IoT-PEN: An E2E Penetration Testing Framework for IoT
暂无分享,去创建一个
[1] Kolin Paul,et al. Assessment of SCADA System Vulnerabilities , 2019, 2019 24th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA).
[2] Vasaka Visoottiviseth,et al. PENTOS: Penetration testing tool for Internet of Thing devices , 2017, TENCON 2017 - 2017 IEEE Region 10 Conference.
[3] Kishore Angrishi,et al. Turning Internet of Things(IoT) into Internet of Vulnerabilities (IoV) : IoT Botnets , 2017, ArXiv.
[4] Qiong Jia,et al. Automatic Generation Algorithm of Penetration Graph in Penetration Testing , 2014, 2014 Ninth International Conference on P2P, Parallel, Grid, Cloud and Internet Computing.
[5] Robert A. Martin,et al. Vulnerability Type Distributions in CVE , 2007 .
[6] Thaier Hayajneh,et al. Penetration testing: Concepts, attack methods, and defense strategies , 2016, 2016 IEEE Long Island Systems, Applications and Technology Conference (LISAT).
[7] Hongsong Chen,et al. Multi-stage crypto ransomware attacks: A new emerging cyber threat to critical infrastructure and industrial control systems , 2018, ICT Express.
[8] Kolin Paul,et al. PatchRank: Ordering updates for SCADA systems , 2019, 2019 24th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA).
[9] Mariam Ibrahim,et al. A2G2V: Automated Attack Graph Generator and Visualizer , 2018 .
[10] Xinming Ou,et al. A scalable approach to attack graph generation , 2006, CCS '06.
[11] Kemal Bicakci,et al. Automated Generation of Attack Graphs Using NVD , 2018, CODASPY.
[12] Kolin Paul,et al. IoT-PEN: A Penetration Testing Framework for IoT , 2020, 2020 International Conference on Information Networking (ICOIN).
[13] Shancang Li,et al. 5G Internet of Things: A survey , 2018, J. Ind. Inf. Integr..
[14] Edmund M. Clarke,et al. Ranking Attack Graphs , 2006, RAID.