{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,29]],"date-time":"2025-10-29T03:42:09Z","timestamp":1761709329900},"reference-count":18,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,12]]},"DOI":"10.1109\/icitst.2016.7856666","type":"proceedings-article","created":{"date-parts":[[2017,2,16]],"date-time":"2017-02-16T22:16:34Z","timestamp":1487283394000},"page":"57-61","source":"Crossref","is-referenced-by-count":5,"title":["Employing miniaturized computers for distributed vulnerability assessment"],"prefix":"10.1109","author":[{"given":"Yi","family":"Hu","sequence":"first","affiliation":[]},{"given":"Dustin","family":"Sulek","sequence":"additional","affiliation":[]},{"given":"Anthony","family":"Carella","sequence":"additional","affiliation":[]},{"given":"Joshua","family":"Cox","sequence":"additional","affiliation":[]},{"given":"Allyson","family":"Frame","sequence":"additional","affiliation":[]},{"given":"Karen","family":"Cipriano","sequence":"additional","affiliation":[]},{"given":"Hong-xia","family":"Wang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Pwn Plug","year":"0","key":"ref10"},{"journal-title":"MiniPwner","year":"0","key":"ref11"},{"journal-title":"WiFi pineapple","year":"0","key":"ref12"},{"journal-title":"Distributed Pentest Using Pi","year":"0","key":"ref13"},{"journal-title":"Distributed Pentest Using Pi &#x2014; Configuration and README","year":"0","key":"ref14"},{"journal-title":"Nessus","year":"0","key":"ref15"},{"journal-title":"NeXpose","year":"0","key":"ref16"},{"journal-title":"Core impact","year":"0","key":"ref17"},{"journal-title":"Canvas","year":"0","key":"ref18"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/2806777.2806935"},{"key":"ref3","article-title":"Developing a Penetration Test Methodology in Ensuring Router Security and Testing It in a Virtual Laboratory","author":"k\u00fc\u00e7\u00fcksille","year":"2015","journal-title":"Proceedings of the 8th International Conference on Security of Information and Networks"},{"key":"ref6","article-title":"Automatic Generation Algorithm of Penetration Graph in Penetration Testing","author":"qiu","year":"2014","journal-title":"Proceedings of the 2014 Ninth International Conference on P2P Parallel Grid Cloud and Internet Computing"},{"journal-title":"White Paper on Penetration Testing","year":"0","author":"tilak","key":"ref5"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2007.159"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/s10009-013-0278-x"},{"journal-title":"Application Penetration Testing","year":"0","key":"ref2"},{"journal-title":"Openvas","year":"0","key":"ref1"},{"journal-title":"Penetration testing with Raspberry Pi Packt Publishing","year":"2015","author":"muniz","key":"ref9"}],"event":{"name":"2016 11th International Conference for Internet Technology and Secured Transactions (ICITST)","start":{"date-parts":[[2016,12,5]]},"location":"Barcelona","end":{"date-parts":[[2016,12,7]]}},"container-title":["2016 11th International Conference for Internet Technology and Secured Transactions (ICITST)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7847254\/7856645\/07856666.pdf?arnumber=7856666","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,4,28]],"date-time":"2020-04-28T00:25:37Z","timestamp":1588033537000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/7856666\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,12]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1109\/icitst.2016.7856666","relation":{},"subject":[],"published":{"date-parts":[[2016,12]]}}}