ESSecA: An automated expert system for threat modelling and penetration testing for IoT ecosystems
Despite the growing spread of Internet of Things (IoT) ecosystems, their security assessment
is still an open issue. Identifying threats, vulnerabilities, and attacks is a costly and time …
is still an open issue. Identifying threats, vulnerabilities, and attacks is a costly and time …
A novel Security-by-Design methodology: Modeling and assessing security by SLAs with a quantitative approach
Recent software development methodologies, as DevOps or Agile, are very popular and
widely used, especially for the development of cloud services and applications. They …
widely used, especially for the development of cloud services and applications. They …
[HTML][HTML] Automated city shuttles: Map** the key challenges in cybersecurity, privacy and standards to future developments
Abstract The Automated City Shuttles (ACSs) aim to shape the future public transportation
and provide more efficient and accessible mobility in smart cities. With the absence of a …
and provide more efficient and accessible mobility in smart cities. With the absence of a …
Toward the automation of threat modeling and risk assessment in IoT systems
Abstract The Internet of Things (IoT) has recently become one of the most relevant emerging
technologies in the IT landscape. IoT systems are characterized by the high heterogeneity of …
technologies in the IT landscape. IoT systems are characterized by the high heterogeneity of …
Towards pentesting automation using the metasploit framework
Penetration testing is a well known methodology assessing security vulnerabilities by
executing complex steps which form an attack. Professional pentesting is an expensive …
executing complex steps which form an attack. Professional pentesting is an expensive …
A comprehensive literature review of artificial intelligent practices in the field of penetration testing
Penetration testing (PT) is a commonly available approach to dynamically assess the
defenses of a computer network via preparation and execution of every probable attack to …
defenses of a computer network via preparation and execution of every probable attack to …
Distributed attack deployment capability for modern automated penetration testing
Cybersecurity is an ever-changing landscape. The threats of the future are hard to predict
and even harder to prepare for. This paper presents work designed to prepare for the …
and even harder to prepare for. This paper presents work designed to prepare for the …
Security testing for naval ship combat system software
Military weapon systems are considered as “system of systems”(SoS). They comprise
various equipment based on computers and networks and have been developed using …
various equipment based on computers and networks and have been developed using …
[PDF][PDF] Systematic IoT Penetration Testing: Alexa Case Study.
Abstract The Internet of Things paradigm arises many issues in terms of privacy and security.
Systems that are commonly configured by personnel with limited experience manage …
Systems that are commonly configured by personnel with limited experience manage …
VAPE-BRIDGE: Bridging OpenVAS results for automating metasploit framework
Vulnerability assessment (VA) and penetration test (PenTest) are required by many
organizations to satisfy their security auditing and compliance. VA and PenTest are …
organizations to satisfy their security auditing and compliance. VA and PenTest are …