Author:
Filiol Eric,Mercaldo Francesco,Santone Antonella
Reference37 articles.
1. Kali Linux-Assuring security by penetration testing;Allen,2014
2. Software penetration testing;Arkin;IEEE Security & Privacy,2005
3. Benedusi, P., Chianese, A., Marulli, F., Piccialli, F., Jung, J.: An associative engines based approach supporting collaborative analytics in the internet of cultural things. In: Proceedings of the 3rd International Workshop on Cloud and Distributed System Application and he 10th International 3PGCIC-2015 Conference (2015)
4. About penetration testing;Bishop;IEEE Security & Privacy,2007
5. Computer security worries military experts;Broad;New York Times,1983
Cited by
8 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. A Survey of Attack Techniques Based on MITRE ATT&CK Enterprise Matrix;Communications in Computer and Information Science;2024
2. Formal Methods and Validation Techniques for Ensuring Automotive Systems Security;Information;2023-12-18
3. Backslash map: An Automated Vulnerability Scanner;2023 Eleventh International Conference on Intelligent Computing and Information Systems (ICICIS);2023-11-21
4. Security Testing for Web Applications: A Systematic Literature Review;2023 11th International Conference in Software Engineering Research and Innovation (CONISOFT);2023-11-06
5. Automated WiFi Incident Detection Attack Tool on 802.11 Networks;2023 IEEE Symposium on Computers and Communications (ISCC);2023-07-09