{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,14]],"date-time":"2025-04-14T04:40:09Z","timestamp":1744605609403,"version":"3.40.4"},"publisher-location":"Cham","reference-count":17,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031877650","type":"print"},{"value":"9783031877667","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-87766-7_30","type":"book-chapter","created":{"date-parts":[[2025,4,14]],"date-time":"2025-04-14T04:09:26Z","timestamp":1744603766000},"page":"340-353","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A Cyclical Penetration Testing Automation Methodology: The\u00a0JetRacer Case Study"],"prefix":"10.1007","author":[{"given":"Daniele","family":"Granata","sequence":"first","affiliation":[]},{"given":"Massimiliano","family":"Rak","sequence":"additional","affiliation":[]},{"given":"Felice","family":"Moretta","sequence":"additional","affiliation":[]},{"given":"Fabio","family":"Fiumara","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,4,15]]},"reference":[{"key":"30_CR1","doi-asserted-by":"crossref","unstructured":"Abdulghaffar, K., Elmrabit, N., Yousefi, M.: Enhancing web application security through automated penetration testing with multiple vulnerability scanners. Computers, 12(11) (2023)","DOI":"10.3390\/computers12110235"},{"key":"30_CR2","doi-asserted-by":"crossref","unstructured":"Abdulkhalek, B.: A systematic literature review on internet of vehicles security challenges and penetration testing solutions (2024)","DOI":"10.36227\/techrxiv.172296707.71456018\/v1"},{"key":"30_CR3","doi-asserted-by":"crossref","unstructured":"AlSalem, T.S., Almaiah, M.A., Lutfi, A.: Cybersecurity risk analysis in the IoT: a systematic review. Electronics, 12(18) (2023)","DOI":"10.3390\/electronics12183958"},{"key":"30_CR4","doi-asserted-by":"crossref","unstructured":"Eswarawaka, R., Firdose, S., Neha, S., Nitin\u00a0Sai, S.G., Pandey, A.: Design and development of autonomous driving car using nvidia jetson nano developer kit. In: International Conference on Innovations in Computational Intelligence and Computer Vision, pp. 191\u2013203. Springer (2024)","DOI":"10.1007\/978-981-97-6995-7_15"},{"key":"30_CR5","doi-asserted-by":"crossref","unstructured":"Granata, D., Rak, M., Salzillo, G.: Risk analysis automation process in it security for cloud applications. In: Ferguson, D., Helfert, M., Pahl, C., (eds.) Cloud Computing and Services Science, pp. 47\u201368. Springer, Cham (2022)","DOI":"10.1007\/978-3-031-21637-4_3"},{"key":"30_CR6","doi-asserted-by":"crossref","unstructured":"Kounte, M.R., Harshvardhan, V., Kumari, A., Dhruv, S., et\u00a0al.: Design and development of autonomous driving car using nvidiajetson nano developer kit. In: 2022 IEEE 4th International Conference on Cybernetics, Cognition and Machine Learning Applications (ICCCMLA), pp. 486\u2013489. IEEE (2022)","DOI":"10.1109\/ICCCMLA56841.2022.9989127"},{"key":"30_CR7","doi-asserted-by":"crossref","unstructured":"Mysiuk, R., Mysiuk, I., Pawlowski, G., Yuzevych, V., Yasinskyi, M., Tyrkalo, Y.: Video-based concrete road damage assessment using jetracer kit. In: 2023 17th International Conference on the Experience of Designing and Application of CAD Systems (CADSM), vol. 1, pp. 1\u20134. IEEE (2023)","DOI":"10.1109\/CADSM58174.2023.10076528"},{"key":"30_CR8","doi-asserted-by":"crossref","unstructured":"Mysiuk, R., Yuzevych, V., Mysiuk, I., Tyrkalo, Y., Pavlenchyk, A., Dalyk, V.: Detection of surface defects inside concrete pipelines using trained model on jetracer kit. In: 2023 IEEE 13th International Conference on Electronics and Information Technologies (ELIT), pp. 21\u201324. IEEE (2023)","DOI":"10.1109\/ELIT61488.2023.10310691"},{"key":"30_CR9","doi-asserted-by":"crossref","unstructured":"Rak, M., Moretta, F., Granata, D.: Advancing esseca: a step forward in automated penetration testing. In: Proceedings of the 19th International Conference on Availability, Reliability and Security, ARES 2024, Association for Computing Machinery, New York (2024)","DOI":"10.1145\/3664476.3670459"},{"key":"30_CR10","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2022.107721","volume":"99","author":"M Rak","year":"2022","unstructured":"Rak, M., Salzillo, G., Granata, D.: Esseca: an automated expert system for threat modelling and penetration testing for IoT ecosystems. Comput. Electr. Eng. 99, 107721 (2022)","journal-title":"Comput. Electr. Eng."