-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathSLR-pentest-bibliography.aux
497 lines (497 loc) · 15.4 KB
/
SLR-pentest-bibliography.aux
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
\relax
\providecommand\hyper@newdestlabel[2]{}
\providecommand{\transparent@use}[1]{}
\providecommand\HyperFirstAtBeginDocument{\AtBeginDocument}
\HyperFirstAtBeginDocument{\ifx\hyper@anchor\@undefined
\global\let\oldcontentsline\contentsline
\gdef\contentsline#1#2#3#4{\oldcontentsline{#1}{#2}{#3}}
\global\let\oldnewlabel\newlabel
\gdef\newlabel#1#2{\newlabelxx{#1}#2}
\gdef\newlabelxx#1#2#3#4#5#6{\oldnewlabel{#1}{{#2}{#3}}}
\AtEndDocument{\ifx\hyper@anchor\@undefined
\let\contentsline\oldcontentsline
\let\newlabel\oldnewlabel
\fi}
\fi}
\global\let\hyper@last\relax
\gdef\HyperFirstAtBeginDocument#1{#1}
\providecommand\HyField@AuxAddToFields[1]{}
\providecommand\HyField@AuxAddToCoFields[2]{}
\bibstyle{unsrt}
\bibdata{references}
\bibcite{rahman2019bird}{1}
\bibcite{lee2020comprehensive}{2}
\bibcite{toapanta2019cyber}{3}
\bibcite{casola2020methodology}{4}
\bibcite{nguyen2019strategy}{5}
\bibcite{patel2019survey}{6}
\bibcite{giaretta2018adding}{7}
\bibcite{maddala2019agentless}{8}
\bibcite{eckroth2019alpaca}{9}
\bibcite{khera2019analysis}{10}
\bibcite{patel2019analytical}{11}
\bibcite{marksteiner2019approaching}{12}
\bibcite{baiardi2019avoiding}{13}
\bibcite{munaiah2019characterizing}{14}
\bibcite{mirsky2019ct}{15}
\bibcite{Brunner2019}{16}
\bibcite{Raman2019}{17}
\bibcite{Ding2019}{18}
\bibcite{Azaharimohdyusof2019}{19}
\bibcite{srivastava2019firmfuzz}{20}
\bibcite{al2018fuzz}{21}
\bibcite{kao2020hacking}{22}
\bibcite{ye2019high}{23}
\bibcite{arnaldy2019implementation}{24}
\bibcite{caliwag2019integrating}{25}
\bibcite{kumar2018internal}{26}
\bibcite{yadav2019}{27}
\bibcite{stallenberg2019jcomix}{28}
\bibcite{kothia2019knowledge}{29}
\bibcite{zech2019knowledge}{30}
\bibcite{moniruzzaman2019measuring}{31}
\bibcite{randhawa2018mission}{32}
\bibcite{koutroumpouchos2019objectmap}{33}
\bibcite{elsayed2019offering}{34}
\bibcite{funaya2018optimizing}{35}
\bibcite{shah2019penetration}{36}
\bibcite{chu2018penetration}{37}
\bibcite{yadav2020iot}{38}
\bibcite{zitta2018penetration}{39}
\bibcite{overstreet2019penetration}{40}
\bibcite{mikulskis2019poster}{41}
\bibcite{castillo2019prevention}{42}
\bibcite{imran2019problems}{43}
\bibcite{ankele2019requirements}{44}
\bibcite{sun2020research}{45}
\bibcite{su2018research}{46}
\bibcite{krishnan2019scada}{47}
\bibcite{chattopadhyay2019secure}{48}
\bibcite{liu2018security}{49}
\bibcite{tao2018security}{50}
\bibcite{cohen2019security}{51}
\bibcite{rojas2019security}{52}
\bibcite{ebert2019security}{53}
\bibcite{oujezsky2019security}{54}
\bibcite{shakdhe2019security}{55}
\bibcite{al2019systematic}{56}
\bibcite{maraj2020testing}{57}
\bibcite{thomas2019importance}{58}
\bibcite{botacin2019internet}{59}
\bibcite{shi2019penetration}{60}
\bibcite{speicher2019towards}{61}
\bibcite{jourdan2019towards}{62}
\bibcite{ceccato2019understanding}{63}
\bibcite{emani2019using}{64}
\bibcite{kenner2020using}{65}
\bibcite{hatfield2019virtuous}{66}
\bibcite{goutam2019vulnerability}{67}
\bibcite{nagendran2019web}{68}
\bibcite{valenza2019web}{69}
