|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 7 occurrences of 7 keywords
|
|
|
Results
Found 16 publication records. Showing 16 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
94 | Mustapha Refai |
Exploiting a buffer overflow using metasploit framework. |
PST |
2006 |
DBLP DOI BibTeX RDF |
metasploit, framework, buffer overflow, exploit, buffer overrun |
61 | E. Ramirez-Silva, Marc Dacier |
Empirical Study of the Impact of Metasploit-Related Attacks in 4 Years of Attack Traces. |
ASIAN |
2007 |
DBLP DOI BibTeX RDF |
|
33 | Wojciech Tylman |
Detecting Computer Intrusions with Bayesian Networks. |
IDEAL |
2009 |
DBLP DOI BibTeX RDF |
Metasploit Framework, Bayesian networks, network intrusion detection, Snort |
32 | Tamanna Jena Singhdeo, S. R. Reeja, Arpan Bhavsar, Suresh Satapathy |
Penetration Testing of Web Server Using Metasploit Framework and DVWA. |
FICTA (2) |
2023 |
DBLP DOI BibTeX RDF |
|
32 | Gonçalo Xavier, Carlos Novo, Ricardo Morla |
Tweaking Metasploit to Evade Encrypted C2 Traffic Detection. |
CoRR |
2022 |
DBLP DOI BibTeX RDF |
|
32 | Sulav Lal Shrestha, Taylor Lee, Sebastian Fischmeister |
Metasploit for Cyber-Physical Security Testing with Real-Time Constraints. |
SciSec |
2022 |
DBLP DOI BibTeX RDF |
|
32 | Kankanok Vimala, Somchart Fugkeaw |
VAPE-BRIDGE: Bridging OpenVAS Results for Automating Metasploit Framework. |
KST |
2022 |
DBLP DOI BibTeX RDF |
|
32 | Ovidiu Valea, Ciprian Oprisa |
Towards Pentesting Automation Using the Metasploit Framework. |
ICCP |
2020 |
DBLP DOI BibTeX RDF |
|
32 | Romain Cayre, Vincent Nicomette, Guillaume Auriol, Eric Alata, Mohamed Kaâniche, Géraldine Vache Marconato |
Mirage: Towards a Metasploit-Like Framework for IoT. |
ISSRE |
2019 |
DBLP DOI BibTeX RDF |
|
32 | Peter Casey, Mateusz Topor, Emily Hennessy, Saed Alrabaee, Moayad Aloqaily, Azzedine Boukerche |
Applied Comparative Evaluation of the Metasploit Evasion Module. |
ISCC |
2019 |
DBLP DOI BibTeX RDF |
|
32 | Mohammadreza Ramezani-Chemazi, Maede Ashouri-Talouki |
Toward signature extraction of Metasploit encoding algorithms using static analysis. |
Int. J. Secur. Networks |
2018 |
DBLP DOI BibTeX RDF |
|
32 | Aubrey Alston |
Extending the Metasploit Framework to Implement an Evasive Attack Infrastructure. |
CoRR |
2017 |
DBLP BibTeX RDF |
|
32 | Miltiadis Kandias, Dimitris Gritzalis |
Metasploit the Penetration Tester's Guide. |
Comput. Secur. |
2013 |
DBLP DOI BibTeX RDF |
|
32 | Nathan Wallace, Travis Atkison |
Observing industrial control system attacks launched via metasploit framework. |
ACM Southeast Regional Conference |
2013 |
DBLP DOI BibTeX RDF |
|
32 | Rahat Masood, Um-e-Ghazia, Zahid Anwar |
SWAM: Stuxnet Worm Analysis in Metasploit. |
FIT |
2011 |
DBLP DOI BibTeX RDF |
|
32 | Danny Bradbury |
Hands-on with Metasploit Express. |
Netw. Secur. |
2010 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #16 of 16 (100 per page; Change: )
|
|