{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,4]],"date-time":"2026-03-04T16:44:54Z","timestamp":1772642694287,"version":"3.50.1"},"reference-count":31,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2025,10,27]],"date-time":"2025-10-27T00:00:00Z","timestamp":1761523200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,10,27]],"date-time":"2025-10-27T00:00:00Z","timestamp":1761523200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"name":"State Grid Zhejiang Electric Power Co., Ltd.","award":["5211DS240002"],"award-info":[{"award-number":["5211DS240002"]}]},{"name":"State Grid Zhejiang Electric Power Co., Ltd.","award":["5211DS240002"],"award-info":[{"award-number":["5211DS240002"]}]},{"name":"State Grid Zhejiang Electric Power Co., Ltd.","award":["5211DS240002"],"award-info":[{"award-number":["5211DS240002"]}]},{"name":"State Grid Zhejiang Electric Power Co., Ltd.","award":["5211DS240002"],"award-info":[{"award-number":["5211DS240002"]}]},{"name":"State Grid Zhejiang Electric Power Co., Ltd.","award":["5211DS240002"],"award-info":[{"award-number":["5211DS240002"]}]},{"name":"State Grid Zhejiang Electric Power Co., Ltd.","award":["5211DS240002"],"award-info":[{"award-number":["5211DS240002"]}]},{"name":"State Grid Zhejiang Electric Power Co., Ltd.","award":["5211DS240002"],"award-info":[{"award-number":["5211DS240002"]}]},{"name":"State Grid Zhejiang Electric Power Co., Ltd.","award":["5211DS240002"],"award-info":[{"award-number":["5211DS240002"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Netw Syst Manage"],"published-print":{"date-parts":[[2026,1]]},"DOI":"10.1007\/s10922-025-09991-4","type":"journal-article","created":{"date-parts":[[2025,10,27]],"date-time":"2025-10-27T04:50:40Z","timestamp":1761540640000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["OmniFuzz: A Multi-agent Reinforcement Learning Framework for Protocol-Aware Fuzzing in Power IoT Devices"],"prefix":"10.1007","volume":"34","author":[{"given":"Yubo","family":"Song","sequence":"first","affiliation":[]},{"given":"Weiwei","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Xin","family":"Sun","sequence":"additional","affiliation":[]},{"given":"Zhongyuan","family":"Qin","sequence":"additional","affiliation":[]},{"given":"Hua","family":"Dai","sequence":"additional","affiliation":[]},{"given":"Kanghui","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Bang","family":"Lv","sequence":"additional","affiliation":[]},{"given":"Jiaqi","family":"Chen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,10,27]]},"reference":[{"issue":"3","key":"9991_CR1","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1109\/MWC.001.1900318","volume":"27","author":"P Mishra","year":"2020","unstructured":"Mishra, P., Biswal, A., Garg, S., Lu, R., Tiwary, M., Puthal, D.: Software defined internet of things security: properties, state of the art, and future research. IEEE Wirel. Commun. 27(3), 10\u201316 (2020). https:\/\/doi.org\/10.1109\/MWC.001.1900318","journal-title":"IEEE Wirel. Commun."},{"key":"9991_CR2","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2019.105598","volume":"82","author":"L Liu","year":"2019","unstructured":"Liu, L., He, X., Liu, L., Qing, L., Fang, Y., Liu, J.: Capturing the symptoms of malicious code in electronic documents by file\u2019s entropy signal combined with machine learning. Appl. Soft Comput. 82, 105598 (2019)","journal-title":"Appl. Soft Comput."