-
1
-
2
-
3
-
4
-
5
It takes a pirate to know one: ethical hackers for healthcare cybersecurity
Published 2022-12-01“…Additionally, it is important to distinguish between malicious hackers and ethical hackers. Amongst the latter, penetration testers are only a sub-category. …”
Get full text
Article -
6
-
7
Determination of parameters affecting the possibility of computer attack implemented by an intruder
Published 2021-04-01“…Existing methodologies for assessing CA are Cyber Kill Chain, Mitre Att&ck, NIST 800-115, Certified Ethical Hacker (CEH), FSTEC of Russia and ISO 27001/ They offer approaches to the analysis of CA from the organization point of view. …”
Get full text
Article -
8
Hands on Hacking /
Published 2020“…This book holds no punches and explains the tools, tactics and procedures used by ethical hackers and criminal crackers alike. We will take you on a journey through a hacker's perspective when focused on the computer infrastructure of a targetcompany, exploring how to access the servers and data. …”
text -
9
Vulnerability exploitations using steganography in PDF files
Published 2020“…Several experiments are detailed exploiting gaps in PDF, email and image files in order to draw awareness to security professionals and Ethical hackers’ trainees.…”
Get full text
Article -
10
An Effective Method for Detecting Cyber Attacks on Computer Networks from the NSL-KDD Data Set
Published 2025-01-01“…Cybercrime is rapidly increasing and exploits various vulnerabilities in these computing environments. Ethical hackers pay more attention to determining vulnerabilities and recommending mitigation methods. …”
Get full text
Article -
11
Navigating vulnerability markets and bug bounty programs: A public policy perspective
Published 2024-02-01“…I argue that bug bounty programs that bring together organisations and ethical hackers to trade vulnerabilities produce the highest impact. …”
Get full text
Article -
12
The Impacts of Ethical Hacking and its Security Mechanisms
Published 2022-12-01“…A person or corporation that does ethical hacking and receives incentives from a network or system owner for testing can enter an apparatus (system or network) to locate, repair, and expose network flaws. Most ethical hackers, also known as black hat hackers, test systems using different approaches, methodologies, and tools. …”
Get full text
Article -
13
Face Detection Performance Using CNNs and Bug Bonuty Program (BBP)
Published 2024-03-01“… Bug bounty schemes make use of outside ethical hackers to find and fix a variety of security flaws, guaranteeing quicker and more affordable problem solving. …”
Get full text
Article -
14
Windows APT Warfare : Identify and prevent Windows APT attacks effectively /
Published 2023“…What you will learn Explore various DLL injection techniques for setting API hooks Understand how to run an arbitrary program file in memory Become familiar with malware obfuscation techniques to evade antivirus detection Discover how malware circumvents current security measures and tools Use Microsoft Authenticode to sign your code to avoid tampering Explore various strategies to bypass UAC design for privilege escalation Who this book is for This book is for cybersecurity professionals- especially for anyone working on Windows security, or malware researchers, network administrators, ethical hackers looking to explore Windows exploit, kernel practice, and reverse engineering. …”
-
15
Systemizers are better code-breakers:Self-reported systemizing predicts code-breaking performance in expert hackers and naïve participants
Published 2016-05-01“…A group of naïve participants and of ethical hackers completed the Autism Spectrum Quotient, including an attention to detail scale, and the Systemizing Quotient (Baron-Cohen et al., 2001; Baron-Cohen et al., 2003). …”
Get full text
Article