Automated Vulnerability Discovery and Exploitation in the Internet of Things.
Zhongru WangYuntao ZhangZhihong TianQiang RuanTong LiuHaichen WangZhehui LiuJiayi LinBinxing FangWei ShiPublished in: Sensors (2019)
Keyphrases
- automated analysis
- knowledge discovery
- semi automated
- fully automated
- mobile devices
- composition of web services
- mobile computing
- information systems
- artificial intelligence
- open source
- ubiquitous computing
- scientific discovery
- databases
- multiscale
- evolutionary algorithm
- learning algorithm
- computer aided
- genetic algorithm
- key technologies
- information retrieval
- machine learning
- discovery process
- data mining