Login / Signup
A research on vulnerability discovering for router protocols based on fuzzing.
Zhiqiang Wang
Yuqing Zhang
Qixu Liu
Published in:
CHINACOM (2012)
Keyphrases
</>
risk assessment
end to end
social networks
communication protocol
flow control