{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,27]],"date-time":"2026-02-27T23:32:17Z","timestamp":1772235137407,"version":"3.50.1"},"reference-count":21,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,11,25]],"date-time":"2025-11-25T00:00:00Z","timestamp":1764028800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,11,25]],"date-time":"2025-11-25T00:00:00Z","timestamp":1764028800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,11,25]]},"DOI":"10.1109\/candarw68385.2025.00053","type":"proceedings-article","created":{"date-parts":[[2026,1,12]],"date-time":"2026-01-12T18:20:34Z","timestamp":1768242034000},"page":"274-279","source":"Crossref","is-referenced-by-count":1,"title":["Penetration Testing Without Port Scanning Using EPSS-Based Vulnerability Lists in Port-Scan Countermeasure Environments"],"prefix":"10.1109","author":[{"given":"Kosei","family":"Okumura","sequence":"first","affiliation":[{"name":"Kogakuin University,Tokyo,Japan"}]},{"given":"Ryotaro","family":"Kobayashi","sequence":"additional","affiliation":[{"name":"Kogakuin University,Tokyo,Japan"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/2801948.2802001"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/CINTI.2014.7028682"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/MIPRO.2015.7160480"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ICOIN.2016.7427157"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TCSET.2016.7452095"},{"key":"ref6","first-page":"814","article-title":"Creation and Evaluation of Automated Penetration Tools for Organizational Networks","volume-title":"Proc. Computer Security Symposium","author":"Okumura"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/CANDARW64572.2024.00054"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ICRITO.2015.7359226"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ComPE49325.2020.9200028"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/KST53302.2022.9729085"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ICCP51029.2020.9266234"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.3390\/jcp4030021"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/NCA61908.2024.00043"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/2382416.2382427"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/2630069"},{"key":"ref16","article-title":"A Survey on Vulnerability Prioritization: Taxonomy, Metrics, and Research Challenges","author":"Jiang","year":"2025","journal-title":"arXiv preprint arXiv:2502.11070"},{"key":"ref17","article-title":"The EPSS model","year":"2025","journal-title":"FIRST"},{"key":"ref18","article-title":"Shun\/block on IPS for ASA\/PIX\/IOS router","year":"2025","journal-title":"Cisco"},{"key":"ref19","article-title":"Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 7.1","volume-title":"Cisco"},{"key":"ref20","article-title":"GuardDuty EC2 finding types","year":"2025","journal-title":"AWS"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.3390\/electronics14071267"}],"event":{"name":"2025 Thirteenth International Symposium on Computing and Networking Workshops (CANDARW)","location":"Yamagata, Japan","start":{"date-parts":[[2025,11,25]]},"end":{"date-parts":[[2025,11,28]]}},"container-title":["2025 Thirteenth International Symposium on Computing and Networking Workshops (CANDARW)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11318850\/11318884\/11318942.pdf?arnumber=11318942","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,13]],"date-time":"2026-01-13T08:51:02Z","timestamp":1768294262000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11318942\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11,25]]},"references-count":21,"URL":"https:\/\/doi.org\/10.1109\/candarw68385.2025.00053","relation":{},"subject":[],"published":{"date-parts":[[2025,11,25]]}}}