引用
mauw2006attacktree:DOI:10.1007/11734727_17
nunes2025blending:doi: 10.1109/ACCESS.2024.3522094.
@inproceedings{Stafeev2025YuraScannerLL, title={YuraScanner: Leveraging LLMs for Task-driven Web App Scanning}, author={Aleksei Stafeev and Tim Recktenwald and Gianluca De Stefano and Soheil Khodayari and Giancarlo Pellegrino}, booktitle={Network and Distributed System Security Symposium}, year={2025}, url={https://api.semanticscholar.org/CorpusID:276862631} }
@inproceedings{Thimmaiah2025FIXXFE, title={FIXX: FInding eXploits from eXamples}, author={Neil P. Thimmaiah and Yashashvi J Dave and Rigel Gjomemo and Venkat Venkatakrishnan}, booktitle={USENIX Security Symposium}, year={2025}, url={https://api.semanticscholar.org/CorpusID:278787756} }
wang2025hoyen: https://doi.org/10.48550/arXiv.2504.20801
zhao2025poc: https://doi.org/10.48550/arXiv.2510.10148
