您当前的位置:
首页 >
文章列表页 >
A Vulnerability Mining Method for the Internet of Things Driven by Pointer Analysis Technology
Network Communication and Information Security | 更新时间:2025-04-10
    • A Vulnerability Mining Method for the Internet of Things Driven by Pointer Analysis Technology

    • In the field of IoT vulnerability mining, experts have established an automated framework based on pointer analysis, significantly improving vulnerability detection rates and time efficiency.
    • Software Guide   Vol. 24, Issue 3, Pages: 109-118(2025)
    • DOI:10.11907/rjdk.241264    

      CLC: TP311
    • Received:13 March 2024

      Published:15 March 2025

    移动端阅览

  • SHI Qiliang,SHA Letian,PAN Jiaye.A Vulnerability Mining Method for the Internet of Things Driven by Pointer Analysis Technology[J].Software Guide,2025,24(03):109-118. DOI: 10.11907/rjdk.241264.

  •  
  •  

0

Views

0

下载量

0

CSCD

Alert me when the article has been cited
提交
Tools
Download
Export Citation
Share
Add to favorites
Add to my album

Related Articles

No data

Related Author

No data

Related Institution

No data
0