X Hu, D Cheng, J Chen, X Jin, B Wu - IEEE Access, 2022 - ieeexplore.ieee.org
Research pertaining to threat modeling is significant. However, the existing threat modeling methods suffer from ambiguity, heterogeneity and incompleteness; furthermore, the threat …
The way we travel is changing rapidly, and Cooperative Intelligent Transportation Systems (C-ITSs) are at the forefront of this evolution. However, the adoption of C-ITSs introduces …
Ontology is a widely used knowledge representation formalism in artificial intelligence area in recent years. In this paper, we propose an ontology-based automated penetration testing …
The number of services that connect to the Internet is steadily increasing. Applications integrate with each other more than ever before. As such, the possible attack surface of a …
Penetration Testing (PT) is an offensive method for assessing and evaluating the security of digital asset by planning, generating, and executing all or some of the possible attacks that …
Д Ліцзян, Ц Вейлін, Я Рабчан, В Давидов… - Advanced Information …, 2021 - ais.khpi.edu.ua
Abstract Information security is one of the most important components in any organization. The disclosure of this information can lead not only to material losses, but also to the loss of …
As technology is becoming a prevalent and ubiquitous part of society, increasing levels of cybercrime have drawn attention to the need for suitable frameworks for ensuring the …