Zeitschriftenartikel zum Thema „Model fuzzing“
Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an
Machen Sie sich mit Top-50 Zeitschriftenartikel für die Forschung zum Thema "Model fuzzing" bekannt.
Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.
Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.
Sehen Sie die Zeitschriftenartikel für verschiedene Spezialgebieten durch und erstellen Sie Ihre Bibliographie auf korrekte Weise.
Pan, Yan, Wei Lin, Liang Jiao, and Yuefei Zhu. "Model-Based Grey-Box Fuzzing of Network Protocols." Security and Communication Networks 2022 (May 5, 2022): 1–13. http://dx.doi.org/10.1155/2022/6880677.
Der volle Inhalt der QuelleYang, Yixiao. "Improve Model Testing by Integrating Bounded Model Checking and Coverage Guided Fuzzing." Electronics 12, no. 7 (2023): 1573. http://dx.doi.org/10.3390/electronics12071573.
Der volle Inhalt der QuelleZhang, Yifan, Kailong Zhu, Jie Peng, Yuliang Lu, Qian Chen, and Zixiong Li. "StatePre: A Large Language Model-Based State-Handling Method for Network Protocol Fuzzing." Electronics 14, no. 10 (2025): 1931. https://doi.org/10.3390/electronics14101931.
Der volle Inhalt der QuelleLin, Mingmin, Yingpei Zeng, and Yang Li. "RegFuzz: A Linear Regression-Based Approach for Seed Scheduling in Directed Fuzzing." Electronics 12, no. 17 (2023): 3650. http://dx.doi.org/10.3390/electronics12173650.
Der volle Inhalt der QuelleZhu, Xue Yong, and Zhi Yong Wu. "A New Fuzzing Technique Using Niche Genetic Algorithm." Advanced Materials Research 756-759 (September 2013): 4050–58. http://dx.doi.org/10.4028/www.scientific.net/amr.756-759.4050.
Der volle Inhalt der QuelleCheng, Mingjie, Kailong Zhu, Yuanchao Chen, Yuliang Lu, Chiyu Chen, and Jiayi Yu. "Reinforcement Learning-Based Multi-Phase Seed Scheduling for Network Protocol Fuzzing." Electronics 13, no. 24 (2024): 4962. https://doi.org/10.3390/electronics13244962.
Der volle Inhalt der QuelleWang, Yunzhi, and Yufeng Li. "DCGFuzz: An Embedded Firmware Security Analysis Method with Dynamically Co-Directional Guidance Fuzzing." Electronics 13, no. 8 (2024): 1433. http://dx.doi.org/10.3390/electronics13081433.
Der volle Inhalt der QuelleXie, Yuchong, Wenhui Zhang, and Dongdong She. "ZTaint-Havoc: From Havoc Mode to Zero-Execution Fuzzing-Driven Taint Inference." Proceedings of the ACM on Software Engineering 2, ISSTA (2025): 917–39. https://doi.org/10.1145/3728916.
Der volle Inhalt der QuelleMuduli, Sujit Kumar, and Subhajit Roy. "Satisfiability modulo fuzzing: a synergistic combination of SMT solving and fuzzing." Proceedings of the ACM on Programming Languages 6, OOPSLA2 (2022): 1236–63. http://dx.doi.org/10.1145/3563332.
Der volle Inhalt der QuelleBöhme, Marcel, Valentin J. M. Manès, and Sang Kil Cha. "Boosting Fuzzer Efficiency: An Information Theoretic Perspective." Communications of the ACM 66, no. 11 (2023): 89–97. http://dx.doi.org/10.1145/3611019.
Der volle Inhalt der QuelleDu, Chunlai, Zhijian Cui, Yanhui Guo, Guizhi Xu, and Zhongru Wang. "MemConFuzz: Memory Consumption Guided Fuzzing with Data Flow Analysis." Mathematics 11, no. 5 (2023): 1222. http://dx.doi.org/10.3390/math11051222.
Der volle Inhalt der QuelleChen, Juxing, Yuanchao Chen, Zulie Pan, et al. "DynER: Optimized Test Case Generation for Representational State Transfer (REST)ful Application Programming Interface (API) Fuzzers Guided by Dynamic Error Responses." Electronics 13, no. 17 (2024): 3476. http://dx.doi.org/10.3390/electronics13173476.
