[HTML][HTML] Model-based security testing in IoT systems: A Rapid Review
F Lonetti, A Bertolino, F Di Giandomenico - Information and Software …, 2023 - Elsevier
Context: Security testing is a challenging and effort-demanding task in IoT scenarios. The
heterogeneous devices expose different vulnerabilities that can influence the methods and …
heterogeneous devices expose different vulnerabilities that can influence the methods and …
An overview of the benefits, challenges, and legal aspects of penetration testing and red teaming
FM Teichmann, SR Boticiu - International Cybersecurity Law Review, 2023 - Springer
Although red teaming and penetration testing are similar in their end results, it is important
for organizations to choose the right assessment for the right purpose, taking into account …
for organizations to choose the right assessment for the right purpose, taking into account …
Future Trends and Emerging Threats in Drone Cybersecurity
SR Sindiramutty, NZ Jhanjhi, CE Tan… - … Issues and Challenges …, 2024 - igi-global.com
The rapid proliferation of drone technology has ushered in a new era of innovation and
convenience across various industries. However, this technological advancement has also …
convenience across various industries. However, this technological advancement has also …
Healthcare System and Infra-Security
DP Sharma, A Habibi Lashkari, M Parizadeh - … Management in Healthcare …, 2024 - Springer
The convergence of digitization and globalization has revolutionized various sectors,
including healthcare, by enabling rapid expansion and efficient communication through the …
including healthcare, by enabling rapid expansion and efficient communication through the …
Multi-source Analysis of AI Vulnerabilities: Methodology and Algorithms of Data Collection
O Neretin, V Kharchenko… - 2023 IEEE 12th …, 2023 - ieeexplore.ieee.org
The initial stage of assessing the cybersecurity of artificial intelligence (AI) systems and tools
for cyber-physical systems is the collecting, processing and integrating of vulnerability data …
for cyber-physical systems is the collecting, processing and integrating of vulnerability data …
Unveiling cybersecurity frontiers: A comprehensive study of ethical hacking for information security
P Agrawal, GK Gupta, G Kaur, K Bhele… - AIP Conference …, 2024 - pubs.aip.org
To protect user data and digital infrastructure ethical hacking has become a tool, in the
changing field of cybersecurity. This introductory passage provides an overview of a paper …
changing field of cybersecurity. This introductory passage provides an overview of a paper …
Systematic Review of Fuzzing in IoT: Evaluating Techniques, Vulnerabilities, and Research Gaps
A Touqir, F Iradat, A Rakib, N Taskin, H Jadidbonab… - 2024 - researchsquare.com
As our dependence on the internet and digital platforms grows, the risk of cyber threats rises,
making it essential to implement effective Measures to safeguard sensitive information …
making it essential to implement effective Measures to safeguard sensitive information …
A Scoping Review of Intelligent Cyber-Physical Systems in Healthcare
The chapter delves into the pivotal role of Intelligent Cyber-Physical Systems (CPS) within
the healthcare domain, elucidating their transformative potential and myriad benefits. Amidst …
the healthcare domain, elucidating their transformative potential and myriad benefits. Amidst …
A Holistic Approach for Cyber Security Vulnerability Assessment Based on Open Source Tools: Nikto, Acunitx, ZAP, Nessus and Enhanced with AI-Powered Tool …
AM Sllame, TE Tomia… - 2024 IEEE 4th International …, 2024 - ieeexplore.ieee.org
This paper describes a cyber security vulnerability assessment methodology powered by AI
tactics. The AI-powered tool “ImmuniWeb AI” effectively supported the tools of the suggested …
tactics. The AI-powered tool “ImmuniWeb AI” effectively supported the tools of the suggested …
A Comparative Study on Vulnerabilities, Challenges, and Security Measures in Wireless Network Security
A Ullah, MN Sakib, MH Rahman, MSK Shahin… - … on Intelligent Systems …, 2023 - Springer
Featuring a focus on machine learning algorithms and the crucial field of wireless network
security, this research project emphasizes the strategic usage of honeypots through a variety …
security, this research project emphasizes the strategic usage of honeypots through a variety …