Sorry, we do not have enough data to show an influence graph for this author.
The search for errors and vulnerabilities in operating systems, implementations of network protocols, and software products is an important task in information security. Fuzzing is currently one of the most popular approaches to searching for vulnerabilities. It can provide the highest degree of automation compared to other approaches and, thus, it is… (More)
A description has been provided for a formal model of cyber attack on virtualization tools that allow one to formulate condition for the security of virtualization tools. The concept of measuring the vulnerability of virtualization tools has been introduced that characterizes the predisposition of a system to vulnerabilities that contribute to the… (More)