Login / Signup

Vulnerability mining of Cisco router based on fuzzing.

Fengjiao LiLuyong ZhangDianjun Chen
Published in: ICSAI (2014)
Keyphrases
  • text mining
  • web mining
  • cd rom
  • data mining
  • knowledge discovery
  • data mining techniques
  • sequential patterns
  • pattern mining
  • data structure
  • data model
  • itemsets
  • frequent itemsets
  • data mining methods