Journal ArticleDOI
Book review: Metasploit the Penetration Tester's Guide
About:
This article is published in Computers & Security.The article was published on 2013-02-01. It has received 73 citations till now. The article focuses on the topics: Penetration (warfare).read more
Citations
More filters
Journal ArticleDOI
Securing the Smart Grid: A Comprehensive Compilation of Intrusion Detection and Prevention Systems
TL;DR: This paper examines the contribution of the IDPSs in the SG paradigm, providing an analysis of 37 cases and identifies the limitations and the shortcomings of the current IDPS systems, whereas appropriate recommendations are provided for future research efforts.
Journal ArticleDOI
Exploring Emerging Hacker Assets and Key Hackers for Proactive Cyber Threat Intelligence
TL;DR: This study contributes a novel CTI framework by leveraging an automated and principled web, data, and text mining approach to collect and analyze vast amounts of malicious hacker tools directly from large, international underground hacker communities.
Journal ArticleDOI
Survey and Classification of Automotive Security Attacks
TL;DR: The existing taxonomies were not designed for application in the automotive development process and therefore do not provide enough degree of detail for supporting development phases such as threat analysis or security testing, and a comprehensive taxonomy is proposed with degrees of detail which addresses these tasks.
Proceedings ArticleDOI
Threat Intelligence Computing
Xiaokui Shu,Frederico Araujo,Douglas Lee Schales,Marc Ph. Stoecklin,Jiyong Jang,Heqing Huang,Josyula R. Rao +6 more
TL;DR: Threat intelligence computing as a new methodology that models threat discovery as a graph computation problem enables efficient programming for solving threat discovery problems, equipping threat hunters with a suite of potent new tools for agile codifications of threat hypotheses, automated evidence mining, and interactive data inspection capabilities.
Proceedings ArticleDOI
Automated Penetration Testing Using Deep Reinforcement Learning
TL;DR: This paper presents an automated penetration testing framework that employs deep reinforcement learning to automate the penetration testing process, and plans to use this framework mainly as a component of cybersecurity training activities, to provide guided learning for attack training by making use of the framework to suggest possible strategies.