Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 232,175,170 papers from all fields of science
Search
Sign In
Create Free Account
Penetration test
Known as:
Ethical hack
, Black Box Penetration Testing
, Pen tester
Expand
A penetration test, informally pen test, is an attack on a computer system that looks for security weaknesses, potentially gaining access to the…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
49 relations
Armitage
BackBox Linux
BackTrack
Black-box testing
Expand
Broader (2)
Computer security
Software testing
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2010
Highly Cited
2010
Robust iris indexing scheme using geometric hashing of SIFT keypoints
H. Mehrotra
,
B. Majhi
,
Phalguni Gupta
Journal of Network and Computer Applications
2010
Corpus ID: 23613157
Highly Cited
2009
Highly Cited
2009
On the state and guiding principles of broadband in India
A. Gumaste
,
Prasad Gokhale
,
Asheesh Dhar
IEEE Communications Magazine
2009
Corpus ID: 19025844
India, home to 1.2 billion people with a GDP growth of 9 percent, has been experiencing flat to modest growth of broadband…
Expand
2006
2006
A novel filterless fluorescence detection sensor for DNA analysis
Y. Maruyama
,
K. Sawada
,
H. Takao
,
M. Ishida
IEEE Transactions on Electron Devices
2006
Corpus ID: 26837393
A new method is presented of on-chip optical spectroscopy, functioning without the need for a bandpass filter or grating. The…
Expand
2006
2006
The effect of concrete target diameter on projectile deceleration and penetration depth
D. J. Frewa
,
M. J. Forrestala
,
J. D. Cargileb
2006
Corpus ID: 37409431
We conducted sets of experiments with three diameters of concrete targets that had an average compressive strength of 23MPa (3.3…
Expand
2006
2006
Stability Improvement of Wind Turbine Systems by STATCOM
Z. Chen
,
F. Blaabjerg
,
Y. Hu
Annual Conference of the IEEE Industrial…
2006
Corpus ID: 28867426
The development of renewable energy based generation technologies attracts more and more attention. In particularly large number…
Expand
Highly Cited
2004
Highly Cited
2004
‘Mobile Termination Charges: Calling Party Pays versus Receiving Party Pays’(original and revised versions)
S. Littlechild
2004
Corpus ID: 53452305
2002
2002
In-Cylinder Penetration and Break-Up of Diesel Sprays Using a Common-Rail Injection System
D. Kennaird
,
C. Crua
,
J. Lacoste
,
M. Heikal
,
M. Gold
,
N. Jackson
2002
Corpus ID: 59587541
As part of an ongoing investigation, the influence of in-cylinder charge density, and injector nozzle geometry on the behavior of…
Expand
Highly Cited
1998
Highly Cited
1998
Seismic stratigraphy of Palmer Deep: a fault-bounded late Quaternary sediment trap on the inner continental shelf, Antarctic Peninsula Pacific margin
M. Rebesco
,
A. Camerlenghi
,
L. D. Santis
,
E. Domack
,
M. Kirby
1998
Corpus ID: 129907151
1986
1986
Beam Absorption Mechanism In Laser Welding
I. Miyamoto
,
H. Maruo
,
Y. Arata
Other Conferences
1986
Corpus ID: 137214552
Mechanism of laser beam absorption was analyzed in key hole welding of thin plate and deep penetration welding of thick plate on…
Expand
Highly Cited
1985
Highly Cited
1985
A unified approach to bubbling-jetting phenomena in powder injection into iron and steel
L. Farias
,
G. Irons
1985
Corpus ID: 137262343
The injection of powder into liquids has been investigated by physical modeling and by multi-phase fluid dynamic modeling. The…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE