Author:
Barik Kousik,Abirami A,Das Saptarshi,Konar Karabi,Banerjee Archita
Cited by
5 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Reshaping Cybersecurity Practices by Optimizing Web Application Penetration Testing;Advances in Information Security, Privacy, and Ethics;2024-07-26
2. Adopting Automated Penetration Testing Tools;Journal of Information Security and Cybercrimes Research;2024-06-24
3. Ananlisis Vulnerabilitas dan Pengujian Terhadap Google Gruyere;Journal of Internet and Software Engineering;2024-06-02
4. A Common Pentest Output Schema for Business Intelligence System Ingestion;2023 46th MIPRO ICT and Electronics Convention (MIPRO);2023-05-22
5. A Literature Review on the Impact of Effective Management in Cyber Security System Performance;2022 International Conference on Informatics, Multimedia, Cyber and Information System (ICIMCIS);2022-11-16