},{"key":"9991_CR3","doi-asserted-by":"crossref","unstructured":"Javaid, A., Niyaz, Q., Sun, W., Alam, M.: A deep learning approach for network intrusion detection system. In: Proceedings of the 9th EAI International Conference on Bio-inspired Information and Communications Technologies (formerly BIONETICS), pp. 21\u201326 (2016)","DOI":"10.4108\/eai.3-12-2015.2262516"},{"key":"9991_CR4","doi-asserted-by":"publisher","unstructured":"Liao, J.-W., Tsai, T.-T., He, C.-K., Tien, C.-W.: Soliaudit: Smart contract vulnerability assessment based on machine learning and fuzz testing. In: 2019 Sixth International Conference on Internet of Things: Systems, Management and Security (IOTSMS), pp. 458\u2013465 (2019). https:\/\/doi.org\/10.1109\/IOTSMS48152.2019.8939256","DOI":"10.1109\/IOTSMS48152.2019.8939256"},{"key":"9991_CR5","doi-asserted-by":"crossref","unstructured":"Liu, H., Cui, B., Xu, J., Niu, L.: An efficient cross-contract vulnerability detection model integrating machine learning and fuzz testing. In: International Conference on Emerging Internet, Data & Web Technologies, pp. 297\u2013306. Springer (2024)","DOI":"10.1007\/978-3-031-53555-0_28"},{"key":"9991_CR6","doi-asserted-by":"crossref","unstructured":"Cheng, H., Li, D., Zhao, M., Li, H., Wong, W.E.: A comprehensive review of learning-based fuzz testing techniques. In: 2024 10th International Symposium on System Security, Safety, and Reliability (ISSSR), pp. 150\u2013161. IEEE (2024)","DOI":"10.1109\/ISSSR61934.2024.00024"},{"key":"9991_CR7","volume-title":"Information Security and Cryptology - ICISC 2018","author":"M Sablotny","year":"2019","unstructured":"Sablotny, M., Jensen, B.S., Johnson, C.W.: Recurrent neural networks for fuzz testing web browsers. In: Lee, K. (ed.) Information Security and Cryptology - ICISC 2018. Springer, Berlin (2019)"},{"key":"9991_CR8","unstructured":"Zong, P., Lv, T., Wang, D., Deng, Z., Liang, R., Chen, K.: FuzzGuard: Filtering out unreachable inputs in directed grey-box fuzzing through deep learning. In: 29th USENIX Security Symposium (USENIX Security 20), pp. 2255\u20132269. USENIX Association, (2020). https:\/\/www.usenix.org\/conference\/usenixsecurity20\/presentation\/zong"},{"key":"9991_CR9","doi-asserted-by":"publisher","unstructured":"Tang, J., Shuang, W.: Fuzz testing method based on deep learning. In: 2024 6th International Conference on Internet of Things, Automation and Artificial Intelligence (IoTAAI), pp. 627\u2013630 (2024). https:\/\/doi.org\/10.1109\/IoTAAI62601.2024.10692558","DOI":"10.1109\/IoTAAI62601.2024.10692558"},{"key":"9991_CR10","doi-asserted-by":"publisher","unstructured":"Yu, H., Li, X., Du, Y.: Deep learning fuzz testing methods for unstructured case. In: 2022 IEEE 22nd International Conference on Software Quality, Reliability, and Security Companion (QRS-C), pp. 772\u2013773 (2022). https:\/\/doi.org\/10.1109\/QRS-C57518.2022.00128","DOI":"10.1109\/QRS-C57518.2022.00128"},{"key":"9991_CR11","doi-asserted-by":"crossref","unstructured":"Scott, J., Sudula, T., Rehman, H., Mora, F., Ganesh, V.: Banditfuzz: fuzzing smt solvers with multi-agent reinforcement learning. In: International Symposium on Formal Methods, pp. 103\u2013121. Springer (2021)","DOI":"10.1007\/978-3-030-90870-6_6"},{"key":"9991_CR12","doi-asserted-by":"publisher","unstructured":"Paduraru, C., Paduraru, M., Stefanescu, A.: Riverfuzzrl - an open-source tool to experiment with reinforcement learning for fuzzing. In: 2021 14th IEEE Conference on Software Testing, Verification and Validation (ICST), pp. 430\u2013435 (2021). https:\/\/doi.org\/10.1109\/ICST49551.2021.00055","DOI":"10.1109\/ICST49551.2021.00055"},{"key":"9991_CR13","doi-asserted-by":"crossref","unstructured":"Li, X., Liu, X., Chen, L., Prajapati, R., Wu, D.: Fuzzboost: Reinforcement compiler fuzzing. In: International