{"id":"https://openalex.org/W2976580205","doi":"https://doi.org/10.1145/3349266.3351391","title":"Fundamentals of Ethical Hacking and Penetration Testing","display_name":"Fundamentals of Ethical Hacking and Penetration Testing","publication_year":2019,"publication_date":"2019-09-26","ids":{"openalex":"https://openalex.org/W2976580205","doi":"https://doi.org/10.1145/3349266.3351391","mag":"2976580205"},"language":"en","primary_location":{"id":"doi:10.1145/3349266.3351391","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3349266.3351391","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 20th Annual SIG Conference on Information Technology Education","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5031532652","display_name":"Umar Mujahid Khokhar","orcid":null},"institutions":[{"id":"https://openalex.org/I2803051760","display_name":"Gwinnett College","ror":"https://ror.org/047y9vj34","country_code":"US","type":"education","lineage":["https://openalex.org/I2803051760"]},{"id":"https://openalex.org/I78927796","display_name":"Georgia Gwinnett College","ror":"https://ror.org/05vkmhj10","country_code":"US","type":"education","lineage":["https://openalex.org/I78927796"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Umar Mujahid Khokhar","raw_affiliation_strings":["Georgia Gwinnett College, Lawrenceville, GA, USA"],"affiliations":[{"raw_affiliation_string":"Georgia Gwinnett College, Lawrenceville, GA, USA","institution_ids":["https://openalex.org/I2803051760","https://openalex.org/I78927796"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5076553850","display_name":"Binh Tran","orcid":"https://orcid.org/0000-0002-2445-1231"},"institutions":[{"id":"https://openalex.org/I78927796","display_name":"Georgia Gwinnett College","ror":"https://ror.org/05vkmhj10","country_code":"US","type":"education","lineage":["https://openalex.org/I78927796"]},{"id":"https://openalex.org/I2803051760","display_name":"Gwinnett College","ror":"https://ror.org/047y9vj34","country_code":"US","type":"education","lineage":["https://openalex.org/I2803051760"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Binh Tran","raw_affiliation_strings":["Georgia Gwinnett College, Lawrenceville, GA, USA"],"affiliations":[{"raw_affiliation_string":"Georgia Gwinnett College, Lawrenceville, GA, USA","institution_ids":["https://openalex.org/I2803051760","https://openalex.org/I78927796"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5031532652"],"corresponding_institution_ids":["https://openalex.org/I2803051760","https://openalex.org/I78927796"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.16319653,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"149","last_page":"150"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9970999956130981,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9970999956130981,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9955999851226807,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12479","display_name":"Web Application Security Vulnerabilities","score":0.9955000281333923,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/hacker","display_name":"Hacker","score":0.9062767028808594},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6135275959968567},{"id":"https://openalex.org/keywords/sql-injection","display_name":"SQL injection","score":0.5893764495849609},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.5801618099212646},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.5658407211303711},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5509889125823975},{"id":"https://openalex.org/keywords/vulnerability-assessment","display_name":"Vulnerability assessment","score":0.4728579521179199},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.4592873752117157},{"id":"https://openalex.org/keywords/penetration","display_name":"Penetration (warfare)","score":0.438593327999115},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.24421298503875732},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.23828092217445374},{"id":"https://openalex.org/keywords/psychology","display_name":"Psychology","score":0.16136151552200317}],"concepts":[{"id":"https://openalex.org/C86844869","wikidata":"https://www.wikidata.org/wiki/Q2798820","display_name":"Hacker","level":2,"score":0.9062767028808594},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6135275959968567},{"id":"https://openalex.org/C150451098","wikidata":"https://www.wikidata.org/wiki/Q506059","display_name":"SQL injection","level":5,"score":0.5893764495849609},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.5801618099212646},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.5658407211303711},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5509889125823975},{"id":"https://openalex.org/C167063184","wikidata":"https://www.wikidata.org/wiki/Q1400839","display_name":"Vulnerability assessment","level":3,"score":0.4728579521179199},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.4592873752117157},{"id":"https://openalex.org/C80107235","wikidata":"https://www.wikidata.org/wiki/Q7162625","display_name":"Penetration (warfare)","level":2,"score":0.438593327999115},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.24421298503875732},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.23828092217445374},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.16136151552200317},{"id":"https://openalex.org/C97854310","wikidata":"https://www.wikidata.org/wiki/Q19541","display_name":"Search engine","level":2,"score":0.0},{"id":"https://openalex.org/C194222762","wikidata":"https://www.wikidata.org/wiki/Q114486","display_name":"Query by Example","level":4,"score":0.0},{"id":"https://openalex.org/C164120249","wikidata":"https://www.wikidata.org/wiki/Q995982","display_name":"Web search query","level":3,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C542102704","wikidata":"https://www.wikidata.org/wiki/Q183257","display_name":"Psychotherapist","level":1,"score":0.0},{"id":"https://openalex.org/C42475967","wikidata":"https://www.wikidata.org/wiki/Q194292","display_name":"Operations research","level":1,"score":0.0},{"id":"https://openalex.org/C137176749","wikidata":"https://www.wikidata.org/wiki/Q4105337","display_name":"Psychological resilience","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3349266.3351391","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3349266.3351391","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 20th Annual SIG Conference on Information Technology Education","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.5799999833106995}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W2921504876","https://openalex.org/W2183730421","https://openalex.org/W1982580243","https://openalex.org/W2551868243","https://openalex.org/W2348153269","https://openalex.org/W4205613068","https://openalex.org/W3112956360","https://openalex.org/W2004781009","https://openalex.org/W4286284259","https://openalex.org/W1507118973"],"abstract_inverted_index":{"This":[0],"workshop":[1,19],"provides":[2],"the":[3,59],"fundamental":[4],"concepts":[5,27,55],"of":[6,65],"Ethical":[7,32,81],"Hacking":[8,33,82],"with":[9,79],"hand":[10],"on":[11,13,31,36],"practice":[12],"many":[14],"Penetration":[15],"Testing":[16],"tools.":[17],"The":[18,38,74],"is":[20],"organized":[21],"mainly":[22],"in":[23],"two":[24],"sessions;":[25],"Theoretical":[26],"and":[28,52,70,92],"Practical":[29],"working":[30],"tools":[34,83],"(Hands":[35],"Labs).":[37],"hands-on":[39],"practical":[40],"labs":[41],"involve":[42],"Reconnaissance,":[43],"Scanning,":[44],"Vulnerability":[45],"Assessment,":[46],"Web":[47],"Application":[48],"attack":[49],"(SQL":[50],"injection)":[51],"malware":[53],"injection":[54],"that":[56],"eventually":[57],"give":[58],"participants":[60,75],"a":[61,66],"real":[62],"time":[63],"exposure":[64],"complete":[67],"cyber-attack":[68],"process":[69],"recommendations":[71],"for":[72],"avoidance.":[73],"will":[76],"be":[77],"provided":[78],"all":[80],"kit,":[84],"which":[85],"they":[86],"can":[87],"use":[88],"for,":[89],"further":[90],"learning":[91],"improve":[93],"their":[94],"security":[95],"analysis":[96],"skills.":[97]},"counts_by_year":[{"year":2024,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
