Fuzzing Test Method Based on Constraint-Conditions Priority for LTE-EPC Protocol
暂无分享,去创建一个
[1] Zhang Yuqing. Bluetooth OBEX Vulnerability Discovery Technique Based on Fuzzing , 2008 .
[2] S. Kuball. How can Previous Component Use Contribute to Assessing the Use of COTS , 2007 .
[3] N. N. Barsoum,et al. IMPLEMENTATION OF TEMPERATURE SEQUENTIAL CONTROLLER ON VARIABLE SPEED DRIVE , 2008 .
[4] Michael R. Lyu,et al. RealProct: Reliable Protocol Conformance Testing with Real Nodes for Wireless Sensor Networks , 2011, 2011IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications.
[5] Biswajit Nandy,et al. Security advances and challenges in 4G wireless networks , 2010, 2010 Eighth International Conference on Privacy, Security and Trust.
[6] Ming Li,et al. Detection of LTE Protocol Based on Format Fuzz , 2015, 2015 10th International Conference on Broadband and Wireless Computing, Communication and Applications (BWCCA).
[7] Nuno Neves,et al. Fuzzing Wi-Fi Drivers to Locate Security Vulnerabilities , 2007 .