2012 International Conference on Privacy, Security, Risk and Trust and 2012 International Confernece on Social Computing 2012
DOI: 10.1109/socialcom-passat.2012.65
|View full text |Cite
|
Sign up to set email alerts
|

Towards a Unified Penetration Testing Taxonomy

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2013
2013
2016
2016

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 7 publications
(6 citation statements)
references
References 5 publications
0
6
0
Order By: Relevance
“…Complementary, our approach helps to elicit and prove such conformity prior to the test phase. As stated in [24], security oriented testing is a challenging topic. Our method provides means to deploy a security-test bench driven by models.…”
Section: B Approach Positioningmentioning
confidence: 99%
“…Complementary, our approach helps to elicit and prove such conformity prior to the test phase. As stated in [24], security oriented testing is a challenging topic. Our method provides means to deploy a security-test bench driven by models.…”
Section: B Approach Positioningmentioning
confidence: 99%
“…In addition, social engineering can be included to determine the human weaknesses that may provide access to assets [5], [6], [7], [8], [9]. Overviews of penetration testing methods are provided in [10], [11], [12].…”
Section: Related Work a Penetration Testingmentioning
confidence: 99%
“…, m 2 the failure probability p F i and store it in the vector p F . The function computes (8) by exploiting (12) to get p i = 1 1+e…”
Section: Updates Of Elo Ratingsmentioning
confidence: 99%
See 2 more Smart Citations