A review of standardization for penetration testing reports and documents

MN Zakaria, PA Phin, N Mohmad… - … on research and …, 2019 - ieeexplore.ieee.org
Penetration testing or pen test is a simulated cyber-attack conducted to find the
vulnerabilities and weaknesses in a computer system. The test is conducted by …

Multiontology construction and application of threat model based on adversarial attack and defense under iso/iec 27032

X Hu, D Cheng, J Chen, X Jin, B Wu - IEEE Access, 2022 - ieeexplore.ieee.org
Research pertaining to threat modeling is significant. However, the existing threat modeling
methods suffer from ambiguity, heterogeneity and incompleteness; furthermore, the threat …

Cybersecurity in Motion: A Survey of Challenges and Requirements for Future Test Facilities of CAVs

I Mavromatis, T Spyridopoulos, P Carnelli… - arXiv preprint arXiv …, 2023 - arxiv.org
The way we travel is changing rapidly, and Cooperative Intelligent Transportation Systems
(C-ITSs) are at the forefront of this evolution. However, the adoption of C-ITSs introduces …

[PDF][PDF] Ontology-based Automation of Penetration Testing.

G Chu, A Lisitsa - ICISSP, 2020 - scitepress.org
Ontology is a widely used knowledge representation formalism in artificial intelligence area
in recent years. In this paper, we propose an ontology-based automated penetration testing …

Large scale vulnerability scanning

TK Dahle - 2020 - duo.uio.no
The number of services that connect to the Internet is steadily increasing. Applications
integrate with each other more than ever before. As such, the possible attack surface of a …

Towards an efficient automation of network penetration testing using model-based reinforcement learning

MC Ghanem - 2022 - openaccess.city.ac.uk
Penetration Testing (PT) is an offensive method for assessing and evaluating the security of
digital asset by planning, generating, and executing all or some of the possible attacks that …

[HTML][HTML] 基于本体的软件安全漏洞模式

胡璇, 陈俊名, 李海峰 - 北京航空航天大学学报, 2022 - bhxb.buaa.edu.cn
针对软件缺陷与软件安全漏洞研究中存在的概念混淆问题, 对DevSecOps
框架下的软件安全漏洞生存期进行研究. 基于软件安全漏洞生存期引入漏洞的4 种情况 …

建立渗透测试型人才能力评估的综合评价模型

章秀, 刘宝旭, 龚晓锐, 于冬松, 赵蓓蓓, 刘媛 - 信息安全学报, 2024 - jcs.iie.ac.cn
网络安全人才的培养和选拔, 离不开一把衡量人才的“尺子”. 以通用漏洞评分系统作为参考范例,
一个具备可操作性的评价模型, 不能只是一个抽象的思考模型, 而是应当包含准则, 权重 …

Analysis and comparative studies of software penetration testing methods

Д Ліцзян, Ц Вейлін, Я Рабчан, В Давидов… - Advanced Information …, 2021 - ais.khpi.edu.ua
Abstract Information security is one of the most important components in any organization.
The disclosure of this information can lead not only to material losses, but also to the loss of …

Guidelines for white box penetration testing wired devices in secure network environments

D Le Vandolph - 2023 - diva-portal.org
As technology is becoming a prevalent and ubiquitous part of society, increasing levels of
cybercrime have drawn attention to the need for suitable frameworks for ensuring the …