Der volle Inhalt der QuelleLi, Xiaoting, Xiao Liu, Lingwei Chen, Rupesh Prajapati, and Dinghao Wu. "ALPHAPROG: Reinforcement Generation of Valid Programs for Compiler Fuzzing." Proceedings of the AAAI Conference on Artificial Intelligence 36, no. 11 (2022): 12559–65. http://dx.doi.org/10.1609/aaai.v36i11.21527.
Der volle Inhalt der QuelleKim, Minho, Seongbin Park, Jino Yoon, Minsoo Kim, and Bong-Nam Noh. "File Analysis Data Auto-Creation Model For Peach Fuzzing." Journal of the Korea Institute of Information Security and Cryptology 24, no. 2 (2014): 327–33. http://dx.doi.org/10.13089/jkiisc.2014.24.2.327.
Der volle Inhalt der QuelleTeplyuk, Pavel A., and Alexey G. Yakunin. "Methodology for fuzzing Linux kernel system calls using large language models." Proceedings of Tomsk State University of Control Systems and Radioelectronics 27, no. 3 (2024): 85–91. https://doi.org/10.21293/1818-0442-2024-27-3-85-91.
Der volle Inhalt der QuelleDu, Chunlai, Yanhui Guo, Yifan Feng, and Shijie Zheng. "HotCFuzz: Enhancing Vulnerability Detection through Fuzzing and Hotspot Code Coverage Analysis." Electronics 13, no. 10 (2024): 1909. http://dx.doi.org/10.3390/electronics13101909.
Der volle Inhalt der QuelleXu, Haoran, Yongjun Wang, Zhiyuan Jiang, Shuhui Fan, Shaojing Fu, and Peidai Xie. "Fuzzing JavaScript engines with a syntax-aware neural program model." Computers & Security 144 (September 2024): 103947. http://dx.doi.org/10.1016/j.cose.2024.103947.
Der volle Inhalt der QuelleZhang, Zhiyu, Longxing Li, Ruigang Liang, and Kai Chen. "Unlocking Low Frequency Syscalls in Kernel Fuzzing with Dependency-Based RAG." Proceedings of the ACM on Software Engineering 2, ISSTA (2025): 848–70. https://doi.org/10.1145/3728913.
Der volle Inhalt der QuelleLiu, Yuying, Pin Yang, Peng Jia, Ziheng He, and Hairu Luo. "MalFuzz: Coverage-guided fuzzing on deep learning-based malware classification model." PLOS ONE 17, no. 9 (2022): e0273804. http://dx.doi.org/10.1371/journal.pone.0273804.
Der volle Inhalt der QuelleKlimis, Vasileios, Jack Clark, Alan Baker, David Neto, John Wickerson, and Alastair F. Donaldson. "Taking Back Control in an Intermediate Representation for GPU Computing." Proceedings of the ACM on Programming Languages 7, POPL (2023): 1740–69. http://dx.doi.org/10.1145/3571253.
Der volle Inhalt der QuelleBorcherding, Anne, Martin Morawetz, and Steffen Pfrang. "Smarter Evolution: Enhancing Evolutionary Black Box Fuzzing with Adaptive Models." Sensors 23, no. 18 (2023): 7864. http://dx.doi.org/10.3390/s23187864.
Der volle Inhalt der QuelleSong, Guang Jun, Chun Lan Zhao, and Ming Li. "Study on Software Vulnerability Dynamic Discovering System." Applied Mechanics and Materials 151 (January 2012): 673–77. http://dx.doi.org/10.4028/www.scientific.net/amm.151.673.
Der volle Inhalt der QuelleGuan, Quan Long, Guo Xiang Yao, Kai Bin Ni, and Mei Xiu Zhou. "Research on Fuzzing Test Data Engine for Web Vulnerability." Advanced Materials Research 211-212 (February 2011): 500–504. http://dx.doi.org/10.4028/www.scientific.net/amr.211-212.500.
Der volle Inhalt der QuelleZong, Xuejun, Wenjie Luo, Bowei Ning, Kan He, Lian Lian, and Yifei Sun. "DiffusionFuzz: Fuzzing Framework of Industrial Control Protocols Based on Denoising Diffusion Probabilistic Model." IEEE Access 12 (2024): 67795–808. http://dx.doi.org/10.1109/access.2024.3399820.
