Login / Signup

Modeling the search for vulnerabilities via the fuzzing method using an automation representation of network protocols.

Alexander I. PechenkinDaria S. Lavrova
Published in: Autom. Control. Comput. Sci. (2015)
Keyphrases
  • search algorithm
  • network security
  • network protocols