Conference on Information and Communications Security, pp. 359\u2013375. Springer (2022)","DOI":"10.1007\/978-3-031-15777-6_20"},{"key":"9991_CR14","doi-asserted-by":"publisher","first-page":"2048","DOI":"10.1109\/ACCESS.2022.3233875","volume":"11","author":"G Choi","year":"2023","unstructured":"Choi, G., Jeon, S., Cho, J., Moon, J.: A seed scheduling method with a reinforcement learning for a coverage guided fuzzing. IEEE Access 11, 2048\u20132057 (2023). https:\/\/doi.org\/10.1109\/ACCESS.2022.3233875","journal-title":"IEEE Access"},{"key":"9991_CR15","unstructured":"Drozd, W., Wagner, M.D.: FuzzerGym: A Competitive Framework for Fuzzing and Learning (2018). arXiv:1807.07490"},{"key":"9991_CR16","doi-asserted-by":"publisher","unstructured":"Li, M., Zhu, H., Zhang, H., Liu, J.: Afl-rl: A reinforcement learning based mutation scheduling optimization method for fuzzing. In: Proceedings of the 2023 7th International Conference on High Performance Compilation, Computing and Communications. HP3C \u201923, pp. 46\u201355. Association for Computing Machinery, New York, NY, USA (2023). https:\/\/doi.org\/10.1145\/3606043.3606050","DOI":"10.1145\/3606043.3606050"},{"issue":"4","key":"9991_CR17","doi-asserted-by":"publisher","first-page":"2482","DOI":"10.3390\/app13042482","volume":"13","author":"X Song","year":"2023","unstructured":"Song, X., Zhang, R., Dong, Q., Cui, B.: Grey-box fuzzing based on reinforcement learning for xss vulnerabilities. Appl. Sci. 13(4), 2482 (2023). https:\/\/doi.org\/10.3390\/app13042482","journal-title":"Appl. Sci."},{"key":"9991_CR18","doi-asserted-by":"crossref","unstructured":"Binosi, L., Rullo, L., Polino, M., Carminati, M., Zanero, S., et al.: Rainfuzz: Reinforcement-learning driven heat-maps for boosting coverage-guided fuzzing. In: ICPRAM, pp. 39\u201350 (2023)","DOI":"10.5220\/0011625300003411"},{"key":"9991_CR19","unstructured":"Sablotny, M., Jensen, B.S., Singer, J.: Reinforcement learning guided fuzz testing for a browser\u2019s HTML rendering engine (2023). arXiv:2307.14556"},{"key":"9991_CR20","doi-asserted-by":"crossref","unstructured":"Liu, R., Cui, B., Chen, C., Ma, J.: Xrlfuzz: Fuzzing binaries guided by format information based on deep reinforcement learning. In: International Conference on Emerging Internet, Data & Web Technologies, pp. 307\u2013317. Springer (2024)","DOI":"10.1007\/978-3-031-53555-0_29"},{"key":"9991_CR21","unstructured":"Common security technical requirements and test specifications for application software system. Technical Report Q\/GDW 10597-2022, State Grid Corporation of China, Beijing (2022)"},{"key":"9991_CR22","unstructured":"Devarajan, G.: Unraveling scada protocols: Using sulley fuzzer. In: Defon 15 Hacking Conference (2007)"},{"key":"9991_CR23","doi-asserted-by":"crossref","unstructured":"Lemieux, C., Sen, K.: Fairfuzz: A targeted mutation strategy for increasing greybox fuzz testing coverage. In: Proceedings of the 33rd ACM\/IEEE International Conference on Automated Software Engineering, pp. 475\u2013485 (2018)","DOI":"10.1145\/3238147.3238176"},{"key":"9991_CR24","unstructured":"Fioraldi, A., Maier, D., Ei\u00dffeldt, H., Heuse, M.: $$\\{$$AFL++$$\\}$$: Combining incremental steps of fuzzing research. In: 14th USENIX Workshop on Offensive Technologies (WOOT 20) (2020)"},{"issue":"1","key":"9991_CR25","first-page":"50","volume":"57","author":"Y Shengwei","year":"2017","unstructured":"Shengwei, Y., Chongbin, Z., Feng, X., Qi, X., Chong, X., Lulu, L.: Security analysis of industrial control network protocols based on peach. J. Tsinghua Univ. (Sci. Technol.) 57(1), 50\u201354 (2017)","journal-title":"J. