Sign Up to like & get
recommendations!
1
Published in 2018 at "Continental Shelf Research"
DOI: 10.1016/j.csr.2018.03.012
Abstract: Abstract We evaluate the applicability of cone penetration testing (CPT), calibrated using adjacent cores, as a tool for the sedimentological and stratigraphic examination of late Quaternary tide-dominated successions in the eastern China coastal plain. The…
read more here.
Keywords:
penetration testing;
tide dominated;
dominated successions;
testing cpt ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2019 at "IEEE Access"
DOI: 10.1109/access.2019.2956770
Abstract: Mobile cloud computing (MCC) enables mobile devices to exploit seamless cloud services via offloading, and has numerous advantages and increased security and complexity. Penetration testing of mobile applications has become more complex and expensive due…
read more here.
Keywords:
review;
mobile cloud;
cloud computing;
penetration ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2018 at "Indonesian Journal of Electrical Engineering and Computer Science"
DOI: 10.11591/ijeecs.v11.i1.pp51-59
Abstract: The massive development of technology especially in computers, mobile devices, and networking has bring security issue forward as primarily concern. The computers and mobile devices connected to Internet are exposed to numerous threats and exploits.…
read more here.
Keywords:
penetration testing;
security;
setup;
security audit ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2020 at "International Journal on Advanced Science, Engineering and Information Technology"
DOI: 10.18517/ijaseit.10.5.8862
Abstract: Information security often neglected by individual or employee or even by the enterprise, with there is no proper strategy to raise awareness, promote consistency and maintain performance regarding protect sensitive, confidential, and critical data. One…
read more here.
Keywords:
penetration;
framework;
penetration testing;
testing vapt ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2022 at "Future Internet"
DOI: 10.3390/fi14100276
Abstract: Security testing is fundamental to identifying security vulnerabilities on smart home-based IoT devices. For this, penetration testing is the most prominent and effective solution. However, testing the IoT manually is cumbersome and time-consuming. In addition,…
read more here.
Keywords:
home based;
smart home;
penetration testing;
iot devices ... See more keywords