The Internet of Things network penetration testing model using attack graph analysis
Penetration testing (pen-testing) is one of the most effective approaches to increase the security level of information systems. Although pen-testing is a very popular approach, the process requires a significant investment of time and extensive financial resources. Existing pen-testing models have...
Saved in:
Main Authors: | Almazrouei, Omar, Magalingam, Pritheega |
---|---|
Format: | Conference or Workshop Item |
Published: |
2022
|
Subjects: | |
Online Access: | http://eprints.utm.my/id/eprint/98928/ http://dx.doi.org/10.1109/ISMSIT56059.2022.9932758 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Cyber-Attack Penetration Test and Vulnerability Analysis
by: Stiawan, Deris, et al.
Published: (2017) -
Applications of ontology in the internet of things: A systematic analysis
by: Qaswar, Fahad, et al.
Published: (2023) -
A survey of security challenges, attacks taxonomy and advanced countermeasures in the internet of things
by: Khanam, Shapla, et al.
Published: (2020) -
Improvement of attack detection performance on the internet of things with PSO-search and random forest
by: Kurniabudi, Kurniabudi, et al.
Published: (2022) -
Penetration testing and network auditing: Linux
by: Stiawan, Deris, et al.
Published: (2015)