Modeling the search for vulnerabilities via the fuzzing method using an automation representation of network protocols
Crossref DOI link: https://doi.org/10.3103/S0146411615080325
Published Online: 2016-01-28
Published Print: 2015-12
Update policy: https://doi.org/10.1007/springer_crossmark_policy
Pechenkin, A. I.
Lavrova, D. S.
Text and Data Mining valid from 2015-12-01