This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
Ghanem, M. C., T. M. Chen, E. G. Nepomuceno. Hierarchical Reinforcement Learning for Efficient and Effective Automated Penetration Testing of Large Networks. – Journal of Intelligent Information Systems, Vol. 60, 2023, No 2, pp. 281-303.Search in Google Scholar
Wang, Y., Y. Li, X. Xiong, J. Zhang, Q. Yao, C. Shen. DQfD‐AIPT: An Intelligent Penetration Testing Framework Incorporating Expert Demonstration Data. – Security and Communication Networks, 2023, No 1, 5834434.Search in Google Scholar
Li, Z., Q. Zhang, G. Yang. EPPTA: Efficient Partially Observable Reinforcement Learning Agent for Penetration Testing Applications. – Engineering Reports, 2023, e12818.Search in Google Scholar
Yi, J., X. Liu. Deep Reinforcement Learning for Intelligent Penetration Testing Path Design. – Applied Sciences, Vol. 13, 2023, No 16, 9467.Search in Google Scholar
Chen, J., S. Hu, H. Zheng, C. Xing, G. Zhang. GAIL-PT: An Intelligent Penetration Testing Framework with Generative Adversarial Imitation Learning. – Computers & Security, Vol. 126, 2023, 103055.Search in Google Scholar
Arkin, B., S. Stender, G. McGraw. Software Penetration Testing. – IEEE Security & Privacy, Vol. 3, 2005, No 1, pp. 84-87.Search in Google Scholar
Kaur, G., N. Kaur. Penetration Testing – Reconnaissance with NMAP Tool. – International Journal of Advanced Research in Computer Science, Vol. 8, 2017, No 3, pp. 844-846.Search in Google Scholar
Kaushik, M., G. Ojha. Attack Penetration System for SQL Injection. – International Journal of Advanced Computer Research, Vol. 4, 2014, No 2, p. 724.Search in Google Scholar
Haeni, R. E. Firewall Penetration Testing. – In: Technical Report. The George Washington University Cyberspace Policy Institute, 2033 K St, Suite. Vol. 340. 1997.Search in Google Scholar
Phong, C. T., W. Q. Yan. An Overview of Penetration Testing. – International Journal of Digital Crime and Forensics (IJDCF), Vol. 6, 2014, No 4, pp. 50-74.Search in Google Scholar
Henry, K. Penetration Testing: Protecting Networks and Systems. – IT Governance Publishing, 2012.Search in Google Scholar
Hafiz, A. M. A Survey of Deep q-Networks Used for Reinforcement Learning: State of the Art. – In: Proc. of Intelligent Communication Technologies and Virtual Mobile Networks: (ICICV’22), 2022, pp. 393-402.Search in Google Scholar
Chaudhary, S., A. O’Brien, S. Xu. Automated Post-Breach Penetration Testing through Reinforcement Learning. – In: Proc. of IEEE Conference on Communications and Network Security (CNS’20), 2020, pp. 1-2.Search in Google Scholar
Zennaro, F. M., L. Erdődi. Modelling Penetration Testing with Reinforcement Learning Using Capture‐the‐Flag Challenges: Trade‐Offs between Model‐Free Learning and a Priori Knowledge. – IET Information Security, Vol. 17, 2023, No 3, pp. 441-457.Search in Google Scholar
Chen, X., Y. M. Mu, P. Luo, S. Li, J. Chen. Flow-Based Recurrent Belief State Learning for Pomdps. – In: Proc. of International Conference on Machine Learning (PMLR’22), June 2022, pp. 3444-3468.Search in Google Scholar
CVEdataset, on July 2024. https://www.kaggle.com/datasets/andrewkronser/cve-common-vulnerabilities-and-exposuresSearch in Google Scholar
Hu, Z., R. Beuran, Y. Tan. Automated Penetration Testing Using Deep Reinforcement Learning. – In: Proc. of IEEE European Symposium on Security and Privacy Workshops (EuroS&PW’20), September 2020, pp. 2-10.Search in Google Scholar
Dehghani, M., Z. Montazeri, E. Trojovská, P. Trojovský. Coati Optimization Algorithm: A New Bio-Inspired Metaheuristic Algorithm for Solving Optimization Problems. – Knowledge-Based Systems, Vol. 259, 2023, 110011.Search in Google Scholar
Wang, D., D. Tan, L. Liu. Particle Swarm Optimization Algorithm: An Overview. – Soft Computing, Vol. 22, 2018, No 2, pp. 387-408.Search in Google Scholar
Li, J., S. Wang, H. Zhang, A. Zhou. A Multi-Objective Evolutionary Algorithm Based on KNN-Graph for Traffic Network Attack. – Electronics, Vol. 9, 2020, No 10, p. 1589.Search in Google Scholar
Nakhodchi, S. A Framework Based on Bag of Feature and CatBoost for Attack Detection and Attribution in Industrial Control Systems. – Doctoral Dissertation, University of Guelph, 2021.Search in Google Scholar
Xue, W., T. Wu. Active Learning-Based XGBoost for Cyber Physical System against Generic AC False Data Injection Attacks. – IEEE Access, Vol. 8, 2020, pp. 144575-144584.Search in Google Scholar
Huang, S., N. Papernot, I. Goodfellow, Y. Duan, P. Abbeel. Adversarial Attacks on Neural Network Policies. – arXiv preprint arXiv:1702.02284, 2017.Search in Google Scholar
Hossain, M. D., H. Inoue, H. Ochiai, D. Fall, Y. Kadobayashi. LSTM-Based Intrusion Detection System for In-Vehicle Can Bus Communications. – IEEE Access, Vol. 8, 2020, pp. 185489-185502.Search in Google Scholar
Marra, F., D. Gragnaniello, L. Verdoliva. On the Vulnerability of Deep Learning to Adversarial Attacks for Camera Model Identification. – Signal Processing: Image Communication, Vol. 65, 2018, pp. 240-248.Search in Google Scholar
Sarker, I. HDeep Cybersecurity: A Comprehensive Overview from Neural Network and Deep Learning Perspective. – SN Computer Science, Vol. 2, 2021, No 3, p. 154.Search in Google Scholar
Venkatesh, B., J. Anuradha. A Review of Feature Selection and Its Methods in Cybernetics and Information Technologies. – Cybernetics and Information Technologies, Vol. 19, 2019, No 1, pp. 3-26.Search in Google Scholar
Lazarov, A. D. Mathematical Modelling of Malware Intrusion in Computer Networks. – Cybernetics and Information Technologies, Vol. 22, 2022, No 3, pp. 29-47.Search in Google Scholar