2011 International Conference on Computational and Information Sciences 2011
DOI: 10.1109/iccis.2011.181
|View full text |Cite
|
Sign up to set email alerts
|

Network Penetration Testing Scheme Description Language

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
1
0

Year Published

2015
2015
2022
2022

Publication Types

Select...
3
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(2 citation statements)
references
References 5 publications
0
1
0
Order By: Relevance
“…Approaches based on threat models [46], ontologies and big data techniques [47], static and dynamic analysis [48], Petri nets [49], fuzzy classifiers [50], expert systems [51], planning automation [52], automated pathfinding [53] (including map/graph-based techniques [54]), and agent-based modeling [55] have been proposed. Prior research has also developed a variety of machine learning techniques, such as those using reinforcement learning [56][57][58][59][60] and deep reinforcement learning [61,62], as well as supporting technologies, such as a description language [63]. Despite all of this, some suggest that human penetration testing is still needed due to the capability of human testers to think creatively.…”
Section: Security Testing Automationmentioning
confidence: 99%
“…Approaches based on threat models [46], ontologies and big data techniques [47], static and dynamic analysis [48], Petri nets [49], fuzzy classifiers [50], expert systems [51], planning automation [52], automated pathfinding [53] (including map/graph-based techniques [54]), and agent-based modeling [55] have been proposed. Prior research has also developed a variety of machine learning techniques, such as those using reinforcement learning [56][57][58][59][60] and deep reinforcement learning [61,62], as well as supporting technologies, such as a description language [63]. Despite all of this, some suggest that human penetration testing is still needed due to the capability of human testers to think creatively.…”
Section: Security Testing Automationmentioning
confidence: 99%
“…Penetration testing is widely used to help ensure the security of the network. [4] Establishing the test ground rules is a particularly important part of Penetration analysis. [10] The same concept of penetration testing has been used in this tool.…”
Section: Related Workmentioning
confidence: 99%