共 50 条
- [1] A Mutation-based Fuzz Testing Approach for Network Protocol Vulnerability Detection PROCEEDINGS OF 2012 2ND INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND NETWORK TECHNOLOGY (ICCSNT 2012), 2012, : 1018 - 1022
- [2] Vulnerability mining method for industrial control network protocol based on fuzz testing Jisuanji Jicheng Zhizao Xitong/Computer Integrated Manufacturing Systems, CIMS, 2019, 25 (09): : 2265 - 2279
- [3] Network protocol vulnerability discovery based on fuzzy testing Qinghua Daxue Xuebao/Journal of Tsinghua University, 2009, 49 (SUPPL. 2): : 2113 - 2118
- [4] Network Protocol Security Testing Based on Fuzz PROCEEDINGS OF 2015 4TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND NETWORK TECHNOLOGY (ICCSNT 2015), 2015, : 955 - 958
- [5] Research on the model of vulnerability mining based on the local fuzz 2012 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING (WICOM), 2012,
- [6] Wi-fi protocol vulnerability discovery based on fuzzy testing Zhu, K. (zwkh100@163.com), 1600, Universitas Ahmad Dahlan, Jalan Kapas 9, Semaki, Umbul Harjo,, Yogiakarta, 55165, Indonesia (11):
- [8] Network protocol fuzz testing for information systems and applications: a survey and taxonomy Multimedia Tools and Applications, 2016, 75 : 14745 - 14757
- [9] Improve Peach: Making Network Protocol Fuzz Testing More Precisely DESIGN, MANUFACTURING AND MECHATRONICS, 2014, 551 : 642 - 647
- [10] A Novel Protocol Fuzz Testing Approach PROCEEDINGS OF THE 2015 4TH NATIONAL CONFERENCE ON ELECTRICAL, ELECTRONICS AND COMPUTER ENGINEERING ( NCEECE 2015), 2016, 47 : 1067 - 1072