Author of the publication

Smart seed selection-based effective black box fuzzing for IIoT protocol.

, , , and . J. Supercomput., 76 (12): 10140-10154 (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Network Data Abstraction Method for Data Set Verification., , , and . STA, volume 186 of Communications in Computer and Information Science, page 54-62. Springer, (2011)Low Power Approximate Multiplier Using Error Tolerant Adder., and . ISOCC, page 298-299. IEEE, (2020)Compact Single-Ended Transceivers Demonstrating Flexible Generation of 1/N-Rate Receiver Front-Ends for Short-Reach Links., , , , , , , , and . IEEE Trans. Circuits Syst. I Regul. Pap., 71 (1): 373-382 (January 2024)Guest Editorial: Information and Communication Security in Multimedia Applications., and . Multimedia Tools Appl., 75 (22): 14503-14506 (2016)Automated Immunization Against Denial-of-Service Attacks Featuring Stochastic Packet Inspection., , and . GCC, volume 3795 of Lecture Notes in Computer Science, page 25-34. Springer, (2005)Visualization of network components for attack analysis., , , and . CICS, page 1-8. IEEE, (2009)Smart seed selection-based effective black box fuzzing for IIoT protocol., , , and . J. Supercomput., 76 (12): 10140-10154 (2020)A Regression Method to Compare Network Data and Modeling Data Using Generalized Additive Model., , , , , and . WISA, volume 5379 of Lecture Notes in Computer Science, page 190-200. Springer, (2008)A Layout Generator of Latch, Flip-Flop, and Shift Register for High-Speed Links., , , , and . ISOCC, page 19-20. IEEE, (2022)Study of fuzzy clustering methods for malicious codes using native API call frequency., , , and . CICS, page 24-29. IEEE, (2009)