Der volle Inhalt der QuelleZeng, Yingpei, Mingmin Lin, Shanqing Guo, et al. "MultiFuzz: A Coverage-Based Multiparty-Protocol Fuzzer for IoT Publish/Subscribe Protocols." Sensors 20, no. 18 (2020): 5194. http://dx.doi.org/10.3390/s20185194.
Der volle Inhalt der QuelleGao, Sudi, Yueying Luo, and Tan Yang. "Research on River Water Environmental Capacity Based on Triangular Fuzzy Technology." E3S Web of Conferences 236 (2021): 03018. http://dx.doi.org/10.1051/e3sconf/202123603018.
Der volle Inhalt der QuelleSong, Xuyan, Ruxian Zhang, Qingqing Dong, and Baojiang Cui. "Grey-Box Fuzzing Based on Reinforcement Learning for XSS Vulnerabilities." Applied Sciences 13, no. 4 (2023): 2482. http://dx.doi.org/10.3390/app13042482.
Der volle Inhalt der QuelleOkokpujie, Kennedy, Grace Chinyere Kennedy, Vingi Patrick Nzanzu, Mbasa Joaquim Molo, Emmanuel Adetiba, and Joke Badejo. "ANOMALY-BASED INTRUSION DETECTION FOR A VEHICLE CAN BUS: A CASE FOR HYUNDAI AVANTE CN7." Journal of Southwest Jiaotong University 56, no. 5 (2021): 144–56. http://dx.doi.org/10.35741/issn.0258-2724.56.5.14.
Der volle Inhalt der QuelleBrooker, Marc, and Ankush Desai. "Systems Correctness Practices at AWS." Queue 22, no. 6 (2024): 79–96. https://doi.org/10.1145/3712057.
Der volle Inhalt der QuelleDong, Guofang, Pu Sun, Wenbo Shi, and Chang Choi. "A novel valuation pruning optimization fuzzing test model based on mutation tree for industrial control systems." Applied Soft Computing 70 (September 2018): 896–902. http://dx.doi.org/10.1016/j.asoc.2018.02.036.
Der volle Inhalt der QuelleSong, Yahui, Xiang Gao, Wenhua Li, Wei-Ngan Chin, and Abhik Roychoudhury. "ProveNFix: Temporal Property-Guided Program Repair." Proceedings of the ACM on Software Engineering 1, FSE (2024): 226–48. http://dx.doi.org/10.1145/3643737.
Der volle Inhalt der QuelleDai, Xinghua, Shengrong Gong, Shan Zhong, and Zongming Bao. "Bilinear CNN Model for Fine-Grained Classification Based on Subcategory-Similarity Measurement." Applied Sciences 9, no. 2 (2019): 301. http://dx.doi.org/10.3390/app9020301.
Der volle Inhalt der QuelleWang, Xiandong, Jianmin He, and Shouwei Li. "Compound Option Pricing under Fuzzy Environment." Journal of Applied Mathematics 2014 (2014): 1–9. http://dx.doi.org/10.1155/2014/875319.
Der volle Inhalt der QuelleNayak, Prerana, Vanditha M, and Sanjay Tippannavar. "Smart Intrusion Detection System for CAN Network Implemented using LSTM Strategy." International Journal of Innovative Research in Advanced Engineering 10, no. 03 (2023): 98–105. http://dx.doi.org/10.26562/ijirae.2023.v1003.08.
Der volle Inhalt der QuelleKim, Taeguen, Jiyoon Kim, and Ilsun You. "An Anomaly Detection Method Based on Multiple LSTM-Autoencoder Models for In-Vehicle Network." Electronics 12, no. 17 (2023): 3543. http://dx.doi.org/10.3390/electronics12173543.
Der volle Inhalt der QuelleLiu, Xiao, Xiaoting Li, Rupesh Prajapati, and Dinghao Wu. "DeepFuzz: Automatic Generation of Syntax Valid C Programs for Fuzz Testing." Proceedings of the AAAI Conference on Artificial Intelligence 33 (July 17, 2019): 1044–51. http://dx.doi.org/10.1609/aaai.v33i01.33011044.
Der volle Inhalt der QuelleWang, Enze, Wei Xie, Shuhuan Li, et al. "Large Language Model-Powered Protected Interface Evasion: Automated Discovery of Broken Access Control Vulnerabilities in Internet of Things Devices." Sensors 25, no. 9 (2025): 2913. https://doi.org/10.3390/s25092913.
