An Analysis of Network Protocol Vulnerability Mining Using Fuzz Testing Combined with Deep Learning Models
Y Ma, C Li, Y Wang, Y Wang - Journal of Electrical Systems, 2024 - search.proquest.com
The protection of industrialized management systems and related network protocols is
guaranteed by vulnerability mining innovation. The inadequate receiving efficiency and …
guaranteed by vulnerability mining innovation. The inadequate receiving efficiency and …