Publisher
Springer International Publishing
Reference8 articles.
1. Denis, M., Zena, C., Hayajneh, T.: Penetration testing: concepts, attack methods, and defense strategies. In: 2016 IEEE Long Island Systems, Applications and Technology Conference (LISAT), pp. 1–6. IEEE (2016)
2. Hoffmann, J.: Simulated penetration testing: from “Dijkstra" to “Turing Test++". In: Proceedings of ICAPS, pp. 364–372 (2015)
3. Islam, C., Babar, M.A., Nepal, S.: Automated interpretation and integration of security tools using semantic knowledge. In: Proceedings of CAiSE 2019, pp. 513–528 (2019)
4. Miller, D., Alford, R., Applebaum, A., Foster, H., Little, C., Strom, B.: Automated adversary emulation: a case for planning and acting with unknowns p. 9 (2018)
5. Nguyen, H.V., Teerakanok, S., Inomata, A., Uehara, T.: The proposal of double agent architecture using actor-critic algorithm for penetration testing. In: ICISSP, pp. 440–449 (2021)