Author:
Zhang Jianyi,Li Zhenkui,Liu Yudong,Sun Zezheng,Wang Zhiqiang
Reference44 articles.
1. Fuzzing: Hack, art, and science;P Godefroid;Communications of the ACM,2020
2. Ike vulnerability discovery based on fuzzing;H Yang;Security and Communication Networks,2013