Metasploit for Cyber-Physical Security Testing with Real-Time Constraints.
Sulav Lal ShresthaTaylor LeeSebastian FischmeisterPublished in: SciSec (2022)
Keyphrases
- penetration testing
- cyber physical
- security vulnerabilities
- real time
- cyber physical systems
- physical world
- social networks
- intrusion detection
- hardware and software
- situation awareness
- information security
- network security
- cyber security
- security issues
- data acquisition
- quality of service
- customer data
- information systems
- access control