Journal articles on the topic 'Protocol fuzzing'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 28 journal articles for your research on the topic 'Protocol fuzzing.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Wu, Xiao Lei. "Research on Network Security Algorithm Based on ZigBee Technology." Applied Mechanics and Materials 608-609 (October 2014): 503–6. http://dx.doi.org/10.4028/www.scientific.net/amm.608-609.503.
Full textLuo, Jian-Zhen, Chun Shan, Jun Cai, and Yan Liu. "IoT Application-Layer Protocol Vulnerability Detection using Reverse Engineering." Symmetry 10, no. 11 (November 1, 2018): 561. http://dx.doi.org/10.3390/sym10110561.
Full textZeng, Yingpei, Mingmin Lin, Shanqing Guo, Yanzhao Shen, Tingting Cui, Ting Wu, Qiuhua Zheng, and Qiuhua Wang. "MultiFuzz: A Coverage-Based Multiparty-Protocol Fuzzer for IoT Publish/Subscribe Protocols." Sensors 20, no. 18 (September 11, 2020): 5194. http://dx.doi.org/10.3390/s20185194.
Full textHernández Ramos, Santiago, M. Teresa Villalba, and Raquel Lacuesta. "MQTT Security: A Novel Fuzzing Approach." Wireless Communications and Mobile Computing 2018 (2018): 1–11. http://dx.doi.org/10.1155/2018/8261746.
Full textJero, Samuel, Maria Leonor Pacheco, Dan Goldwasser, and Cristina Nita-Rotaru. "Leveraging Textual Specifications for Grammar-Based Fuzzing of Network Protocols." Proceedings of the AAAI Conference on Artificial Intelligence 33 (July 17, 2019): 9478–83. http://dx.doi.org/10.1609/aaai.v33i01.33019478.
Full textWang, Zhiqiang, Yuheng Lin, Zihan Zhuo, Jieming Gu, and Tao Yang. "GNFCVulFinder: NDEF Vulnerability Discovering for NFC-Enabled Smart Mobile Devices Based on Fuzzing." Security and Communication Networks 2021 (June 28, 2021): 1–14. http://dx.doi.org/10.1155/2021/9946022.
Full textSong, Congxi, Bo Yu, Xu Zhou, and Qiang Yang. "SPFuzz: A Hierarchical Scheduling Framework for Stateful Network Protocol Fuzzing." IEEE Access 7 (2019): 18490–99. http://dx.doi.org/10.1109/access.2019.2895025.
Full textXie, Haofei, Zhihui Wang, and Deng Xin Yang. "Design of fuzzing test tool based on WIA-PA protocol." Journal of Physics: Conference Series 1856, no. 1 (April 1, 2021): 012046. http://dx.doi.org/10.1088/1742-6596/1856/1/012046.
Full textLi, Xiaoyi, Xiaojun Pan, and Yanbin Sun. "PS-Fuzz: Efficient Graybox Firmware Fuzzing Based on Protocol State." Journal on Artificial Intelligence 3, no. 1 (2021): 21–31. http://dx.doi.org/10.32604/jai.2021.017328.
Full textWang, Enze, Baosheng Wang, Wei Xie, Zhenhua Wang, Zhenhao Luo, and Tai Yue. "EWVHunter: Grey-Box Fuzzing with Knowledge Guide on Embedded Web Front-Ends." Applied Sciences 10, no. 11 (June 10, 2020): 4015. http://dx.doi.org/10.3390/app10114015.
Full textKim, SungJin, Jaeik Cho, Changhoon Lee, and Taeshik Shon. "Smart seed selection-based effective black box fuzzing for IIoT protocol." Journal of Supercomputing 76, no. 12 (March 14, 2020): 10140–54. http://dx.doi.org/10.1007/s11227-020-03245-7.
Full textQi, Xiong, Peng Yong, Zhonghua Dai, Shengwei Yi, and Ting Wang. "OPC-MFuzzer: A Novel Multi-Layers Vulnerability Detection Tool for OPC Protocol Based on Fuzzing Technology." International Journal of Computer and Communication Engineering 3, no. 4 (2014): 300–305. http://dx.doi.org/10.7763/ijcce.2014.v3.339.
Full textWang, Guobin, Jingling Zhao, and Baojiang Cui. "Fuzzing method based on field filter and packet repair for GTPv2 protocol." Internet of Things 8 (December 2019): 100104. http://dx.doi.org/10.1016/j.iot.2019.100104.
Full textZhang, Hangwei, Kai Lu, Xu Zhou, Qidi Yin, Pengfei Wang, and Tai Yue. "SIoTFuzzer: Fuzzing Web Interface in IoT Firmware via Stateful Message Generation." Applied Sciences 11, no. 7 (April 1, 2021): 3120. http://dx.doi.org/10.3390/app11073120.
Full textKim, Woo-Nyon, Moon-Su Jang, Jeongtaek Seo, and Sangwook Kim. "Vulnerability Discovery Method Based on Control Protocol Fuzzing for a Railway SCADA System." Journal of Korea Information and Communications Society 39C, no. 4 (April 30, 2014): 362–69. http://dx.doi.org/10.7840/kics.2014.39c.4.362.
Full textMa, Rui, Daguang Wang, Changzhen Hu, Wendong Ji, and Jingfeng Xue. "Test data generation for stateful network protocol fuzzing using a rule-based state machine." Tsinghua Science and Technology 21, no. 3 (June 2016): 352–60. http://dx.doi.org/10.1109/tst.2016.7488746.
Full textKim, Sung Jin, and Taeshik Shon. "Field classification-based novel fuzzing case generation for ICS protocols." Journal of Supercomputing 74, no. 9 (February 14, 2017): 4434–50. http://dx.doi.org/10.1007/s11227-017-1980-3.
Full textLiu, Xinyao, Baojiang Cui, Junsong Fu, and Jinxin Ma. "HFuzz: Towards automatic fuzzing testing of NB-IoT core network protocols implementations." Future Generation Computer Systems 108 (July 2020): 390–400. http://dx.doi.org/10.1016/j.future.2019.12.032.
Full textPechenkin, A. I., and A. V. Nikolskiy. "Architecture of a scalable system of fuzzing network protocols on a multiprocessor cluster." Automatic Control and Computer Sciences 49, no. 8 (December 2015): 758–65. http://dx.doi.org/10.3103/s0146411615080313.
Full textPechenkin, A. I., and D. S. Lavrova. "Modeling the search for vulnerabilities via the fuzzing method using an automation representation of network protocols." Automatic Control and Computer Sciences 49, no. 8 (December 2015): 826–33. http://dx.doi.org/10.3103/s0146411615080325.
Full textHarris, J. "On the correlation of statistical and automatic process control." Proceedings of the Institution of Mechanical Engineers, Part B: Journal of Engineering Manufacture 217, no. 1 (January 1, 2003): 99–109. http://dx.doi.org/10.1243/095440503762502314.
Full textBrandão, Euzeli Da Silva, Iraci Dos Santos, and Regina Serrão Lanzillotti. "Contribuições do cuidado de enfermagem na redução da dor em clientes com dermatoses imunobolhosas: avaliação pela lógica fuzzi." Online Brazilian Journal of Nursing 15, no. 4 (December 30, 2016): 675. http://dx.doi.org/10.17665/1676-4285.20165467.
Full textXia, Hui, San-shun Zhang, Ben-xia Li, Li Li, and Xiang-guo Cheng. "Towards a Novel Trust-Based Multicast Routing for VANETs." Security and Communication Networks 2018 (October 1, 2018): 1–12. http://dx.doi.org/10.1155/2018/7608198.
Full textLin, Pei-Yi, Chia-Wei Tien, Ting-Chun Huang, and Chin-Wei Tien. "ICPFuzzer: proprietary communication protocol fuzzing by using machine learning and feedback strategies." Cybersecurity 4, no. 1 (August 3, 2021). http://dx.doi.org/10.1186/s42400-021-00087-5.
Full textKwon, Soonhong, Sang‐Jin Son, Yangseo Choi, and Jong‐Hyouk Lee. "Protocol fuzzing to find security vulnerabilities of RabbitMQ." Concurrency and Computation: Practice and Experience, September 14, 2020. http://dx.doi.org/10.1002/cpe.6012.
Full text"RPFuzzer: A Framework for Discovering Router Protocols Vulnerabilities Based on Fuzzing." KSII Transactions on Internet and Information Systems 7, no. 8 (August 30, 2013): 1989–2009. http://dx.doi.org/10.3837/tiis.2013.08.014.
Full textGao, Zicong, Weiyu Dong, Rui Chang, and Yisen Wang. "Fw-fuzz: A code coverage-guided fuzzing framework for network protocols on firmware." Concurrency and Computation: Practice and Experience, April 8, 2020. http://dx.doi.org/10.1002/cpe.5756.
Full textLv, Wanyou, Jiawen Xiong, Jianqi Shi, Yanhong Huang, and Shengchao Qin. "A deep convolution generative adversarial networks based fuzzing framework for industry control protocols." Journal of Intelligent Manufacturing, May 23, 2020. http://dx.doi.org/10.1007/s10845-020-01584-z.
Full text