共 158 条
- [11] Computer security worries military experts, (1983)
- [12] Stefinko Y, Piskozub A, Banakh R., Manual and automated penetration testing. Benefits and drawbacks. Modern tendency, Proc. of the 13th Int’l Conf. on Modern Problems of Radio Engineering, Telecommunications and Computer Science (TCSET), pp. 488-491, (2016)
- [13] Nmap: The network mapper, (2023)
- [14] Download nessus vulnerability assessment, (2023)
- [15] Herzog P., Open-source security testing methodology manual, (2003)
- [16] Information Systems Security Assessment Framework, (2006)
- [17] The penetration testing execution standard documentation, (2022)
- [18] Strom BE, Applebaum A, Miller DP, Nickels KC, Pennington AG, Thomas CB., MITRE ATT&CK: Design and philosophy, (2018)
- [19] Boddy M, Gohde J, Haigh T, Harp S., Course of action generation for cyber security using classical planning, Proc. of the 15th Int’l Conf. on Automated Planning and Scheduling, pp. 12-21, (2005)
- [20] Obes JL, Sarraute C, Richarte G., Attack planning in the real world, (2013)