A Systematic Literature Review on Penetration Testing in Networks: Future Research Directions

M Alhamed, MMH Rahman - Applied Sciences, 2023 - mdpi.com
Given the widespread use of the internet at the individual, governmental, and
nongovernmental levels, and the opportunities it offers, such as online shopping, security …

Implementation of penetration testing tools to test wi-fi security levels at the directorate of innovation and business incubators

T Ariyadi, MR Pohan - Jurnal Penelitian Pendidikan IPA, 2023 - jppipa.unram.ac.id
Wi-Fi networks have become a critical infrastructure in many organisations, including the
Directorate of Innovation and Business Incubator. However, potential vulnerabilities in Wi-Fi …

Evaluation of Wireless Network Security with Penetration Testing Method at PT PLN UP2D S2JB

T Ariyadi, I Irham, EF Cahyadi - Jurnal Infotel, 2024 - ejournal.ittelkom-pwt.ac.id
Advances in information and communication technology continue to develop over time. This
causes significant changes in social, economic, and political conditions. One of the …

RF parmak izi kullanılarak IoT cihaz tanımada meta aşırı öğrenme makinası tabanlı başarım analizi

H Parmaksız - 2023 - acikkaynak.bilecik.edu.tr
Günümüzün gözde teknolojilerinden biri olan IoT kavramının ortaya çıkması, akıllı cihazların
getirdiği kolaylıklar ve kullanımının yaygınlaşmasıyla birlikte kablosuz cihazların sayısı …

EVALUASI KEAMANAN JARINGAN WIRELESS DENGAN METODE PENETRATION TESTING PADA PT. PLN UP2D S2JB

I IRHAM - 2023 - repository.binadarma.ac.id
Kemajuan Teknologi informasi dan komunikasi semakin terus berkembang seiring
berjalannya waktu. Hal ini menyebabkan perubahan-perubahan yang signifikan dalam …

МЕТОДЫ ЗАЩИТЫ ДАННЫХ В WI-FI СЕТЯХ

РЛ Ануфренка - ТЕХНОЛОГИИ ИНФОРМАЦИОННОГО ОБЩЕСТВА, 2020 - elibrary.ru
Рассмотрены основные протоколы обеспечения безопасности в Wi-Fi сетях. Показаны
основные уязвимости и особенности работ каждого протокола. На основании …

[引用][C] PERFORMANCE SCRUTINY OF AUTOMATED PENETRATION TESTING MODEL FOR CLOUD COMPUTING

AK Navalakha, N Sharma, R Sharma, IR Khan