An automated method of penetration testing
暂无分享,去创建一个
Qiong Jia | Chunhe Xia | Shuguang Wang | Xue Qiu | Qingxin Xia | Chunhe Xia | Shuguang Wang | Qingxin Xia | Xue Qiu | Qiong Jia
[1] Herbert H. Thompson. Application Penetration Testing , 2005, IEEE Secur. Priv..
[2] Daniel Geer,et al. Penetration testing: a duet , 2002, 18th Annual Computer Security Applications Conference, 2002. Proceedings..
[3] Alessandro Orso,et al. Penetration Testing with Improved Input Vector Identification , 2009, 2009 International Conference on Software Testing Verification and Validation.
[4] Gary McGraw,et al. Software Penetration Testing , 2005, IEEE Secur. Priv..
[5] Martin Gilje Jaatun,et al. Penetration Testing of OPC as Part of Process Control Systems , 2008, UIC.
[6] Namosha Veerasamy. High-Level Methodology for Carrying out Combined Red and Blue Teams , 2009, 2009 Second International Conference on Computer and Electrical Engineering.