GAIL-PT: An intelligent penetration testing framework with generative adversarial imitation learning

J Chen, S Hu, H Zheng, C Xing, G Zhang - Computers & Security, 2023 - Elsevier
Penetration testing (PT) is an efficient tool for network testing and vulnerability mining by
simulating the hackers' attacks to obtain valuable information applied in operating and …

Penetration testing in IoT network

R Johari, I Kaur, R Tripathi… - 2020 5th International …, 2020 - ieeexplore.ieee.org
Penetration testing, also known as Pen testing is usually performed by a testing professional
in order to detect security threats involved in a system. Penetration testing can also be …

SQL injection: Types, methodology, attack queries and prevention

N Singh, M Dayal, RS Raw… - 2016 3rd International …, 2016 - ieeexplore.ieee.org
SQL injection can be defined as the technique where hacker executes malicious SQL
queries on the database server through a web application to either gain access over the …

Fuzz test case generation for penetration testing in mobile cloud computing applications

AS Al-Ahmad, H Kahtan - Intelligent Computing & Optimization 1, 2019 - Springer
Security testing for applications is a critical practice used to protect data and users.
Penetration testing is particularly important, and test case generation is one of its critical …

GAIL-PT: a generic intelligent penetration testing framework with generative adversarial imitation learning

J Chen, S Hu, H Zheng, C Xing, G Zhang - arXiv preprint arXiv:2204.01975, 2022 - arxiv.org
Penetration testing (PT) is an efficient network testing and vulnerability mining tool by
simulating a hacker's attack for valuable information applied in some areas. Compared with …

Analisa Serangan Sql Injeksi Menggunakan Sqlmap

S Lika, RDP Halim, I Verdian - POSITIF: Jurnal Sistem dan …, 2018 - ejurnal.poliban.ac.id
In today's world, SQL injection is a serious security threat on the Internet for various dynamic
web sites on the internet. Because internet usage for various online services is increasing …

An efficient image security mechanism based on advanced encryption standard

P Singhai, A Shrivastava - International Journal of Advanced …, 2015 - search.proquest.com
This paper presents an efficient scheme for image data encryption. In this paper an efficient
framework has been presented for data security. In this framework two separate frames are …

RC6 based data security and attack detection

N Varshney, K Raghuwanshi - Proceedings of First International …, 2016 - Springer
Java server pages (JSP) and Hypertext Preprocessor (PHP) are the most common scripting
language which is used for web designing. Both are used with Hyper Text Markup …

[PDF][PDF] An approach for efficient intrusion detection for KDD dataset: a survey

N Sharma, B Gaur - International Journal of Advanced Technology …, 2016 - academia.edu
Identifying possible attacks on the network system is a challenging task. There is several
research works are processed in this direction, but the need of improvement is always …

[PDF][PDF] Analisis Keamanan Serangan Sql Injection Berdasarkan Metode Koneksi Database

SS Ardiansyah, S Raharjo… - Jurnal …, 2016 - download.garuda.kemdikbud.go.id
The rapid development of information technology enabling everyone to access the needed
information instantly. Security becomes a very important factor if the information are …