[HTML][HTML] Overview and open issues on penetration test
D Dalalana Bertoglio, AF Zorzo - Journal of the Brazilian Computer Society, 2017 - Springer
Several studies regarding security testing for corporate environments, networks, and
systems were developed in the past years. Therefore, to understand how methodologies …
systems were developed in the past years. Therefore, to understand how methodologies …
Security Analysis of VoIP Networks Through Penetration Testing
PA Ochang, P Irving - … , ICIST 2017, Druskininkai, Lithuania, October 12–14 …, 2017 - Springer
Abstract The Voice over Internet Protocol (VoIP) is gradually becoming the de facto standard
in communications technology and it is now viewed as a cheap alternative to Public …
in communications technology and it is now viewed as a cheap alternative to Public …
[PDF][PDF] Análise e avaliação de Teste de Intrusão para a estratégia de recomendações Tramonto
DD Bertoglio, AF Zorzo - WTF2017, 2017, Brasil., 2017 - meriva.pucrs.br
Nowadays, research on Penetration Testing (Penetration Tests) has new directions in
Information Security. Methodologies, techniques and tools have been developed to meet the …
Information Security. Methodologies, techniques and tools have been developed to meet the …
[PDF][PDF] Research on Quantitative Assessment of Cyberspace Security Status, Based on AHP and Optimized ERM Mix Algorithm
J Li, Z Xue - 2017 - researchgate.net
Since the concept of Cyberspace is becoming more important, the traditional security
assessment that mainly aimed at the quantity and details of threats is not enough. Especially …
assessment that mainly aimed at the quantity and details of threats is not enough. Especially …
A machine learning approach for smart computer security audit
K Pozdniakov - 2017 - openaccess.city.ac.uk
This thesis presents a novel application of machine learning technology to automate
network security audit and penetration testing processes in particular. A model-free …
network security audit and penetration testing processes in particular. A model-free …
Measuring users' level of information security awareness: research and development of sample questions
H Mäkitalo - 2017 - jyx.jyu.fi
The purpose of this thesis is to develop questions to measure level of users' understating of
information security awareness. Researching the subject is important, because earlier …
information security awareness. Researching the subject is important, because earlier …
[PDF][PDF] A STUDY ON ETHICAL HACKING AND PENETRATION TESTING
AS Moselekatsi, S Doss - ijecrt.org
Because of escalating vulnerabilities to today's changing security environment,
Organizations are now prioritizing the Information security protection. Because now Internet …
Organizations are now prioritizing the Information security protection. Because now Internet …
Μυστικότητα και εμπιστευτικότητα σε αρχιτεκτονικές υπολογιστικού σύννεφου (Cloud Computing)
Π Σπανάκη - 2017 - kypseli.ouc.ac.cy
Η εξέλιξη στην Τεχνολογία των Πληροφοριών, εισήγαγε το Cloud Computing ως μια νέα
τεχνολογία η οποία αφορά την" εικονοποίηση"(virtualization) των διαθέσιμων πόρων. Το …
τεχνολογία η οποία αφορά την" εικονοποίηση"(virtualization) των διαθέσιμων πόρων. Το …