{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,19]],"date-time":"2026-03-19T02:44:33Z","timestamp":1773888273581,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":23,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,7,30]],"date-time":"2024-07-30T00:00:00Z","timestamp":1722297600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,7,30]]},"DOI":"10.1145\/3664476.3670452","type":"proceedings-article","created":{"date-parts":[[2024,7,25]],"date-time":"2024-07-25T12:35:50Z","timestamp":1721910950000},"page":"1-7","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["AI-Powered Penetration Testing using Shennina: From Simulation to Validation"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9571-4417","authenticated-orcid":false,"given":"Stylianos","family":"Karagiannis","sequence":"first","affiliation":[{"name":"Department of Informatics, Ionian University, Greece and PDM, Portugal"}]},{"ORCID":"https:\/\/orcid.org\/0009-0004-2499-0333","authenticated-orcid":false,"given":"Camilla","family":"Fusco","sequence":"additional","affiliation":[{"name":"University of Naples Federico II, Italy and Montimage, France"}]},{"ORCID":"https:\/\/orcid.org\/0009-0001-7761-2027","authenticated-orcid":false,"given":"Leonidas","family":"Agathos","sequence":"additional","affiliation":[{"name":"PDM, Portugal and Department of Informatics, Ionian University, Greece"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2548-6628","authenticated-orcid":false,"given":"Wissam","family":"Mallouli","sequence":"additional","affiliation":[{"name":"Montimage, France"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0964-7014","authenticated-orcid":false,"given":"Valentina","family":"Casola","sequence":"additional","affiliation":[{"name":"University of Naples Federico II, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1575-4572","authenticated-orcid":false,"given":"Christoforos","family":"Ntantogian","sequence":"additional","affiliation":[{"name":"Department of Informatics, Ionian University, Greece"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5922-4274","authenticated-orcid":false,"given":"Emmanouil","family":"Magkos","sequence":"additional","affiliation":[{"name":"Department of Informatics, Ionian University, Greece"}]}],"member":"320","published-online":{"date-parts":[[2024,7,30]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3104260"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.3390\/app13126986"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.3390\/electronics12051229"},{"key":"e_1_3_2_1_4_1","volume-title":"A survey of data mining and machine learning methods for cyber security intrusion detection","author":"Buczak L","year":"2015","unstructured":"Anna\u00a0L Buczak and Erhan Guven. 2015. A survey of data mining and machine learning methods for cyber security intrusion detection. IEEE Communications surveys & tutorials 18, 2 (2015), 1153\u20131176."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/AERO53065.2022.9843459"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2021.102367"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-17030-0_4"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1016\/S1361-3723(17)30013-1","article-title":"Can\u2019t get the staff? The growing need for cyber-security skills","volume":"2017","author":"Furnell Steven","year":"2017","unstructured":"Steven Furnell, Pete Fischer, and Amanda Finch. 2017. Can\u2019t get the staff? The growing need for cyber-security skills. Computer Fraud & Security 2017, 2 (2017), 5\u201310.","journal-title":"Computer Fraud & Security"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.3390\/info11010006"},{"key":"e_1_3_2_1_10_1","volume-title":"Proceedings of the 31st ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering. 2082\u20132086","author":"Happe Andreas","year":"2023","unstructured":"Andreas Happe and J\u00fcrgen Cito. 2023. Getting pwn\u2019d by ai: Penetration testing with large language models. In Proceedings of the 31st ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering. 2082\u20132086."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSPW51379.2020.00010"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3600160.3605051"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISMSIT52890.2021.9604690"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.102108"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2019.02.022"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/GCWkshps58843.2023.10464928"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3600160.3605086"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2023.103546"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11416-014-0231-x"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICRITO48877.2020.9197961"},{"key":"e_1_3_2_1_21_1","volume-title":"Machine learning 8","author":"Watkins JCH","year":"1992","unstructured":"Christopher\u00a0JCH Watkins and Peter Dayan. 1992. Q-learning. Machine learning 8 (1992), 279\u2013292."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2020.102722"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.media.2019.101552"}],"event":{"name":"ARES 2024: The 19th International Conference on Availability, Reliability and Security","location":"Vienna Austria","acronym":"ARES 2024"},"container-title":["Proceedings of the 19th International Conference on Availability, Reliability and Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3664476.3670452","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3664476.3670452","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T16:51:55Z","timestamp":1755881515000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3664476.3670452"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,7,30]]},"references-count":23,"alternative-id":["10.1145\/3664476.3670452","10.1145\/3664476"],"URL":"https:\/\/doi.org\/10.1145\/3664476.3670452","relation":{},"subject":[],"published":{"date-parts":[[2024,7,30]]},"assertion":[{"value":"2024-07-30","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}