Login / Signup
Brute Force Vulnerability Testing Technology Based on Data Mutation.
Shijia Gu
Weihai Li
Xin Zhao
Published in:
VTC Fall (2011)
Keyphrases
</>
brute force
data processing
data sets
database
high quality
data analysis
computer systems
data collection
input data
raw data
statistical analysis
neural network
data points
training data
case study
data mining
data mining techniques
image data
knowledge discovery
training samples
synthetic data
test data