The Internet of Things network penetration testing model using attack graph analysis
Penetration testing (pen-testing) is one of the most effective approaches to increase the security level of information systems. Although pen-testing is a very popular approach, the process requires a significant investment of time and extensive financial resources. Existing pen-testing models have...
Saved in:
Main Authors: | , |
---|---|
Format: | Conference or Workshop Item |
Published: |
2022
|
Subjects: | |
Online Access: | http://eprints.utm.my/id/eprint/98928/ http://dx.doi.org/10.1109/ISMSIT56059.2022.9932758 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Be the first to leave a comment!