, Yusup ; Sholahuddin, Sholahuddin
AIP Conference Proceedings. 2025, Vol. 3351 Issue 1, p1-10. 10p.
PRWHA: RGB Image-Based Hybrid Attention for Cross-File SQLI/XSS Vulnerability Detection in PHP Web Applications.
Ren, Rong ; Song, Qingyu ; Zhang, Bing ; et al.
International Journal of Software Engineering & Knowledge Engineering. Mar2026, Vol. 36 Issue 3, p455-486. 32p.
This AI Tool Can Plan and Execute Penetration Tests on Its Own.
Harvey, Grant ; Ofonagoro, Joseph Chisom ; Ticong, Liz ; et al.
eWeek. 12/31/2025, pN.PAG-N.PAG. 1p.
Des outils et des services pour détecter les failles avant les hackers.
MAUGER, CHARLOTTE
IT for Business. oct2025, Issue 2309, p48-49. 2p.
MIT PENTESTING ZUM NÄCHSTEN LEVEL DER CYBERSICHERHEIT.
Digital Engineering. 2025, Issue 5, p20-21. 2p.
Attacke auf Anforderung.
Martin, Guntermann
Der Handel. 10/23/2025, Issue 5, p12-13. 2p.
Research on the Application of Deep Reinforcement Learning in Automated Penetration Testing Path Optimization and Decision Making.
Wei Li ; Zixuan Zhao ; Youchen Shi ; et al.
International Journal for Housing Science & Its Applications. 2025, Vol. 47 Issue 1, p236-247. 22p.
One of the Best Hackers in the Country is an AI Bot.
Bass, Dina
Bloomberg.com. 6/24/2025, p29-29. 1p.
A directed greybox fuzzer for windows applications.
Ren, Xin ; Wang, Peng-fei ; Zhou, Xu ; et al.
Scientific Reports. 7/8/2025, Vol. 15 Issue 1, p1-18. 18p.
Statistical Analysis of Unique Web Application Vulnerabilities: A Quantitative Assessment of Scanning Tool Efficiency.
Zogaj, Gani ; Ismaili, Florie ; Idrizi, Ermira ; et al.
SEEU Review. Jun2025, Vol. 20 Issue 1, p136-152. 17p.
Design and implementation of an intelligent and secure vulnerability assessment framework.
Jaleel, Uruj ; Lalmawipuii, R.
AIP Conference Proceedings; 2026, Vol. 3345 Issue 1, p1-6, 6p
Directed fuzzing based on path constraints and deviation path correction.
Zuo, Hongsheng ; Fang, Yong ; Jia, Peng ; et al.
Information & Software Technology. Dec2025, Vol. 188, pN.PAG-N.PAG. 1p.
Seven inevitable cyber threats every Australian organisation must be ready to contain.
Sperring, Garth
CIO (13284045). 11/17/2025, pN.PAG-N.PAG. 1p.
Detection of cyber attacks using machine learning techniques.
Prasanthi, Guttumukkala ; Manisha, Golla ; Shriya, Nayakudu ; et al.
AIP Conference Proceedings; 2025, Vol. 3361 Issue 1, p1-7, 7p
STAY AHEAD OF THREATS WITH AUTOMATED PATCH MANAGEMENT.
Sibanda, Isla
Computer Weekly. 1/28/2025, p18-22. 5p.
Best Practices for Keeping Your CMS Updated and Secure.
Business Post Nigeria. 2/14/2025, pN.PAG-N.PAG. 1p.
МЕТОДИКА ВИКОНАННЯ ТЕСТІВ НА ПРОНИКНЕНН...
Яцків, В. В. ; Яцків, Н. Г. ; Возняк, С. І. ; et al.
Informatics & Mathematical Methods in Simulation / Informatika ta Matematičnì Metodi v Modelûvannì. 2025, Vol. 15 Issue 2, p288-296. 9p.
Interval-Valued Neutrosophic Sets-Based IVNS-RAM Method for Enhanced Security Evaluation in Computer Networks.
Lei Yang ; Junyan Niu ; Jiangfeng Li
Neutrosophic Sets & Systems. 2025, Vol. 77, p479-491. 13p.
Penetration Testing and Attack Automation Simulation: Deep Reinforcement Learning Approach.
Jabr, Ismael ; Salman, Yanal ; Shqair, Motasem ; et al.
An-Najah University Journal for Research, A: Natural Sciences. Feb2025, Vol. 39 Issue 1, p7-14. 8p.
- 1
- 2