Comparative analysis of Static application security testing (SAST) and Dynamic application security testing (DAST) by using open-source web application penetration …

L Dencheva - 2022 - norma.ncirl.ie
In the current age of fundamental science, technological progress and the fully globalized
world of technology, Cybersecurity is extremely important to ensure a high level of protection …

[PDF][PDF] Bayesian network based analysis of cyber security impact on safety

D Lichte, KD Wolf - Proc. European Safety and Reliability …, 2019 - researchgate.net
Cyber security gains further importance regarding life cycle risk analysis of technical
systems, eg Cyber Physical Systems (CPS) or Systems of Systems (SoS) in the context of …

Exploring the Strategic Cybersecurity Defense Information Technology Managers Can Implement to Reduce Healthcare Data Breaches

M Mawel - 2022 - search.proquest.com
The qualitative research method and exploratory design explored the strategic cybersecurity
defense Information Technology (IT) Managers can implement to reduce healthcare data …

Reshaping Cybersecurity Practices by Optimizing Web Application Penetration Testing

K Hussain, MAU Sheikh, T Naing… - … With Generative AI …, 2025 - igi-global.com
Web application penetration testing is known as pretesting. It is a critical process for
identifying and addressing security vulnerabilities in web applications. Statistics show that …

The Convergence of AI and Cybersecurity: An Examination of ChatGPT's Role in Penetration Testing and its Ethical and Legal Implications

MP Heim, N Starckjohann, M Torgersen - 2023 - ntnuopen.ntnu.no
Artificial intelligence (AI) and AI chatbots like ChatGPT are rapidly emerging technologies
that have the potential to transform various sectors, including cybersecurity. However, their …

Análisis integral de seguridad en dispositivos IoT

S Oliveira Morilla - 2024 - openaccess.uoc.edu
Este proyecto realiza un análisis exhaustivo de la seguridad en dispositivos IoT, con un
enfoque en la identificación y mitigación de vulnerabilidades. La investigación abarca un …

[PDF][PDF] Micah Wieburg-Week 3-Research Paper

ML Wieburg, J Webb - 2022 - micahwieburg.com
Organizations in modern times have placed a heavy emphasis on having strong security
policies for IT infrastructure. Information contained within a company's data systems is one of …

Detecção e Análise de Vulnerabilidades em um Servidor OJS utilizando Teste de Penetração

DP Maciel - 2019 - repositorio.ufc.br
Este trabalho tem como objetivo detectar e analisar possíveis vulnerabilidades existentes
em um servidor OJS local utilizando técnicas de teste de penetração. Para isso, foram …