scispace - formally typeset
Journal ArticleDOI

Book review: Metasploit the Penetration Tester's Guide

About
This article is published in Computers & Security.The article was published on 2013-02-01. It has received 73 citations till now. The article focuses on the topics: Penetration (warfare).

read more

Citations
More filters
Journal ArticleDOI

Securing the Smart Grid: A Comprehensive Compilation of Intrusion Detection and Prevention Systems

TL;DR: This paper examines the contribution of the IDPSs in the SG paradigm, providing an analysis of 37 cases and identifies the limitations and the shortcomings of the current IDPS systems, whereas appropriate recommendations are provided for future research efforts.
Journal ArticleDOI

Exploring Emerging Hacker Assets and Key Hackers for Proactive Cyber Threat Intelligence

TL;DR: This study contributes a novel CTI framework by leveraging an automated and principled web, data, and text mining approach to collect and analyze vast amounts of malicious hacker tools directly from large, international underground hacker communities.
Journal ArticleDOI

Survey and Classification of Automotive Security Attacks

TL;DR: The existing taxonomies were not designed for application in the automotive development process and therefore do not provide enough degree of detail for supporting development phases such as threat analysis or security testing, and a comprehensive taxonomy is proposed with degrees of detail which addresses these tasks.
Proceedings ArticleDOI

Threat Intelligence Computing

TL;DR: Threat intelligence computing as a new methodology that models threat discovery as a graph computation problem enables efficient programming for solving threat discovery problems, equipping threat hunters with a suite of potent new tools for agile codifications of threat hypotheses, automated evidence mining, and interactive data inspection capabilities.
Proceedings ArticleDOI

Automated Penetration Testing Using Deep Reinforcement Learning

TL;DR: This paper presents an automated penetration testing framework that employs deep reinforcement learning to automate the penetration testing process, and plans to use this framework mainly as a component of cybersecurity training activities, to provide guided learning for attack training by making use of the framework to suggest possible strategies.