\bibcite{mckinnel2019systematic}{70}
\bibcite{chen2007distributed}{71}
\bibcite{lai2014light}{72}
\bibcite{pfleeger1989methodology}{73}
\bibcite{xiong2010model}{74}
\bibcite{watanabe2010new}{75}
\bibcite{hu2011novel}{76}
\bibcite{mirjalili2014survey}{77}
\bibcite{bishop2007penetration}{78}
\bibcite{bechtsoudis2012aiming}{79}
\bibcite{liu2016effective}{80}
\bibcite{bacudio2011overview}{81}
\bibcite{tian2012attack}{82}
\bibcite{hart2010criminal}{83}
\bibcite{berger2016cyber}{84}
\bibcite{shinde2016cyber}{85}
\bibcite{stiawan2017cyber}{86}
\bibcite{petukhov2008detecting}{87}
\bibcite{kuccuksille2015developing}{88}
\bibcite{budiarto2004development}{89}
\bibcite{holik2014effective}{90}
\bibcite{palmer2001ethical}{91}
\bibcite{farsole2010ethical}{92}
\bibcite{rathore2016ethical}{93}
\bibcite{saleem2006ethical}{94}
\bibcite{trabelsi2016ethical}{95}
\bibcite{juneja2013ethical}{96}
\bibcite{smith2002ethical}{97}
\bibcite{liu2016exposing}{98}
\bibcite{curbelo2013faculty}{99}
\bibcite{singh2004fast}{100}
\bibcite{haubris2013improving}{101}
\bibcite{jamil2011ethical}{102}
\bibcite{xiong2009model}{103}
\bibcite{bohme2010optimal}{104}
\bibcite{mainka2013penetration}{105}
\bibcite{mainka2012penetration}{106}
\bibcite{geer2002penetration}{107}
\bibcite{naik2009penetration}{108}
\bibcite{de2016pentesting}{109}
\bibcite{jiajia2016research}{110}
\bibcite{bozhinovski2013security}{111}
\bibcite{arkin2005software}{112}
\bibcite{trabelsi2013teaching}{113}
\bibcite{yeo2013using}{114}
\bibcite{adegbite2017cybersecurity}{115}
\bibcite{asghar2016deliberately}{116}
\bibcite{shakibazad2019framework}{117}
\bibcite{gujral2019novel}{118}
\bibcite{calvert2017procedure}{119}
\bibcite{liu2018web}{120}
\bibcite{lina2016ajax}{121}
\bibcite{demarco2018approach}{122}
\bibcite{rosmansyah2019attack}{123}
\bibcite{yichao2019improved}{124}
\bibcite{lakshmianalysis}{125}
\bibcite{Vignesh2018}{126}
\bibcite{munoz2018analyzing}{127}
\bibcite{sachdeva2018android}{128}
\bibcite{svilicic2019assessing}{129}
\bibcite{vondravcek2018automated}{130}
\bibcite{qasaimeh2018black}{131}
\bibcite{choi2017building}{132}
\bibcite{cheah2018building}{133}
\bibcite{simon2017contactless}{134}
\bibcite{wang2017cross}{135}
\bibcite{rafferty2016dangerous}{136}
\bibcite{antunes2017designing}{137}
\bibcite{browne2018development}{138}
\bibcite{kang2016diagnostic}{139}
\bibcite{alsmadi2016government}{140}
\bibcite{zhu2017exploring}{141}
\bibcite{mansfield2018friendly}{142}
\bibcite{steinmetz2016goal}{143}
\bibcite{kusnardi2019guillou}{144}
\bibcite{mansfield2017hiring}{145}
\bibcite{dixit2016holding}{146}
\bibcite{papp2019iot}{147}
\bibcite{smile8lopt}{148}
\bibcite{peroli2018mobster}{149}
\bibcite{Bhatt2018}{150}
\bibcite{carabas2016monitoring}{151}
\bibcite{zhou2019nig}{152}
\bibcite{bertoglio2017overview}{153}
\bibcite{ahmed2018peer}{154}
\bibcite{aitkhozhayeva2018penetration}{155}
\bibcite{Stiawan2016}{156}
\bibcite{chen2018penetration}{157}
\bibcite{gunawan2018penetration}{158}
\bibcite{Sahiti2019}{159}
\bibcite{arjun2017penetration}{160}
\bibcite{thompson2017putting}{161}
\bibcite{archibald2019refining}{162}
\bibcite{ghanem2020reinforcement}{163}
\bibcite{hassan2018saisan}{164}
\bibcite{Raju20191}{165}
