4   Artículos

« Anterior     Página: 1 de 1     Siguiente »

 
en línea
Miao Yu, Jianwei Zhuge, Ming Cao, Zhiwei Shi and Lin Jiang    
With the prosperity of the Internet of Things (IoT) industry environment, the variety and quantity of IoT devices have grown rapidly. IoT devices have been widely used in smart homes, smart wear, smart manufacturing, smart cars, smart medical care, and m... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Zehan Chen, Yuliang Lu, Kailong Zhu, Lu Yu and Jiazhen Zhao    
Fuzzing is one of the most successful software testing techniques used to discover vulnerabilities in programs. Without seeds that fit the input format, existing runtime dependency recognition strategies are limited by incompleteness and high overhead. I... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Xinglu He, Pengfei Wang, Kai Lu and Xu Zhou    
A multi-priority scheduling path exploration technology based on abstract syntax tree analysis.
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Milad Memarzadeh, Ata Akbari Asanjan and Bryan Matthews    
Identifying safety anomalies and vulnerabilities in the aviation domain is a very expensive and time-consuming task. Currently, it is accomplished via manual forensic reviews by subject matter experts (SMEs). However, with the increase in the amount of d... ver más
Revista: Aerospace    Formato: Electrónico

« Anterior     Página: 1 de 1     Siguiente »