Author:
Shah Sugandh,Mehtre B. M.
Publisher
Springer Science and Business Media LLC
Subject
Computational Theory and Mathematics,Hardware and Architecture,Software,Computer Science (miscellaneous)
Reference25 articles.
1. Tiller, J.S.: CISO’s Guide to Penetration Testing. CRC Press Publication, Boca Raton
2. The Canadian Institute of Chartered Accountants Information Technology Advisory Committee, Using an Ethical Hacking Technique to assess Information security Risk, Toronto. http://www.cica.ca/research-and-guidance/documents/it-advisory-committee/item12038.pdf . Accessed 03 Oct 2013
3. Xiong, P., Peyton, L.: A model driven penetration test framework for web applications. In: IEEE 8th Annual International Conference on Privacy, Security and Trust (2010)
4. Liu, B., Shi, L., Cai, Z.: Software vulnerability discovery techniques: a survey. In: IEEE 4th International Conference on Multimedia Information Networking and Security (2012)
5. Duan, B., Zhang, Y., Gu, D.: An easy to deploy penetration testing platform. In: IEEE 9th International Conference for young Computer Scientists (2008)
Cited by
47 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Advancing ESSecA: a step forward in Automated Penetration Testing;Proceedings of the 19th International Conference on Availability, Reliability and Security;2024-07-30
2. AI-Powered Penetration Testing using Shennina: From Simulation to Validation;Proceedings of the 19th International Conference on Availability, Reliability and Security;2024-07-30
3. Artificial intelligence for system security assurance: A systematic literature review;2024-07-09
4. Bug-Bounty, ¿el futuro del Pentesting?;Ciencia e Ingeniería Neogranadina;2024-06-30
5. AutoRed: Automating Red Team Assessment via Strategic Thinking Using Reinforcement Learning;Proceedings of the Fourteenth ACM Conference on Data and Application Security and Privacy;2024-06-19