Articles with "penetration testing" as a keyword



Photo from wikipedia

Use of the Cone Penetration Testing (CPT) method to interpret late Quaternary tide-dominated successions: A case study from the eastern China coastal plain

Sign Up to like & get
recommendations!
Published in 2018 at "Continental Shelf Research"

DOI: 10.1016/j.csr.2018.03.012

Abstract: Abstract We evaluate the applicability of cone penetration testing (CPT), calibrated using adjacent cores, as a tool for the sedimentological and stratigraphic examination of late Quaternary tide-dominated successions in the eastern China coastal plain. The… read more here.

Keywords: penetration testing; tide dominated; dominated successions; testing cpt ... See more keywords
Photo from wikipedia

Systematic Literature Review on Penetration Testing for Mobile Cloud Computing Applications

Sign Up to like & get
recommendations!
Published in 2019 at "IEEE Access"

DOI: 10.1109/access.2019.2956770

Abstract: Mobile cloud computing (MCC) enables mobile devices to exploit seamless cloud services via offloading, and has numerous advantages and increased security and complexity. Penetration testing of mobile applications has become more complex and expensive due… read more here.

Keywords: review; mobile cloud; cloud computing; penetration ... See more keywords
Photo from wikipedia

On the Review and Setup of Security Audit using Kali Linux

Sign Up to like & get
recommendations!
Published in 2018 at "Indonesian Journal of Electrical Engineering and Computer Science"

DOI: 10.11591/ijeecs.v11.i1.pp51-59

Abstract: The massive development of technology especially in computers, mobile devices, and networking has bring security issue forward as primarily concern. The computers and mobile devices connected to Internet are exposed to numerous threats and exploits.… read more here.

Keywords: penetration testing; security; setup; security audit ... See more keywords
Photo by mykjohnson from unsplash

Vulnerability Assessment and Penetration Testing (VAPT) Framework: Case Study of Government’s Website

Sign Up to like & get
recommendations!
Published in 2020 at "International Journal on Advanced Science, Engineering and Information Technology"

DOI: 10.18517/ijaseit.10.5.8862

Abstract: Information security often neglected by individual or employee or even by the enterprise, with there is no proper strategy to raise awareness, promote consistency and maintain performance regarding protect sensitive, confidential, and critical data. One… read more here.

Keywords: penetration; framework; penetration testing; testing vapt ... See more keywords
Photo from wikipedia

Automated Penetration Testing Framework for Smart-Home-Based IoT Devices

Sign Up to like & get
recommendations!
Published in 2022 at "Future Internet"

DOI: 10.3390/fi14100276

Abstract: Security testing is fundamental to identifying security vulnerabilities on smart home-based IoT devices. For this, penetration testing is the most prominent and effective solution. However, testing the IoT manually is cumbersome and time-consuming. In addition,… read more here.

Keywords: home based; smart home; penetration testing; iot devices ... See more keywords