Login / Signup
Internal penetration testing of Bring Your Own Device (BYOD) for preventing vulnerabilities exploitation.
Kemal Hajdarevic
Vahidin Dzaltur
Published in:
ICAT (2015)
Keyphrases
</>
security vulnerabilities
penetration testing
unauthorized access
intrusion detection
web applications
security properties
intrusion detection system
dos attacks
access control
visual basic
information systems
information security
security policies