Login / Signup
Modeling the search for vulnerabilities via the fuzzing method using an automation representation of network protocols.
Alexander I. Pechenkin
Daria S. Lavrova
Published in:
Autom. Control. Comput. Sci. (2015)
Keyphrases
</>
search algorithm
network security
network protocols