Fuzzing technique and its usage in cybersecurity tasks

Збережено в:
Бібліографічні деталі
Дата:2022
Автори: O. O. Letychevskyi, V. S. Peschanenko, Ya. V. Hryniuk
Формат: Стаття
Мова:Англійська
Опубліковано: 2022
Назва видання:Cybernetics and Systems Analysis
Онлайн доступ:http://jnas.nbuv.gov.ua/article/UJRN-0001301517
Теги: Додати тег
Немає тегів, Будьте першим, хто поставить тег для цього запису!
Назва журналу:Library portal of National Academy of Sciences of Ukraine | LibNAS

Репозитарії

Library portal of National Academy of Sciences of Ukraine | LibNAS
_version_ 1859476682244620288
author O. O. Letychevskyi
V. S. Peschanenko
Ya. V. Hryniuk
author_facet O. O. Letychevskyi
V. S. Peschanenko
Ya. V. Hryniuk
author_sort O. O. Letychevskyi
collection Open-Science
first_indexed 2025-07-17T09:18:56Z
format Article
id open-sciencenbuvgovua-30
institution Library portal of National Academy of Sciences of Ukraine | LibNAS
language English
last_indexed 2025-07-17T09:18:56Z
publishDate 2022
record_format dspace
series Cybernetics and Systems Analysis
spelling open-sciencenbuvgovua-302023-09-12T17:59:40Z Fuzzing technique and its usage in cybersecurity tasks O. O. Letychevskyi V. S. Peschanenko Ya. V. Hryniuk 1019-5262 2022 en Cybernetics and Systems Analysis http://jnas.nbuv.gov.ua/article/UJRN-0001301517 Article
spellingShingle Cybernetics and Systems Analysis
O. O. Letychevskyi
V. S. Peschanenko
Ya. V. Hryniuk
Fuzzing technique and its usage in cybersecurity tasks
title Fuzzing technique and its usage in cybersecurity tasks
title_full Fuzzing technique and its usage in cybersecurity tasks
title_fullStr Fuzzing technique and its usage in cybersecurity tasks
title_full_unstemmed Fuzzing technique and its usage in cybersecurity tasks
title_short Fuzzing technique and its usage in cybersecurity tasks
title_sort fuzzing technique and its usage in cybersecurity tasks
url http://jnas.nbuv.gov.ua/article/UJRN-0001301517
work_keys_str_mv AT ooletychevskyi fuzzingtechniqueanditsusageincybersecuritytasks
AT vspeschanenko fuzzingtechniqueanditsusageincybersecuritytasks
AT yavhryniuk fuzzingtechniqueanditsusageincybersecuritytasks