\bibcite{ashraf2019security}{166}
\bibcite{Varathan2019}{167}
\bibcite{ficco2017simulation}{168}
\bibcite{kleber2018survey}{169}
\bibcite{eckroth2018teaching}{170}
\bibcite{siddavatam2017testing}{171}
\bibcite{mansfield2018best}{172}
\bibcite{knowles2016simulated}{173}
\bibcite{darwish2016vulnerability}{174}
\bibcite{Gitanjali2019}{175}
\bibcite{murah2018web}{176}
\bibcite{ciampa2010heuristic}{177}
\bibcite{ammann2005host}{178}
\bibcite{baca2015novel}{179}
\bibcite{hebbard1980penetration}{180}
\bibcite{sarraute2011algorithm}{181}
\bibcite{xu2014automated}{182}
\bibcite{obermaier2016analyzing}{183}
\bibcite{thompson2005application}{184}
\bibcite{antunes2014assessing}{185}
\bibcite{abdelnur2007assessing}{186}
\bibcite{mcdermott2001attack}{187}
\bibcite{wolchok2012attacking}{188}
\bibcite{gorbunov2010autofuzz}{189}
\bibcite{antunes2010benchmarking}{190}
\bibcite{micco2002building}{191}
\bibcite{smith2010challenges}{192}
\bibcite{chang2016cloud}{193}
\bibcite{antunes2009comparing}{194}
\bibcite{kasinathan2013ids}{195}
\bibcite{kasinathan2013denial}{196}
\bibcite{byers2007design}{197}
\bibcite{siadati2016detecting}{198}
\bibcite{bohme2017directed}{199}
\bibcite{cui2007discoverer}{200}
\bibcite{mclaughlin2009energy}{201}
\bibcite{antunes2011enhancing}{202}
\bibcite{milenkoski2015evaluating}{203}
\bibcite{senn2005firewall}{204}
\bibcite{halfond2011improving}{205}
\bibcite{daryabar2011investigation}{206}
\bibcite{mink2006attack}{207}
\bibcite{albrecht2016lucky}{208}
\bibcite{dahl2006modeling}{209}
\bibcite{mclaughlin2010multi}{210}
\bibcite{somorovsky2012breaking}{211}
\bibcite{garn2014applicability}{212}
\bibcite{austin2011one}{213}
\bibcite{gu2012sommelier}{214}
\bibcite{halfond2009penetration}{215}
\bibcite{denis2016penetration}{216}
\bibcite{halfond2009precise}{217}
\bibcite{bozic2015purity}{218}
\bibcite{hooper2016securing}{219}
\bibcite{valente2017security}{220}
\bibcite{salas2014security}{221}
\bibcite{felderer2016security}{222}
\bibcite{oladimeji2006security}{223}
\bibcite{buchler2012semi}{224}
\bibcite{bhasin2014side}{225}
\bibcite{ceccato2016sofia}{226}
\bibcite{liu2012software}{227}
\bibcite{urias2012supervisory}{228}
\bibcite{somorovsky2016systematic}{229}
\bibcite{ardi2006towards}{230}
\bibcite{chang2015towards}{231}
\bibcite{kongsli2006towards}{232}
\bibcite{austin2010towards}{233}
\bibcite{dimkov2010two}{234}
\bibcite{valente2017understanding}{235}
\bibcite{trabelsi2013using}{236}
\bibcite{huang2017web}{237}
\citation{rahman2019bird}
\citation{lee2020comprehensive}
\citation{toapanta2019cyber}
\citation{casola2020methodology}
\citation{nguyen2019strategy}
\citation{patel2019survey}
\citation{giaretta2018adding}
\citation{maddala2019agentless}
\citation{eckroth2019alpaca}
\citation{khera2019analysis}
\citation{patel2019analytical}
\citation{marksteiner2019approaching}
\citation{baiardi2019avoiding}
\citation{munaiah2019characterizing}
\citation{mirsky2019ct}
\citation{Brunner2019}
\citation{Raman2019}
\citation{Ding2019}
\citation{Azaharimohdyusof2019}
\citation{srivastava2019firmfuzz}
\citation{al2018fuzz}
\citation{kao2020hacking}
\citation{ye2019high}
\citation{arnaldy2019implementation}
\citation{caliwag2019integrating}
\citation{kumar2018internal}
