Login / Signup

TFTP vulnerability finding technique based on fuzzing.

Qixu LiuYuqing Zhang
Published in: Comput. Commun. (2008)
Keyphrases
  • machine learning
  • information systems
  • knowledge base
  • database
  • information retrieval
  • artificial intelligence
  • computer vision
  • decision making
  • high quality
  • data structure
  • pattern recognition