[HTML][HTML] Code injection attacks in wireless-based Internet of Things (IoT): A comprehensive review and practical implementations

HA Noman, OMF Abu-Sharkh - Sensors, 2023 - mdpi.com
The Internet of Things (IoT) has transformed various domains in our lives by enabling
seamless communication and data exchange between interconnected devices …

[HTML][HTML] Research communities in cyber security vulnerability assessments: A comprehensive literature review

F Heiding, S Katsikeas, R Lagerström - Computer Science Review, 2023 - Elsevier
Ethical hacking and vulnerability assessments are gaining rapid momentum as academic
fields of study. Still, it is sometimes unclear what research areas are included in the …

[HTML][HTML] Penetration Taxonomy: A Systematic Review on the Penetration Process, Framework, Standards, Tools, and Scoring Methods

KU Sarker, F Yunus, A Deraman - Sustainability, 2023 - mdpi.com
Cyber attackers are becoming smarter, and at the end of the day, many novel attacks are
hosted in the cyber world. Security issues become more complex and critical when the …

[HTML][HTML] Design optimization for microstrip antennas based on polymethyl methacrylate (PMMA) substrate and carbon nanotube (CNT) conductive material in sub-6 …

D Ziani, M Belkheir, M Rouissat… - Beni-Suef University …, 2024 - Springer
Background The rapid expansion of modern smart applications, demanding faster data
transfer and extensive bandwidth, has prompted the development of new-generation …

[HTML][HTML] Enhancing mobile security through comprehensive penetration testing

M Roshanaei - Journal of Information Security, 2024 - scirp.org
In today's era, where mobile devices have become an integral part of our daily lives,
ensuring the security of mobile applications has become increasingly crucial. Mobile …

Harnessing Machine Learning for Effective Cyber security Classifiers

T Jena, A Shankar, A Singhdeo - Asian Journal of …, 2023 - research.send4journal.com
Machine learning has emerged as a transformative force, innovating diverse industries
through its capacity to infuse meaningful insights from large datasets. It plays a pivotal role in …

Cybersecurity Strengthening through Penetration Testing: Emerging Trends and Challenges

AK Mahamood, M Malik, AB Ruhani… - … Journal eISSN 2636 …, 2023 - majmuah.com
Penetration testing is an important tool for assessing system security posture and detecting
vulnerabilities. Cybersecurity risks, such as hacking and data breaches, have become …

Theory and practice in secure software development lifecycle: A comprehensive survey

M Otieno, D Odera, JE Ounza - World Journal of Advanced Research and …, 2023 - wjarr.com
Software development security refers to the practice of integrating security measures and
considerations throughout the software development lifecycle to ensure the confidentiality …

Live forensics untuk mengenali karakteristik serangan file upload guna meningkatkan keamanan pada web server: Indonesia

I Putra, Y Prayudi, A Luthfi - JIIP-Jurnal Ilmiah Ilmu …, 2023 - garuda.kemdikbud.go.id
Serangan file upload pada web server menyebabkan seseorang dapat melakukan
Distributed denial-of-service yang bisa melumpuhkan web server dan web shell dapat …

Analysis of Vulnerability Assessment Technique Implementation on Network Using OpenVas

M Muharrom, A Saktiansyah - International …, 2023 - journal.universitasbumigora.ac.id
Vulnerability Assessment is an important method for identifying and analyzing security
vulnerabilities within a network system. This research aims to identify security vulnerabilities …