{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,5]],"date-time":"2026-02-05T09:32:07Z","timestamp":1770283927202,"version":"3.49.0"},"reference-count":26,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,9,2]],"date-time":"2024-09-02T00:00:00Z","timestamp":1725235200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,9,2]],"date-time":"2024-09-02T00:00:00Z","timestamp":1725235200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,9,2]]},"DOI":"10.1109\/csr61664.2024.10679480","type":"proceedings-article","created":{"date-parts":[[2024,9,24]],"date-time":"2024-09-24T17:21:51Z","timestamp":1727198511000},"page":"763-770","source":"Crossref","is-referenced-by-count":13,"title":["PENTEST-AI, an LLM-Powered Multi-Agents Framework for Penetration Testing Automation Leveraging Mitre Attack"],"prefix":"10.1109","author":[{"given":"Stanislas G.","family":"Bianou","sequence":"first","affiliation":[{"name":"Independent Researcher,Ashburn,VA,USA"}]},{"given":"Rodrigue G.","family":"Batogna","sequence":"additional","affiliation":[{"name":"School of Science, University of Namibia,Computing Mathematical &#x0026; Statistical Sciences,Windhoek,Namibia"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/msp.2007.159"},{"key":"ref2","first-page":"1","article-title":"Taxonomy of intrusion risk assessment and response system in cloud computing","volume":"66","author":"Shameli-Sendi","year":"2016","journal-title":"J. Netw. Comput. Appl."},{"key":"ref3","article-title":"Analysis of modern tools for penetration testing","author":"Muzhanova","year":"2022","journal-title":"Su\u010dasnij zahist \u00ecnformac\u00ec\u00ef, undefined"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.58496\/mjcs\/2023\/014"},{"key":"ref5","author":"Lim","year":"2022","journal-title":"Security Assurance through Penetration Testing"},{"key":"ref6","author":"Alkaabi","year":"2023","journal-title":"A Methodical Framework for Conducting Reconnaissance and Enumeration in the Ethical Hacking Lifecycle,\u201d undefined"},{"key":"ref7","author":"Alkaabi","year":"2023","journal-title":"A Methodical Framework for Conducting Reconnaissance and Enumeration in the Ethical Hacking Lifecycle,\u201d undefined"},{"key":"ref8","article-title":"Maximizing Penetration Testing Success with Effective Reconnaissance Techniques using ChatGPT","year":"2023","journal-title":"undefined"},{"key":"ref9","author":"Lasky","year":"2023","journal-title":"Machine Learning Based Approach to Recommend MITRE ATT&CK Framework for Software Requirements and Design Specifications"},{"key":"ref10","author":"Zych","year":"2022","journal-title":"Enhancing the STIX Representation of MITRE ATT&CK for Group Filtering and Technique Prioritization"},{"key":"ref11","article-title":"The Pyramid of Pain","volume-title":"Detect Respond","author":"Bianco","year":"2013"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ViTECoN58111.2023.10157032"},{"key":"ref13","author":"Rakhmonova","year":"2022","journal-title":"Intelligent Automated Penetration Testing Using Reinforcement Learning to Improve the Efficiency and Effectiveness of Penetration Testing"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/rivf55975.2022.10013801"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.3390\/app122010339"},{"key":"ref16","author":"Kucharavy","year":"2023","journal-title":"Fundamentals of Generative Large Language Models and Perspectives in Cyber-Defense"},{"key":"ref17","author":"Xi","year":"2023","journal-title":"The Rise and Potential of Large Language Model Based Agents: A Survey"},{"key":"ref18","author":"Talebirad","year":"2023","journal-title":"Multi-Agent Collaboration: Harnessing the Power of Intelligent LLM Agents"},{"key":"ref19","author":"H\u00e4ndler","year":"2023","journal-title":"Balancing Autonomy and Alignment: A Multi-Dimensional Taxonomy for Autonomous LLM-powered Multi-Agent Architectures"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1098\/rsta.1955.0005"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1017\/cbo9780511709340"},{"key":"ref22","first-page":"271","article-title":"Fine particles, thin films and exchange anisotropy","volume-title":"Magnetism","volume":"III","author":"Jacobs","year":"1963"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TJMJ.1987.4549593"},{"key":"ref24","volume-title":"The Technical Writers Handbook","author":"Young","year":"1989"},{"key":"ref25","volume":"abs\/2306.14263","author":"Ferrag","year":"2023","journal-title":"Revolutionizing Cyber Threat Detection with Large Language Models: A privacy-preserving BERT-based Lightweight Model for IoT\/IoT Devices"},{"key":"ref26","volume-title":"Generative AI and Large Language Models for Cyber Security: All Insights You Need","author":"Ferrag"}],"event":{"name":"2024 IEEE International Conference on Cyber Security and Resilience (CSR)","location":"London, United Kingdom","start":{"date-parts":[[2024,9,2]]},"end":{"date-parts":[[2024,9,4]]}},"container-title":["2024 IEEE International Conference on Cyber Security and Resilience (CSR)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10679369\/10679342\/10679480.pdf?arnumber=10679480","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,25]],"date-time":"2024-09-25T05:00:13Z","timestamp":1727240413000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10679480\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,9,2]]},"references-count":26,"URL":"https:\/\/doi.org\/10.1109\/csr61664.2024.10679480","relation":{},"subject":[],"published":{"date-parts":[[2024,9,2]]}}}