\citation{yadav2019}
\citation{stallenberg2019jcomix}
\citation{kothia2019knowledge}
\citation{zech2019knowledge}
\citation{moniruzzaman2019measuring}
\citation{randhawa2018mission}
\citation{koutroumpouchos2019objectmap}
\citation{elsayed2019offering}
\citation{funaya2018optimizing}
\citation{shah2019penetration}
\citation{chu2018penetration}
\citation{yadav2020iot}
\citation{zitta2018penetration}
\citation{overstreet2019penetration}
\citation{mikulskis2019poster}
\citation{castillo2019prevention}
\citation{imran2019problems}
\citation{ankele2019requirements}
\citation{sun2020research}
\citation{su2018research}
\citation{krishnan2019scada}
\citation{chattopadhyay2019secure}
\citation{chattopadhyay2019secure}
\citation{liu2018security}
\citation{tao2018security}
\citation{cohen2019security}
\citation{rojas2019security}
\citation{ebert2019security}
\citation{oujezsky2019security}
\citation{shakdhe2019security}
\citation{al2019systematic}
\citation{maraj2020testing}
\citation{thomas2019importance}
\citation{botacin2019internet}
\citation{shi2019penetration}
\citation{speicher2019towards}
\citation{jourdan2019towards}
\citation{ceccato2019understanding}
\citation{emani2019using}
\citation{kenner2020using}
\citation{hatfield2019virtuous}
\citation{goutam2019vulnerability}
\citation{nagendran2019web}
\citation{valenza2019web}
\citation{mckinnel2019systematic}
\citation{chen2007distributed}
\citation{lai2014light}
\citation{pfleeger1989methodology}
\citation{xiong2010model}
\citation{watanabe2010new}
\citation{hu2011novel}
\citation{mirjalili2014survey}
\citation{bishop2007penetration}
\citation{bechtsoudis2012aiming}
\citation{liu2016effective}
\citation{bacudio2011overview}
\citation{tian2012attack}
\citation{hart2010criminal}
\citation{berger2016cyber}
\citation{shinde2016cyber}
\citation{stiawan2017cyber}
\citation{petukhov2008detecting}
\citation{kuccuksille2015developing}
\citation{budiarto2004development}
\citation{holik2014effective}
\citation{palmer2001ethical}
\citation{farsole2010ethical}
\citation{rathore2016ethical}
\citation{saleem2006ethical}
\citation{trabelsi2016ethical}
\citation{juneja2013ethical}
\citation{smith2002ethical}
\citation{liu2016exposing}
\citation{curbelo2013faculty}
\citation{singh2004fast}
\citation{haubris2013improving}
\citation{jamil2011ethical}
\citation{xiong2009model}
\citation{bohme2010optimal}
\citation{mainka2013penetration}
\citation{mainka2012penetration}
\citation{geer2002penetration}
\citation{naik2009penetration}
\citation{de2016pentesting}
\citation{jiajia2016research}
\citation{bozhinovski2013security}
\citation{arkin2005software}
\citation{trabelsi2013teaching}
\citation{yeo2013using}
\citation{adegbite2017cybersecurity}
\citation{asghar2016deliberately}
\citation{shakibazad2019framework}
\citation{shakibazad2019framework}
\citation{gujral2019novel}
\citation{calvert2017procedure}
\citation{liu2018web}
\citation{lina2016ajax}
\citation{demarco2018approach}
\citation{rosmansyah2019attack}
\citation{yichao2019improved}
\citation{lakshmianalysis}
\citation{Vignesh2018}
\citation{munoz2018analyzing}
\citation{sachdeva2018android}
\citation{svilicic2019assessing}
\citation{vondravcek2018automated}
