Exportar Publicação

A publicação pode ser exportada nos seguintes formatos: referência da APA (American Psychological Association), referência do IEEE (Institute of Electrical and Electronics Engineers), BibTeX e RIS.

Exportar Referência (APA)
Seara, J. & Serrão, C. (2024). Intelligent system for automation of security audits (SIAAS). EAI Endorsed Transactions on Scalable Information Systems. 11 (1)
Exportar Referência (IEEE)
J. P. Seara and C. J. Serrão,  "Intelligent system for automation of security audits (SIAAS)", in EAI Endorsed Transactions on Scalable Information Systems, vol. 11, no. 1, 2024
Exportar BibTeX
@article{seara2024_1716324369850,
	author = "Seara, J. and Serrão, C.",
	title = "Intelligent system for automation of security audits (SIAAS)",
	journal = "EAI Endorsed Transactions on Scalable Information Systems",
	year = "2024",
	volume = "11",
	number = "1",
	doi = "10.4108/eetsis.3564",
	url = "https://publications.eai.eu/index.php/sis/article/view/3564"
}
Exportar RIS
TY  - JOUR
TI  - Intelligent system for automation of security audits (SIAAS)
T2  - EAI Endorsed Transactions on Scalable Information Systems
VL  - 11
IS  - 1
AU  - Seara, J.
AU  - Serrão, C.
PY  - 2024
SN  - 2032-9407
DO  - 10.4108/eetsis.3564
UR  - https://publications.eai.eu/index.php/sis/article/view/3564
AB  - Events related to cybersecurity failures have a high and growing financial, operational, and reputational impact, on organizations around the world. At the same time, there is a shortage of cybersecurity professionals. In addition, the specialization of professionals with the necessary skills in the area of cybersecurity is expensive and time-consuming. Taking these facts into consideration, this research has focused on the automation of cybersecurity processes, specifically those related to continuous vulnerability detection. To address this problem, a cybersecurity vulnerability scanner that is free to the community and requires no pre-expertise on the part of the operator, was developed. The artifact was tested by companies in the IT business, by systems engineers, most without cybersecurity background. The results demonstrated that the artifact was easy to install and that the reported results can be used by the operator in the context of an automatic and proactive securitization of the systems involved.
ER  -