Fuzzing technique and its usage in cybersecurity tasks
Saved in:
| Date: | 2022 |
|---|---|
| Main Authors: | O. O. Letychevskyi, V. S. Peschanenko, Ya. V. Hryniuk |
| Format: | Article |
| Language: | English |
| Published: |
2022
|
| Series: | Cybernetics and Systems Analysis |
| Online Access: | http://jnas.nbuv.gov.ua/article/UJRN-0001301517 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Journal Title: | Library portal of National Academy of Sciences of Ukraine | LibNAS |
Institution
Library portal of National Academy of Sciences of Ukraine | LibNASSimilar Items
-
Scientific principles of cybersecurity of critical infrastructure objects (transcript of the report at the meeting of the Presidium of NAS of Ukraine, February 9, 2022)
by: O. O. Letychevskyi
Published: (2022) -
Cybersecurity maturity models for cybersecurity assessment in critical infrastructure
by: Khudyntsev, Mykola M., et al.
Published: (2024) -
Usage of AI-planning techniques to solve problems of Web-services composition
by: O. V. Zakharova
Published: (2016) -
Usage of AI-planning techniques to solve problems of Web-services composition
by: Zakharova, O.V.
Published: (2018) -
Decentralized systems in logistics: usage overview and security issues
by: O. O. Letychevskyi, et al.
Published: (2020)