Funder
Natural Science Foundation of Yangzhou City
National Natural Science Foundation of China
Subject
Law,General Computer Science
Reference28 articles.
1. Aitel, D., An introduction to spike, the fuzzer creation kit. presented at the blackHat USA conference. https://www.blackhat.com/presentations/bh-usa-02/bh-us-02-aitel-spike.ppt.
2. Alhawi, O. M. K., Akinbi, A., Dehghantanha, A., 2019. Evaluation and application of two fuzzing approaches for security testing of IoT applications, 301–327. 10.1007/978-3-030-10543-3_13
3. Amini, P., Portnoy, A.. Sulley: fuzzing framework. http://www.fuzzing.org/wp-content/SulleyManual.pdf.
4. Fuzzing vulnerability discovery techniques: Survey, challenges and future directions;Beaman;Comput. Secur.,2022
5. Cybersecurity for industrial control systems: a survey;Bhamare;Comput. Secur.,2020
Cited by
7 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献