On the review and setup of security audit using Kali Linux
The massive development of technology especially in computers, mobile devices, and networking has bring security issue forward as primarily concern. The computers and mobile devices connected to Internet are exposed to numerous threats and exploits. With the utilization of penetration testing, vulne...
| Main Authors: | Gunawan, Teddy Surya, Lim, Muhammad Kasim, Zulkurnain, Nurul Fariza, Kartiwi, Mira |
|---|---|
| Format: | Article |
| Language: | English English |
| Published: |
IAES
2018
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/63554/ http://irep.iium.edu.my/63554/7/63554_On%20the%20review%20and%20setup%20of%20security%20audit%20using%20Kali%20Linux_SCOPUS.pdf http://irep.iium.edu.my/63554/8/63554_On%20the%20review%20and%20setup%20of%20security%20audit%20using%20Kali%20Linux.pdf |
Similar Items
Penetration testing using Kali Linux: SQL injection, XSS, Wordpress, and WPA2 attacks
by: Gunawan, Teddy Surya, et al.
Published: (2018)
by: Gunawan, Teddy Surya, et al.
Published: (2018)
Performance evaluation of multichannel audio compression
by: Gunawan, Teddy Surya, et al.
Published: (2018)
by: Gunawan, Teddy Surya, et al.
Published: (2018)
On the comparison of line spectral frequencies and mel-frequency cepstral coefficients using feedforward neural network for language identification
by: Gunawan, Teddy Surya, et al.
Published: (2018)
by: Gunawan, Teddy Surya, et al.
Published: (2018)
On the use of edge features and exponential decaying number of nodes in the hidden layers for handwritten signature recognition
by: Gunawan, Teddy Surya, et al.
Published: (2018)
by: Gunawan, Teddy Surya, et al.
Published: (2018)
A review on emotion recognition algorithms using speech analysis
by: Gunawan, Teddy Surya, et al.
Published: (2018)
by: Gunawan, Teddy Surya, et al.
Published: (2018)
Online information seeking behavior for cancer related disease: A developed and developing country comparison
by: Saleh, Nurliyana, et al.
Published: (2018)
by: Saleh, Nurliyana, et al.
Published: (2018)
Automatic Number Plate Recognition on android platform: With some Java code excerpts
by: ., Abdul Mutholib, et al.
Published: (2016)
by: ., Abdul Mutholib, et al.
Published: (2016)
Speech emotion recognition using deep feedforward neural network
by: Alghifari, Muhammad Fahreza, et al.
Published: (2018)
by: Alghifari, Muhammad Fahreza, et al.
Published: (2018)
Herb leaves pattern recognition using digital microscope and deep learning
by: Rahman, Muhammad Ariff Azizul, et al.
Published: (2019)
by: Rahman, Muhammad Ariff Azizul, et al.
Published: (2019)
Smart home system using internet of things: design, implementation and sample codes
by: Yaldi, Intan Rahmithul Husna, et al.
Published: (2018)
by: Yaldi, Intan Rahmithul Husna, et al.
Published: (2018)
Development of English handwritten recognition using deep neural network
by: Gunawan, Teddy Surya, et al.
Published: (2018)
by: Gunawan, Teddy Surya, et al.
Published: (2018)
A summarization of image and video databases for emotion recognition
by: Ashraf, Arselan, et al.
Published: (2020)
by: Ashraf, Arselan, et al.
Published: (2020)
Speech emotion recognition using feature fusion of TEO and MFCC on multilingual databases
by: Ahmad Qadri, Syed Asif, et al.
Published: (2020)
by: Ahmad Qadri, Syed Asif, et al.
Published: (2020)
Performance evaluation of portable air quality measurement
system using raspberry Pi for remote monitoring
by: Mohd Pu’ad, Muhammad Farhan, et al.
Published: (2019)
by: Mohd Pu’ad, Muhammad Farhan, et al.
Published: (2019)
Comparison of entropy coding mechanism on IEEE1857.2 lossless audio compression standard
by: Abdul Muin, Fathiah, et al.
Published: (2018)
by: Abdul Muin, Fathiah, et al.
Published: (2018)
An efficient algorithm to discover large and frequent itemset in high dimensional data
by: Zulkurnain, Nurul Fariza
Published: (2019)
by: Zulkurnain, Nurul Fariza
Published: (2019)
A critical insight into multi-languages speech emotion databases
by: Ahmad Qadri, Syed Asif, et al.
Published: (2019)
by: Ahmad Qadri, Syed Asif, et al.
Published: (2019)
Development of low bit rate speech encoder based on vector quantization and compressive sensing
by: Kassim, Liban A. S., et al.
Published: (2012)
by: Kassim, Liban A. S., et al.
Published: (2012)
Sukuk rating prediction using voting ensemble strategy
by: Kartiwi, Mira, et al.
Published: (2018)
by: Kartiwi, Mira, et al.
Published: (2018)
Decision tree optimization for sukuk rating prediction
by: Kartiwi, Mira, et al.
