Review into state of the art of vulnerability assessment using artificial intelligence
Vulnerability assessment is the essential and well-established process of probing security
flaws, weaknesses and inadequacies in a computing infrastructure. The process helps …
flaws, weaknesses and inadequacies in a computing infrastructure. The process helps …
[PDF][PDF] Automated adversary emulation: A case for planning and acting with unknowns
Adversary emulation assessments offer defenders the ability to view their networks from the
point of view of an adversary. Because these assessments are time con suming, there has …
point of view of an adversary. Because these assessments are time con suming, there has …
Eliciting and utilising knowledge for security event log analysis: An association rule mining and automated planning approach
Vulnerability assessment and security configuration activities are heavily reliant on expert
knowledge. This requirement often results in many systems being left insecure due to a lack …
knowledge. This requirement often results in many systems being left insecure due to a lack …
Discovering and utilising expert knowledge from security event logs
Vulnerability assessment and security configuration of computer systems is heavily
dependent on human experts, which are widely attributed as being in short supply. This can …
dependent on human experts, which are widely attributed as being in short supply. This can …
Reinforcing penetration testing using AI
A Confido, EV Ntagiou, M Wallum - 2022 IEEE Aerospace …, 2022 - ieeexplore.ieee.org
In a space mission operations context, assets of very high value are operated by several
data systems. The security and resilience of these data systems has become a primary …
data systems. The security and resilience of these data systems has become a primary …
Automated planning to prioritise digital forensics investigation cases containing indecent images of children
Law enforcement agencies (LEAs) globally are facing high demand to view, process, and
analyse digital evidence. Arrests for Indecent Images of Children (IIOC) have risen by a …
analyse digital evidence. Arrests for Indecent Images of Children (IIOC) have risen by a …
Burp suite: Automating web vulnerability scanning
J Kim - 2020 - search.proquest.com
The purpose of this research was to demonstrate a method of automating web application
penetration testing using Burp Suite's web vulnerability scanner and Python Selenium. This …
penetration testing using Burp Suite's web vulnerability scanner and Python Selenium. This …
Implementasi Cross Site Scripting Vulnerability Assessment Tools berdasarkan OWASP Code Review
MI Hany, A Bhawiyuga, A Kusyanti - … Teknologi Informasi dan Ilmu …, 2021 - j-ptiik.ub.ac.id
Serangan cross site scripting (XSS) merupakan salah satu kerentanan yang paling sering
ditemukan dalam aplikasi web. Sayangnya, tidak semua pengembang aplikasi dan tim …
ditemukan dalam aplikasi web. Sayangnya, tidak semua pengembang aplikasi dan tim …
PTHelper: An open source tool to support the Penetration Testing process
JC de Gracia, A Sánchez-Macián - arxiv preprint arxiv:2406.08242, 2024 - arxiv.org
Offensive security is one of the state of the art measures to protect enterprises and
organizations. Penetration testing, broadly called pentesting, is a branch of offensive …
organizations. Penetration testing, broadly called pentesting, is a branch of offensive …
[PDF][PDF] Automated penetration testing using deep reinforcement learning
胡振国 - 2021 - dspace.jaist.ac.jp
Penetration testing is a new network security technology developed in recent years, which
has great practical application for computer network and security. It is a security testing and …
has great practical application for computer network and security. It is a security testing and …