Der volle Inhalt der QuelleAhmadi-Pour, Sallar, Mathis Logemann, Vladimir Herdt, and Rolf Drechsler. "Synergistic Verification of Hardware Peripherals through Virtual Prototype Aided Cross-Level Methodology Leveraging Coverage-Guided Fuzzing and Co-Simulation." Chips 2, no. 3 (2023): 195–208. http://dx.doi.org/10.3390/chips2030012.
Der volle Inhalt der QuelleSu, Xing, Hanzhong Liang, Hao Wu, Ben Niu, Fengyuan Xu, and Sheng Zhong. "DiSCo: Towards Decompiling EVM Bytecode to Source Code using Large Language Models." Proceedings of the ACM on Software Engineering 2, FSE (2025): 2311–34. https://doi.org/10.1145/3729373.
Der volle Inhalt der QuelleBasavaraj, Dheeraj, and Shahab Tayeb. "Towards a Lightweight Intrusion Detection Framework for In-Vehicle Networks." Journal of Sensor and Actuator Networks 11, no. 1 (2022): 6. http://dx.doi.org/10.3390/jsan11010006.
Der volle Inhalt der QuelleSharkov, Ivan Vladimirovich. "Protocol automata recovery method using binary code." Proceedings of the Institute for System Programming of the RAS 34, no. 5 (2022): 43–62. http://dx.doi.org/10.15514/ispras-2022-34(5)-3.
Der volle Inhalt der QuelleWang, Ziqi, Debao Bu, Weihan Tian, and Baojiang Cui. "Analyzing and Discovering Spatial Algorithm Complexity Vulnerabilities in Recursion." Applied Sciences 14, no. 5 (2024): 1855. http://dx.doi.org/10.3390/app14051855.
Der volle Inhalt der QuelleHajar Halili, Siti, Norharyanti Mohsin, Zamzami Zainuddin, Juliana Othman, and Shukri Sulaiman. "Designing the open-badges guideline based on the fuzzy Delphi method." Edelweiss Applied Science and Technology 8, no. 4 (2024): 1841–55. http://dx.doi.org/10.55214/25768484.v8i4.1556.
Der volle Inhalt der QuelleChen, Fan, Gengsheng He, Shun Dong, et al. "Space-Time Effect Prediction of Blasting Vibration Based on Intelligent Automatic Blasting Vibration Monitoring System." Applied Sciences 12, no. 1 (2021): 12. http://dx.doi.org/10.3390/app12010012.
Der volle Inhalt der QuelleDraissi, Oussama, Tobias Cloosters, David Klein, et al. "Wemby’s Web: Hunting for Memory Corruption in WebAssembly." Proceedings of the ACM on Software Engineering 2, ISSTA (2025): 1326–49. https://doi.org/10.1145/3728937.
Der volle Inhalt der QuelleZhang, Yujian, and Daifu Liu. "Toward Vulnerability Detection for Ethereum Smart Contracts Using Graph-Matching Network." Future Internet 14, no. 11 (2022): 326. http://dx.doi.org/10.3390/fi14110326.
Der volle Inhalt der QuellePandhare, Harshad Vijay. "From Test Case Design to Test Data Generation: How AI is Redefining QA Processes." International Journal of Engineering and Computer Science 13, no. 12 (2024): 26737–57. https://doi.org/10.18535/ijecs.v13i12.4956.
Der volle Inhalt der QuelleTereshchenko, Oleksandr I. "Integration of NLP and machine learning methods for smart contract security: a comparison with traditional approaches." Informatics. Culture. Technology 1, no. 1 (2024): 207–11. http://dx.doi.org/10.15276/ict.01.2024.31.
Der volle Inhalt der QuelleGuan, Hao, Guangdong Bai, and Yepang Liu. "CrossProbe: LLM-Empowered Cross-Project Bug Detection for Deep Learning Frameworks." Proceedings of the ACM on Software Engineering 2, ISSTA (2025): 2430–52. https://doi.org/10.1145/3728984.
Der volle Inhalt der QuelleCheng, Mingjie, Kailong Zhu, Yuanchao Chen, Guozheng Yang, Yuliang Lu, and Canju Lu. "MSFuzz: Augmenting Protocol Fuzzing with Message Syntax Comprehension via Large Language Models." Electronics 13, no. 13 (2024): 2632. http://dx.doi.org/10.3390/electronics13132632.
Der volle Inhalt der Quelle