Published: (2018)
by: Kartiwi, Mira, et al.
Published: (2018)
HYBRID: an efficient unifying process to mine frequent itemsets
by: Zulkurnain, Nurul Fariza, et al.
Published: (2018)
by: Zulkurnain, Nurul Fariza, et al.
Published: (2018)
RARE: mining colossal closed itemset in high dimensional data
by: Md Zaki, Fatimah Audah, et al.
Published: (2018)
by: Md Zaki, Fatimah Audah, et al.
Published: (2018)
On the use of voice activity detection in speech emotion recognition
by: Alghifari, Muhammad Fahreza, et al.
Published: (2019)
by: Alghifari, Muhammad Fahreza, et al.
Published: (2019)
Measuring the road traffic intensity using neural network with computer vision
by: Hasan Gani, Muhammad Hamdan, et al.
Published: (2018)
by: Hasan Gani, Muhammad Hamdan, et al.
Published: (2018)
Security aspects and efforts towards secure Internet of things
by: Wan Abdul Rahman, Wan Fariza, et al.
Published: (2017)
by: Wan Abdul Rahman, Wan Fariza, et al.
Published: (2017)
Portable anti forgery recognition for attendance system using fingerprint based biometric
by: Zainal, Nur Izzati, et al.
Published: (2016)
by: Zainal, Nur Izzati, et al.
Published: (2016)
Fast and accurate algorithm for ECG authentication using residual depthwise separable convolutional neural networks
by: Ihsanto, Eko, et al.
Published: (2020)
by: Ihsanto, Eko, et al.
Published: (2020)
An efficient algorithm for cardiac arrhythmia classification using ensemble of depthwise Separable convolutional neural networks
by: Ihsanto, Eko, et al.
Published: (2020)
by: Ihsanto, Eko, et al.
Published: (2020)
Analysis of THUG: a low-interaction client honeypot to identify malicious websites and malwares
by: Zulkurnain, Nurul Fariza, et al.
Published: (2018)
by: Zulkurnain, Nurul Fariza, et al.
Published: (2018)
The disruptometer: an artificial intelligence algorithm for market insights
by: Wan Nordin, Mimi Aminah, et al.
Published: (2019)
by: Wan Nordin, Mimi Aminah, et al.
Published: (2019)
Digital photography based food intake prediction using artificial neural network
by: Gunawan, Teddy Surya, et al.
Published: (2017)
by: Gunawan, Teddy Surya, et al.
Published: (2017)
Development of high quality speech compression system for Quranic recitation based on modified CELP algorithm
by: Gunawan, Teddy Surya, et al.
Published: (2013)
by: Gunawan, Teddy Surya, et al.
Published: (2013)
Validation of low-cost eye tracking setup for smooth pursuit application
by: Che Azemin, Mohd Zulfaezal, et al.
Published: (2014)
by: Che Azemin, Mohd Zulfaezal, et al.
Published: (2014)
Securing electronic transactions via payment gateways: a systematic review
by: Olanrewaju, Rashidah Funke, et al.
Published: (2017)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2017)
Development of smart chicken poultry farm
by: Mansor, Hasmah, et al.
Published: (2018)
by: Mansor, Hasmah, et al.
Published: (2018)
Fingerprint biometric systems
by: Yahya, Faridah, et al.
Published: (2016)
by: Yahya, Faridah, et al.
Published: (2016)
Concealment of files blocked by Gmail with EOF-based image steganography
by: Taufik, Ichsan, et al.
Published: (2018)
by: Taufik, Ichsan, et al.
Published: (2018)
Effect of modulation index of pulse width modulation inverter on total harmonic distortion for sinusoidal
by: Aboadla, Eziddin Hassan Elmabrouk, et al.
Published: (2016)
by: Aboadla, Eziddin Hassan Elmabrouk, et al.
Published: (2016)
Development of face recognition on raspberry Pi for security enhancement of smart home system
by: Gunawan, Teddy Surya, et al.
Published: (2017)
by: Gunawan, Teddy Surya, et al.
Published: (2017)
Personal router using LINUX
by: Amilia Yanti, Abdullah
Published: (2005)
by: Amilia Yanti, Abdullah
Published: (2005)
Similar Items
-
Penetration testing using Kali Linux: SQL injection, XSS, Wordpress, and WPA2 attacks
by: Gunawan, Teddy Surya, et al.
Published: (2018) -
Performance evaluation of multichannel audio compression
by: Gunawan, Teddy Surya, et al.
Published: (2018) -
On the comparison of line spectral frequencies and mel-frequency cepstral coefficients using feedforward neural network for language identification
by: Gunawan, Teddy Surya, et al.
Published: (2018) -
On the use of edge features and exponential decaying number of nodes in the hidden layers for handwritten signature recognition
by: Gunawan, Teddy Surya, et al.
Published: (2018) -
A review on emotion recognition algorithms using speech analysis
by: Gunawan, Teddy Surya, et al.
Published: (2018)