[HTML][HTML] Overview and open issues on penetration test

D Dalalana Bertoglio, AF Zorzo - Journal of the Brazilian Computer Society, 2017 - Springer
Several studies regarding security testing for corporate environments, networks, and
systems were developed in the past years. Therefore, to understand how methodologies …

Security Analysis of VoIP Networks Through Penetration Testing

PA Ochang, P Irving - … , ICIST 2017, Druskininkai, Lithuania, October 12–14 …, 2017 - Springer
Abstract The Voice over Internet Protocol (VoIP) is gradually becoming the de facto standard
in communications technology and it is now viewed as a cheap alternative to Public …

[PDF][PDF] Análise e avaliação de Teste de Intrusão para a estratégia de recomendações Tramonto

DD Bertoglio, AF Zorzo - WTF2017, 2017, Brasil., 2017 - meriva.pucrs.br
Nowadays, research on Penetration Testing (Penetration Tests) has new directions in
Information Security. Methodologies, techniques and tools have been developed to meet the …

[PDF][PDF] Research on Quantitative Assessment of Cyberspace Security Status, Based on AHP and Optimized ERM Mix Algorithm

J Li, Z Xue - 2017 - researchgate.net
Since the concept of Cyberspace is becoming more important, the traditional security
assessment that mainly aimed at the quantity and details of threats is not enough. Especially …

A machine learning approach for smart computer security audit

K Pozdniakov - 2017 - openaccess.city.ac.uk
This thesis presents a novel application of machine learning technology to automate
network security audit and penetration testing processes in particular. A model-free …

Measuring users' level of information security awareness: research and development of sample questions

H Mäkitalo - 2017 - jyx.jyu.fi
The purpose of this thesis is to develop questions to measure level of users' understating of
information security awareness. Researching the subject is important, because earlier …

[PDF][PDF] A STUDY ON ETHICAL HACKING AND PENETRATION TESTING

AS Moselekatsi, S Doss - ijecrt.org
Because of escalating vulnerabilities to today's changing security environment,
Organizations are now prioritizing the Information security protection. Because now Internet …

Μυστικότητα και εμπιστευτικότητα σε αρχιτεκτονικές υπολογιστικού σύννεφου (Cloud Computing)

Π Σπανάκη - 2017 - kypseli.ouc.ac.cy
Η εξέλιξη στην Τεχνολογία των Πληροφοριών, εισήγαγε το Cloud Computing ως μια νέα
τεχνολογία η οποία αφορά την" εικονοποίηση"(virtualization) των διαθέσιμων πόρων. Το …