共 50 条
- [1] The Appilication of Fuzzing in Web software security vulnerabilities Test [J]. 2013 INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY AND APPLICATIONS (ITA), 2013, : 130 - 133
- [2] Fuzzing Malicious Driving Behavior to find Vulnerabilities in Collision Avoidance Systems [J]. 7TH IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY WORKSHOPS (EUROS&PW 2022), 2022, : 368 - 375
- [3] Fuzzing Wi-Fi drivers to locate security vulnerabilities [J]. HASE 2007: 10TH IEEE HIGH ASSURANCE SYSTEMS ENGINEERING SYMPOSIUM, PROCEEDINGS, 2007, : 379 - 380
- [4] Fuzzing Wi-Fi drivers to locate security vulnerabilities [J]. EDCC-7: SEVENTH EUROPEAN DEPENDABLE COMPUTING CONFERENCE, PROCEEDINGS, 2008, : 110 - 119
- [6] Analysis of the DoIP Protocol for Security Vulnerabilities [J]. PROCEEDINGS OF 6TH ACM COMPUTER SCIENCE IN CARS SYMPOSIUM, CSCS 2022, 2022,
- [7] Approaches to find vulnerabilities and security in the digital production networks [J]. INTERNATIONAL SCIENTIFIC CONFERENCE ON APPLIED PHYSICS, INFORMATION TECHNOLOGIES AND ENGINEERING (APITECH-2019), 2019, 1399
- [8] Security issues and vulnerabilities of the SNMP protocol [J]. 2004 1st International Conference on Electrical and Electronics Engineering (ICEEE), 2004, : 74 - 77
- [9] Fuzzing LibraryOSes for Iago vulnerabilities [J]. PROCEEDINGS OF THE 16TH ACM INTERNATIONAL SYSTEMS AND STORAGE CONFERENCE, SYSTOR 2023, 2023, : 151 - 151
- [10] An Overview of the EMV Protocol and Its Security Vulnerabilities [J]. PROCEEDINGS OF THE 2018 FOURTH INTERNATIONAL CONFERENCE ON MOBILE AND SECURE SERVICES (MOBISECSERV), 2018,