},{"key":"30_CR11","doi-asserted-by":"crossref","unstructured":"Salzillo, G., Rak, M., Moretta, F.: Threat modeling based penetration testing: the open energy monitor case study. In: 13th International Conference on Security of Information and Networks, SIN 2020. Association for Computing Machinery, New York (2021)","DOI":"10.1145\/3433174.3433181"},{"key":"30_CR12","doi-asserted-by":"crossref","unstructured":"Sanfilippo, J., Abegaz, T., Payne, B., Salimi, A.: Stride-based threat modeling for mysql databases. In: Proceedings of the Future Technologies Conference (FTC) 2019, vol. 2, pp. 368\u2013378. Springer (2020)","DOI":"10.1007\/978-3-030-32523-7_25"},{"key":"30_CR13","doi-asserted-by":"crossref","unstructured":"Al Shebli, H.M.Z., Beheshti, B.D.: A study on penetration testing process and tools. In: 2018 IEEE Long Island Systems, Applications and Technology Conference (LISAT), pp. 1\u20137 (2018)","DOI":"10.1109\/LISAT.2018.8378035"},{"issue":"4","key":"30_CR14","first-page":"752","volume":"3","author":"K Shravan","year":"2014","unstructured":"Shravan, K., Neha, B., Pawan, B.: Penetration testing: a review. Compusoft 3(4), 752 (2014)","journal-title":"Compusoft"},{"key":"30_CR15","doi-asserted-by":"crossref","unstructured":"Singh, N., Meherhomji, V., Chandavarkar, B.R.: Automated versus manual approach of web application penetration testing. In: 2020 11th International Conference on Computing, Communication and Networking Technologies (ICCCNT), pp. 1\u20136 (2020)","DOI":"10.1109\/ICCCNT49239.2020.9225385"},{"key":"30_CR16","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2024.103945","volume":"144","author":"Z Wang","year":"2024","unstructured":"Wang, Z., Li, S., Zhang, L., Chunduo, H., Yan, L.: A red team automated testing modeling and online planning method for post-penetration. Comput. Secur. 144, 103945 (2024)","journal-title":"Comput. Secur."},{"key":"30_CR17","unstructured":"Zeng, X., Li, Y., Wang, Q.: Integration of multiple web vulnerability scanners in a single framework: enhancing detection and reducing false positives. J. Inf. Secur. Appl. (2019)"}],"container-title":["Lecture Notes on Data Engineering and Communications Technologies","Advanced Information Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-87766-7_30","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,14]],"date-time":"2025-04-14T04:09:42Z","timestamp":1744603782000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-87766-7_30"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9783031877650","9783031877667"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-87766-7_30","relation":{},"ISSN":["2367-4512","2367-4520"],"issn-type":[{"value":"2367-4512","type":"print"},{"value":"2367-4520","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"15 April 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"AINA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Advanced Information Networking and Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Barcelona","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Spain","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9 April 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11 April 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"39","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"aina0","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/voyager.ce.fit.ac.jp\/conf\/aina\/2025\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}