Sign in

A research on vulnerability discovering for router protocols based on fuzzing.

Zhiqiang WangYuqing ZhangQixu Liu
Published in: CHINACOM (2012)
Keyphrases
  • risk assessment
  • end to end
  • social networks
  • communication protocol
  • flow control