{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,20]],"date-time":"2026-02-20T19:08:50Z","timestamp":1771614530888,"version":"3.50.1"},"reference-count":16,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,12,9]],"date-time":"2024-12-09T00:00:00Z","timestamp":1733702400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,12,9]],"date-time":"2024-12-09T00:00:00Z","timestamp":1733702400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,12,9]]},"DOI":"10.1109\/snams64316.2024.10883774","type":"proceedings-article","created":{"date-parts":[[2025,2,20]],"date-time":"2025-02-20T20:04:34Z","timestamp":1740081874000},"page":"227-229","source":"Crossref","is-referenced-by-count":4,"title":["Towards Supporting Penetration Testing Education with Large Language Models: an Evaluation and Comparison"],"prefix":"10.1109","author":[{"given":"Martin","family":"Nizon-Deladoeuille","sequence":"first","affiliation":[{"name":"INSA Lyon,France"}]},{"given":"Brynj\u00f3lfur","family":"Stef\u00e1nsson","sequence":"additional","affiliation":[{"name":"University of Iceland,Reykjavik,Iceland"}]},{"given":"Helmut","family":"Neukirchen","sequence":"additional","affiliation":[{"name":"University of Iceland,Reykjavik,Iceland"}]},{"given":"Thomas","family":"Welsh","sequence":"additional","affiliation":[{"name":"University of Iceland,Reykjavik,Iceland"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.lindif.2023.102274"},{"key":"ref2","article-title":"Challenges and applications of large language models","author":"Kaddour","year":"2023","journal-title":"arXiv preprint"},{"key":"ref3","article-title":"Large language models in cybersecurity: State-of-the-art","author":"Motlagh","year":"2024","journal-title":"arXiv preprint"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-54827-7"},{"key":"ref5","article-title":"Using large language models for cybersecurity capture-the-flag challenges and certification questions","author":"Tann","year":"2023","journal-title":"arXiv preprint"},{"key":"ref6","article-title":"Language agents as hackers: Evaluating cybersecurity skills with capture the flag","volume-title":"Multi-Agent Security, Workshop at NeurIPS\u201923, 2023","author":"Yang"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.34190\/iccws.19.1.2171"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/3611643.3613083"},{"key":"ref9","article-title":"PentestGPT: Evaluating and harnessing large language models for automated penetration testing","volume-title":"33rd USENIX Security Symposium, 2024","author":"Deng"},{"key":"ref10","article-title":"LLM agents can autonomously exploit one-day vulner-abilities","author":"Fang","year":"2024","journal-title":"arXiv preprint"},{"key":"ref11","article-title":"LLM agents can autonomously hack websites","author":"Fang","year":"2024","journal-title":"arXiv preprint"},{"key":"ref12","article-title":"Generating phishing attacks using ChatGPT","author":"Roy","year":"2023","journal-title":"arXiv preprint"},{"key":"ref13","volume-title":"ChatGPT-assisted penetration testing of consumer IoT devices: Exploring penetration testing of consumer iot devices assisted by GPT-4","author":"Veijalainen","year":"2024"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.34190\/eccws.23.1.2493"},{"issue":"4","key":"ref15","first-page":"129","article-title":"Some ethical hacking possibilities in Kali Linux environment","volume":"9","author":"Cisar","year":"2019","journal-title":"Journal of Applied Technical and Educational Sciences"},{"key":"ref16","article-title":"Jailbroken: How does LLM safety training fail?","volume":"36","author":"Wei","year":"2024","journal-title":"Advances in Neural Information Processing Systems"}],"event":{"name":"2024 11th International Conference on Social Networks Analysis, Management and Security (SNAMS)","location":"Gran Canaria, Spain","start":{"date-parts":[[2024,12,9]]},"end":{"date-parts":[[2024,12,11]]}},"container-title":["2024 11th International Conference on Social Networks Analysis, Management and Security (SNAMS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10883770\/10883773\/10883774.pdf?arnumber=10883774","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T18:37:31Z","timestamp":1740163051000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10883774\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,9]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/snams64316.2024.10883774","relation":{},"subject":[],"published":{"date-parts":[[2024,12,9]]}}}