Penetration test

Known as: Ethical hack, Black Box Penetration Testing, Pen tester 
A penetration test, informally pen test, is an attack on a computer system that looks for security weaknesses, potentially gaining access to the… (More)
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2011
Highly Cited
2011
  • J.., BARnzzN, L. N. Coopzzg, Ann, J. R. Scrrzrzzzzzf
  • 2011
A theory of superconductivity is presented, based on the fact that the interaction between electrons resulting from virtual… (More)
Is this relevant?
Highly Cited
2010
Highly Cited
2010
The advanced metering infrastructure (AMI) is revolutionizing electrical grids. Intelligent AMI "smart meters" report real time… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2009
2009
Penetration testing is one of the oldest methods for assessing the security of a computer system. The idea behind penetration… (More)
  • figure 1
Is this relevant?
2009
2009
The electric cone penetration test (CPT) has been in use for over 40 years and is growing in popularity in North America. This… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • table 1
Is this relevant?
Highly Cited
2007
Highly Cited
2007
Students generally learn red teaming, sometimes called penetration testing or ethical hacking, as "breaking into your own system… (More)
Is this relevant?
2004
2004
A semiempirical approach to estimate liquefaction-induced lateral displacements using standard penetration test ~SPT! or cone… (More)
  • figure 1
  • figure 2
  • table 1
  • table 2
  • table 3
Is this relevant?
2002
2002
Penetration testing is the art of finding an open door. It is not a science as science depends on falsifiable hypotheses. The… (More)
Is this relevant?
Highly Cited
2000
Highly Cited
2000
T h e m o d e l i n g o f pe ne t r a t i on tes t ing as a Petr i ne t is su rp r i s ing ly usefu l . I t re ta ins key a d v a… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
1996
1996
Taylor & Francis makes every effort to ensure the accuracy of all the information (the “Content”) contained in the publications… (More)
Is this relevant?
1989
1989
A systematic approach to penetration testing of an existing software system is described. The testing depends on analysis of the… (More)
  • figure I
  • table 1
Is this relevant?