Review into state of the art of vulnerability assessment using artificial intelligence

S Khan, S Parkinson - Guide to Vulnerability Analysis for Computer …, 2018 - Springer
Vulnerability assessment is the essential and well-established process of probing security
flaws, weaknesses and inadequacies in a computing infrastructure. The process helps …

[PDF][PDF] Automated adversary emulation: A case for planning and acting with unknowns

D Miller, R Alford, A Applebaum, H Foster… - MITRE CORP MCLEAN …, 2018 - mitre.org
Adversary emulation assessments offer defenders the ability to view their networks from the
point of view of an adversary. Because these assessments are time con suming, there has …

Eliciting and utilising knowledge for security event log analysis: An association rule mining and automated planning approach

S Khan, S Parkinson - Expert Systems with Applications, 2018 - Elsevier
Vulnerability assessment and security configuration activities are heavily reliant on expert
knowledge. This requirement often results in many systems being left insecure due to a lack …

Discovering and utilising expert knowledge from security event logs

S Khan, S Parkinson - Journal of Information Security and Applications, 2019 - Elsevier
Vulnerability assessment and security configuration of computer systems is heavily
dependent on human experts, which are widely attributed as being in short supply. This can …

Reinforcing penetration testing using AI

A Confido, EV Ntagiou, M Wallum - 2022 IEEE Aerospace …, 2022 - ieeexplore.ieee.org
In a space mission operations context, assets of very high value are operated by several
data systems. The security and resilience of these data systems has become a primary …

Automated planning to prioritise digital forensics investigation cases containing indecent images of children

S Khan, S Parkinson, M Roopak, R Armitage… - Proceedings of the …, 2023 - ojs.aaai.org
Law enforcement agencies (LEAs) globally are facing high demand to view, process, and
analyse digital evidence. Arrests for Indecent Images of Children (IIOC) have risen by a …

Burp suite: Automating web vulnerability scanning

J Kim - 2020 - search.proquest.com
The purpose of this research was to demonstrate a method of automating web application
penetration testing using Burp Suite's web vulnerability scanner and Python Selenium. This …

Implementasi Cross Site Scripting Vulnerability Assessment Tools berdasarkan OWASP Code Review

MI Hany, A Bhawiyuga, A Kusyanti - … Teknologi Informasi dan Ilmu …, 2021 - j-ptiik.ub.ac.id
Serangan cross site scripting (XSS) merupakan salah satu kerentanan yang paling sering
ditemukan dalam aplikasi web. Sayangnya, tidak semua pengembang aplikasi dan tim …

PTHelper: An open source tool to support the Penetration Testing process

JC de Gracia, A Sánchez-Macián - arxiv preprint arxiv:2406.08242, 2024 - arxiv.org
Offensive security is one of the state of the art measures to protect enterprises and
organizations. Penetration testing, broadly called pentesting, is a branch of offensive …

[PDF][PDF] Automated penetration testing using deep reinforcement learning

胡振国 - 2021 - dspace.jaist.ac.jp
Penetration testing is a new network security technology developed in recent years, which
has great practical application for computer network and security. It is a security testing and …