Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 222,884,432 papers from all fields of science
Search
Sign In
Create Free Account
Penetration test
Known as:
Ethical hack
, Black Box Penetration Testing
, Pen tester
Expand
A penetration test, informally pen test, is an attack on a computer system that looks for security weaknesses, potentially gaining access to the…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
49 relations
Armitage
BackBox Linux
BackTrack
Black-box testing
Expand
Broader (2)
Computer security
Software testing
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2010
Highly Cited
2010
Robust iris indexing scheme using geometric hashing of SIFT keypoints
H. Mehrotra
,
B. Majhi
,
Phalguni Gupta
Journal of Network and Computer Applications
2010
Corpus ID: 23613157
Highly Cited
2008
Highly Cited
2008
The Effect of Standards and Fuel Prices on Automobile Fuel Economy: An International Analysis
Sofronis Clerides
,
T. Zachariadis
2008
Corpus ID: 153944261
There is an intense debate over whether fuel economy standards or fuel taxation is the more efficient policy instrument to raise…
Expand
Highly Cited
2007
Highly Cited
2007
Effect of root depth penetration on soil nitrogen competitive interactions and dry matter production in pea-barley intercrops given different soil nitrogen supplies
G. Corre-Hellou
,
N. Brisson
,
M. Launay
,
J. Fustec
,
Y. Crozat
2007
Corpus ID: 56195318
Review
2005
Review
2005
Issues and recent trends in vehicle safety communication systems
S. Tsugawa
2005
Corpus ID: 18448684
Highly Cited
2004
Highly Cited
2004
‘Mobile Termination Charges: Calling Party Pays versus Receiving Party Pays’(original and revised versions)
S. Littlechild
2004
Corpus ID: 53452305
Review
1997
Review
1997
Location management methods for third-generation mobile systems
S. Tabbane
IEEE Communications Magazine
1997
Corpus ID: 5563529
This article provides an overview of the means and techniques used for subscriber location management in present cellular mobile…
Expand
Highly Cited
1997
Highly Cited
1997
Multiple-Scales Solution to the Acoustic Boundary Layer in Solid Rocket Motors
J. Majdalani
,
W. Moorhem
1997
Corpus ID: 120707528
The acoustic boundary-layer structure is investigated in a cylindrical tube where steady sidewall injection is imposed upon an…
Expand
Highly Cited
1995
Highly Cited
1995
Oral Route of Peptide and Protein Drug Delivery
V. Lee
1995
Corpus ID: 54005521
Designing means to deliver peptide and protein drugs successfully to the systemic circulation by the oral route has been a…
Expand
Highly Cited
1989
Highly Cited
1989
UV-excimer-laser ablation of polymethylmethacrylate at 248 nm: Characterization of incubation sites with Fourier transform IR- and UV-Spectroscopy
S. Küper
,
M. Stuke
1989
Corpus ID: 10335108
Ultraviolet and Fourier transform infrared (FTIR) spectroscopic experiments with thin films of polymethylmethacrylate (PMMA) are…
Expand
Highly Cited
1986
Highly Cited
1986
Economic Incentives for Countertrade
R. Mirus
,
B. Yeung
1986
Corpus ID: 41054666
This paper examines countertrade using standard economic theory. We show that in many circumstances countertrade is a rational…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE