Статті в журналах з теми "Security, Fuzzing"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся з топ-50 статей у журналах для дослідження на тему "Security, Fuzzing".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Переглядайте статті в журналах для різних дисциплін та оформлюйте правильно вашу бібліографію.
Wu, Xiao Lei. "Research on Network Security Algorithm Based on ZigBee Technology." Applied Mechanics and Materials 608-609 (October 2014): 503–6. http://dx.doi.org/10.4028/www.scientific.net/amm.608-609.503.
Повний текст джерелаSharkov, Ivan Vladimirovich, Vartan Andronikovich Padaryan, and Petr Vladimirovich Khenkin. "Features of fuzzing network interfaces without source codes." Proceedings of the Institute for System Programming of the RAS 33, no. 4 (2021): 211–26. http://dx.doi.org/10.15514/ispras-2021-33(4)-15.
Повний текст джерелаSong, Congxi, Xu Zhou, Qidi Yin, Xinglu He, Hangwei Zhang, and Kai Lu. "P-Fuzz: A Parallel Grey-Box Fuzzing Framework." Applied Sciences 9, no. 23 (November 25, 2019): 5100. http://dx.doi.org/10.3390/app9235100.
Повний текст джерелаVishnyakov, Alexey, Eli Kobrin, and Andrey Fedotov. "Error detection in binary code with dynamic symbolic execution." Proceedings of the Institute for System Programming of the RAS 34, no. 2 (2022): 25–42. http://dx.doi.org/10.15514/ispras-2022-34(2)-3.
Повний текст джерелаLi, Tong, Xuan Huang, and Rui Huang. "Research on Software Security Vulnerability Discovery Based on Fuzzing." Applied Mechanics and Materials 635-637 (September 2014): 1609–13. http://dx.doi.org/10.4028/www.scientific.net/amm.635-637.1609.
Повний текст джерелаHernández Ramos, Santiago, M. Teresa Villalba, and Raquel Lacuesta. "MQTT Security: A Novel Fuzzing Approach." Wireless Communications and Mobile Computing 2018 (2018): 1–11. http://dx.doi.org/10.1155/2018/8261746.
Повний текст джерелаSimon, Frank, and Daniel Simon. "Fuzzing: Testing Security in Maintenance Projects." Softwaretechnik-Trends 32, no. 2 (May 2012): 61–62. http://dx.doi.org/10.1007/bf03323481.
Повний текст джерелаGodefroid, Patrice, Michael Y. Levin, and David Molnar. "SAGE: Whitebox Fuzzing for Security Testing." Queue 10, no. 1 (January 2012): 20–27. http://dx.doi.org/10.1145/2090147.2094081.
Повний текст джерелаGao, Yifei, Xu Zhou, Wei Xie, Baosheng Wang, Enze Wang, and Zhenhua Wang. "Optimizing IoT Web Fuzzing by Firmware Infomation Mining." Applied Sciences 12, no. 13 (June 24, 2022): 6429. http://dx.doi.org/10.3390/app12136429.
Повний текст джерелаQu, Sheng, Zheng Zhang, Bolin Ma, and Yuwen Shao. "Optimization Method of Web Fuzzy Test Cases Based on Genetic Algorithm." Journal of Physics: Conference Series 2078, no. 1 (November 1, 2021): 012015. http://dx.doi.org/10.1088/1742-6596/2078/1/012015.
Повний текст джерелаVishnyakov, Alexey Vadimovich. "Analyzing properties of path predicate slicing algorithm." Proceedings of the Institute for System Programming of the RAS 34, no. 3 (2022): 7–12. http://dx.doi.org/10.15514/ispras-2022-34(3)-1.
Повний текст джерелаDai, Huning, Christian Murphy, and Gail Kaiser. "CONFU." International Journal of Secure Software Engineering 1, no. 3 (July 2010): 41–55. http://dx.doi.org/10.4018/jsse.2010070103.
Повний текст джерелаPietikäinen, Pekka, Atte Kettunen, and Juha Röning. "Steps Towards Fuzz Testing in Agile Test Automation." International Journal of Secure Software Engineering 7, no. 1 (January 2016): 38–52. http://dx.doi.org/10.4018/ijsse.2016010103.
Повний текст джерелаSerpanos, Dimitrios, and Konstantinos Katsigiannis. "Fuzzing: Cyberphysical System Testing for Security and Dependability." Computer 54, no. 9 (September 2021): 86–89. http://dx.doi.org/10.1109/mc.2021.3092479.
Повний текст джерелаMinaev, V. A., A. V. Mazin, and G. S. Baidin. "AUTOMATED SEARCH OF SOFTWARE ERRORS BY FAZZING METHOD." Issues of radio electronics, no. 3 (March 20, 2019): 67–70. http://dx.doi.org/10.21778/2218-5453-2019-3-67-70.
Повний текст джерелаPan, Yan, Wei Lin, Liang Jiao, and Yuefei Zhu. "Model-Based Grey-Box Fuzzing of Network Protocols." Security and Communication Networks 2022 (May 5, 2022): 1–13. http://dx.doi.org/10.1155/2022/6880677.
Повний текст джерелаLuo, Jian-Zhen, Chun Shan, Jun Cai, and Yan Liu. "IoT Application-Layer Protocol Vulnerability Detection using Reverse Engineering." Symmetry 10, no. 11 (November 1, 2018): 561. http://dx.doi.org/10.3390/sym10110561.
Повний текст джерелаWang, Ming-Hung, Han-Chi Wang, You-Ru Chen, and Chin-Laung Lei. "Automatic Test Pattern Generator for Fuzzing Based on Finite State Machine." Security and Communication Networks 2017 (2017): 1–11. http://dx.doi.org/10.1155/2017/7819590.
Повний текст джерелаSong, Guang Jun, Chun Lan Zhao, and Ming Li. "Study on Software Vulnerability Dynamic Discovering System." Applied Mechanics and Materials 151 (January 2012): 673–77. http://dx.doi.org/10.4028/www.scientific.net/amm.151.673.
Повний текст джерелаMi, Xianya, Baosheng Wang, Yong Tang, Pengfei Wang, and Bo Yu. "SHFuzz: Selective Hybrid Fuzzing with Branch Scheduling Based on Binary Instrumentation." Applied Sciences 10, no. 16 (August 6, 2020): 5449. http://dx.doi.org/10.3390/app10165449.
Повний текст джерелаWang, Zhiqiang, Yuheng Lin, Zihan Zhuo, Jieming Gu, and Tao Yang. "GNFCVulFinder: NDEF Vulnerability Discovering for NFC-Enabled Smart Mobile Devices Based on Fuzzing." Security and Communication Networks 2021 (June 28, 2021): 1–14. http://dx.doi.org/10.1155/2021/9946022.
Повний текст джерелаWang, Xiaoyin, Jiaze Sun, Chunyang Hu, Panpan Yu, Bin Zhang, and Donghai Hou. "EtherFuzz: Mutation Fuzzing Smart Contracts for TOD Vulnerability Detection." Wireless Communications and Mobile Computing 2022 (August 26, 2022): 1–8. http://dx.doi.org/10.1155/2022/1565007.
Повний текст джерелаHe, Ziheng, Peng Jia, Yong Fang, Yuying Liu, and Hairu Luo. "SwitchFuzz: Switch Short-Term Goals in Directed Grey-Box Fuzzing." Applied Sciences 12, no. 21 (November 2, 2022): 11097. http://dx.doi.org/10.3390/app122111097.
Повний текст джерелаPachnik, Marcin. "Methods of generating test data for carrying out the fuzzing process." Computer Science and Mathematical Modelling, no. 9/2019 (November 30, 2019): 27–32. http://dx.doi.org/10.5604/01.3001.0013.6603.
Повний текст джерелаFeng, Tao, and Jinkun Liu. "Optimization Research of Directed Fuzzing Based on AFL." Electronics 11, no. 24 (December 7, 2022): 4066. http://dx.doi.org/10.3390/electronics11244066.
Повний текст джерелаGuan, Quan Long, Guo Xiang Yao, Kai Bin Ni, and Mei Xiu Zhou. "Research on Fuzzing Test Data Engine for Web Vulnerability." Advanced Materials Research 211-212 (February 2011): 500–504. http://dx.doi.org/10.4028/www.scientific.net/amr.211-212.500.
Повний текст джерелаGu, Yeming, Hui Shu, Rongkuan Ma, Lin Yan, and Lei Zhu. "SpotFuzzer: Static Instrument and Fuzzing Windows COTs." Security and Communication Networks 2022 (August 30, 2022): 1–13. http://dx.doi.org/10.1155/2022/4911587.
Повний текст джерелаOkokpujie, Kennedy, Grace Chinyere Kennedy, Vingi Patrick Nzanzu, Mbasa Joaquim Molo, Emmanuel Adetiba, and Joke Badejo. "ANOMALY-BASED INTRUSION DETECTION FOR A VEHICLE CAN BUS: A CASE FOR HYUNDAI AVANTE CN7." Journal of Southwest Jiaotong University 56, no. 5 (October 30, 2021): 144–56. http://dx.doi.org/10.35741/issn.0258-2724.56.5.14.
Повний текст джерелаAshraf, Imran, Xiaoxue Ma, Bo Jiang, and W. K. Chan. "GasFuzzer: Fuzzing Ethereum Smart Contract Binaries to Expose Gas-Oriented Exception Security Vulnerabilities." IEEE Access 8 (2020): 99552–64. http://dx.doi.org/10.1109/access.2020.2995183.
Повний текст джерелаLiu, Yuying, Pin Yang, Peng Jia, Ziheng He, and Hairu Luo. "MalFuzz: Coverage-guided fuzzing on deep learning-based malware classification model." PLOS ONE 17, no. 9 (September 15, 2022): e0273804. http://dx.doi.org/10.1371/journal.pone.0273804.
Повний текст джерелаCheng, Yixuan, Wenqing Fan, Wei Huang, Gaoqing Yu, Yu Han, Hang Dong, and Wen Liu. "PDFuzzerGen: Policy-Driven Black-Box Fuzzer Generation for Smart Devices." Security and Communication Networks 2022 (April 27, 2022): 1–14. http://dx.doi.org/10.1155/2022/9788219.
Повний текст джерелаYin, Qidi, Xu Zhou, and Hangwei Zhang. "FirmHunter: State-Aware and Introspection-Driven Grey-Box Fuzzing towards IoT Firmware." Applied Sciences 11, no. 19 (September 29, 2021): 9094. http://dx.doi.org/10.3390/app11199094.
Повний текст джерелаSun, Li Yuan, and Yan Mei Zhang. "The Research and Application of the Variant Fuzz Testing Framework for Log Based on the Structured Data." Applied Mechanics and Materials 602-605 (August 2014): 1749–52. http://dx.doi.org/10.4028/www.scientific.net/amm.602-605.1749.
Повний текст джерелаPan, Zulie, Liqun Zhang, Zhihao Hu, Yang Li, and Yuanchao Chen. "SATFuzz: A Stateful Network Protocol Fuzzing Framework from a Novel Perspective." Applied Sciences 12, no. 15 (July 25, 2022): 7459. http://dx.doi.org/10.3390/app12157459.
Повний текст джерелаWang, Enze, Baosheng Wang, Wei Xie, Zhenhua Wang, Zhenhao Luo, and Tai Yue. "EWVHunter: Grey-Box Fuzzing with Knowledge Guide on Embedded Web Front-Ends." Applied Sciences 10, no. 11 (June 10, 2020): 4015. http://dx.doi.org/10.3390/app10114015.
Повний текст джерелаChi, Hongmei, Jinwei Liu, Weifeng Xu, Mingming Peng, and Jon DeGoicoechea. "Design Hands-on Lab Exercises for Cyber-physical Systems Security Education." Journal of The Colloquium for Information Systems Security Education 9, no. 1 (March 8, 2022): 8. http://dx.doi.org/10.53735/cisse.v9i1.140.
Повний текст джерелаLiu, Xiao, Xiaoting Li, Rupesh Prajapati, and Dinghao Wu. "DeepFuzz: Automatic Generation of Syntax Valid C Programs for Fuzz Testing." Proceedings of the AAAI Conference on Artificial Intelligence 33 (July 17, 2019): 1044–51. http://dx.doi.org/10.1609/aaai.v33i01.33011044.
Повний текст джерелаDevyanin, Petr Nikolaevich, Vladimir Iurevich Telezhnikov, and Alexey Vladimirovich Khoroshilov. "Building a methodology for secure system software development on the example of operating systems." Proceedings of the Institute for System Programming of the RAS 33, no. 5 (2021): 25–40. http://dx.doi.org/10.15514/ispras-2021-33(5)-2.
Повний текст джерелаZhang, Yujian, and Daifu Liu. "Toward Vulnerability Detection for Ethereum Smart Contracts Using Graph-Matching Network." Future Internet 14, no. 11 (November 11, 2022): 326. http://dx.doi.org/10.3390/fi14110326.
Повний текст джерелаLiu, Zhonglin, Yong Fang, Cheng Huang, and Yijia Xu. "GAXSS: Effective Payload Generation Method to Detect XSS Vulnerabilities Based on Genetic Algorithm." Security and Communication Networks 2022 (March 30, 2022): 1–15. http://dx.doi.org/10.1155/2022/2031924.
Повний текст джерелаPan, Yan, Wei Lin, Yubo He, and Yuefei Zhu. "Coverage-guided differential testing of TLS implementations based on syntax mutation." PLOS ONE 17, no. 1 (January 24, 2022): e0262176. http://dx.doi.org/10.1371/journal.pone.0262176.
Повний текст джерелаPapp, Dorottya, Kristóf Tamás, and Levente Buttyán. "IoT Hacking – A Primer." Infocommunications journal, no. 2 (2019): 2–13. http://dx.doi.org/10.36244/icj.2019.2.1.
Повний текст джерелаWu, Zehui, Wenbin Zhang, Yunchao Wang, and Chenyu Yan. "Vulnerability Digging for Software-Defined Network Controller Using Event Flow Graph Analysis." Security and Communication Networks 2022 (June 24, 2022): 1–19. http://dx.doi.org/10.1155/2022/9642517.
Повний текст джерелаAzam, Naveed Ahmed. "A Novel Fuzzy Encryption Technique Based on Multiple Right Translated AES Gray S-Boxes and Phase Embedding." Security and Communication Networks 2017 (2017): 1–9. http://dx.doi.org/10.1155/2017/5790189.
Повний текст джерелаYun, Joobeom, Fayozbek Rustamov, Juhwan Kim, and Youngjoo Shin. "Fuzzing of Embedded Systems: A Survey." ACM Computing Surveys, July 28, 2022. http://dx.doi.org/10.1145/3538644.
Повний текст джерелаRen, Mengfei, Xiaolei Ren, Huadong Feng, Jiang Ming, and Yu Lei. "Security Analysis of Zigbee Protocol Implementation via Device-agnostic Fuzzing." Digital Threats: Research and Practice, September 14, 2022. http://dx.doi.org/10.1145/3551894.
Повний текст джерелаZhu, Xiaogang, Sheng Wen, Seyit Camtepe, and Yang Xiang. "Fuzzing: A Survey for Roadmap." ACM Computing Surveys, January 28, 2022. http://dx.doi.org/10.1145/3512345.
Повний текст джерелаKwon, Soonhong, Sang‐Jin Son, Yangseo Choi, and Jong‐Hyouk Lee. "Protocol fuzzing to find security vulnerabilities of RabbitMQ." Concurrency and Computation: Practice and Experience, September 14, 2020. http://dx.doi.org/10.1002/cpe.6012.
Повний текст джерелаLin, Pei-Yi, Chia-Wei Tien, Ting-Chun Huang, and Chin-Wei Tien. "ICPFuzzer: proprietary communication protocol fuzzing by using machine learning and feedback strategies." Cybersecurity 4, no. 1 (August 3, 2021). http://dx.doi.org/10.1186/s42400-021-00087-5.
Повний текст джерелаBlair, William, Andrea Mambretti, Sajjad Arshad, Michael Weissbacher, William Robertson, Engin Kirda, and Manuel Egele. "HotFuzz: Discovering Temporal and Spatial Denial-of-Service Vulnerabilities Through Guided Micro-Fuzzing." ACM Transactions on Privacy and Security, May 20, 2022. http://dx.doi.org/10.1145/3532184.
Повний текст джерела