Login / Signup
Vulnerability mining of Cisco router based on fuzzing.
Fengjiao Li
Luyong Zhang
Dianjun Chen
Published in:
ICSAI (2014)
Keyphrases
</>
text mining
web mining
cd rom
data mining
knowledge discovery
data mining techniques
sequential patterns
pattern mining
data structure
data model
itemsets
frequent itemsets
data mining methods