Author:
Bertoglio Daniel Dalalana,Gil Arthur,Acosta Juan,Godoy Júlia,Lunardi Roben Castagna,Zorzo Avelino Francisco
Publisher
Springer Nature Singapore
Reference42 articles.
1. Al-Ahmad AS, Aljunid SA, Ismail NK (2020) Mobile cloud computing applications penetration testing model design. Int J Inf Comput Secur 13(2):210–226
2. Al-Ahmad AS, Kahtan H (2018) Test case selection for penetration testing in mobile cloud computing applications: a proposed technique. J Theoret Appl Inf Technol 96(13):4238–4248
3. Al-Ahmad AS, Kahtan H, Hujainah F, Jalab HA (2019) Systematic literature review on penetration testing for mobile cloud computing applications. IEEE Access 7:173524–173540
4. Ankele R, Marksteiner S, Nahrgang K, Vallant H (2019) Requirements and recommendations for IoT/IIoT models to automate security assurance through threat modelling, security analysis and penetration testing. In: Proceedings of the 14th international conference on availability, reliability and security, pp 1–8
5. Antunes N, Vieira M (2017) Designing vulnerability testing tools for web services: approach, components, and tools. Int J Inf Secur 16(4):435–457