Login / Signup
Network application vulnerability detection based on fuzzing technology.
Chen Chong
Zou Ping
Published in:
NaNA (2021)
Keyphrases
</>
key technologies
detection method
object detection
peer to peer
campus network
detection accuracy
network model
false alarms
automatic detection
enterprise application
network attacks
rapid development
neural network
network traffic
anomaly detection
case study
computer vision