\citation{qasaimeh2018black}
\citation{choi2017building}
\citation{cheah2018building}
\citation{simon2017contactless}
\citation{wang2017cross}
\citation{rafferty2016dangerous}
\citation{antunes2017designing}
\citation{browne2018development}
\citation{kang2016diagnostic}
\citation{alsmadi2016government}
\citation{zhu2017exploring}
\citation{mansfield2018friendly}
\citation{steinmetz2016goal}
\citation{kusnardi2019guillou}
\citation{mansfield2017hiring}
\citation{dixit2016holding}
\citation{papp2019iot}
\citation{smile8lopt}
\citation{peroli2018mobster}
\citation{Bhatt2018}
\citation{carabas2016monitoring}
\citation{zhou2019nig}
\citation{bertoglio2017overview}
\citation{ahmed2018peer}
\citation{aitkhozhayeva2018penetration}
\citation{Stiawan2016}
\citation{chen2018penetration}
\citation{gunawan2018penetration}
\citation{Sahiti2019}
\citation{arjun2017penetration}
\citation{thompson2017putting}
\citation{archibald2019refining}
\citation{ghanem2020reinforcement}
\citation{hassan2018saisan}
\citation{Raju20191}
\citation{ashraf2019security}
\citation{Varathan2019}
\citation{ficco2017simulation}
\citation{kleber2018survey}
\citation{eckroth2018teaching}
\citation{siddavatam2017testing}
\citation{mansfield2018best}
\citation{knowles2016simulated}
\citation{darwish2016vulnerability}
\citation{Gitanjali2019}
\citation{murah2018web}
\citation{ciampa2010heuristic}
\citation{ammann2005host}
\citation{baca2015novel}
\citation{hebbard1980penetration}
\citation{sarraute2011algorithm}
\citation{xu2014automated}
\citation{obermaier2016analyzing}
\citation{thompson2005application}
\citation{antunes2014assessing}
\citation{abdelnur2007assessing}
\citation{mcdermott2001attack}
\citation{wolchok2012attacking}
\citation{gorbunov2010autofuzz}
\citation{antunes2010benchmarking}
\citation{micco2002building}
\citation{smith2010challenges}
\citation{chang2016cloud}
\citation{antunes2009comparing}
\citation{kasinathan2013ids}
\citation{kasinathan2013denial}
\citation{byers2007design}
\citation{siadati2016detecting}
\citation{bohme2017directed}
\citation{cui2007discoverer}
\citation{mclaughlin2009energy}
\citation{antunes2011enhancing}
\citation{milenkoski2015evaluating}
\citation{senn2005firewall}
\citation{halfond2011improving}
\citation{daryabar2011investigation}
\citation{mink2006attack}
\citation{albrecht2016lucky}
\citation{dahl2006modeling}
\citation{mclaughlin2010multi}
\citation{somorovsky2012breaking}
\citation{garn2014applicability}
\citation{austin2011one}
\citation{gu2012sommelier}
\citation{halfond2009penetration}
\citation{denis2016penetration}
\citation{halfond2009precise}
\citation{bozic2015purity}
\citation{hooper2016securing}
\citation{valente2017security}
\citation{salas2014security}
\citation{felderer2016security}
\citation{oladimeji2006security}
\citation{buchler2012semi}
\citation{bhasin2014side}
\citation{ceccato2016sofia}
\citation{liu2012software}
\citation{urias2012supervisory}
\citation{somorovsky2016systematic}
\citation{ardi2006towards}
\citation{chang2015towards}
\citation{kongsli2006towards}
\citation{austin2010towards}
\citation{dimkov2010two}
\citation{valente2017understanding}
\citation{trabelsi2013using}
\citation{huang2017web}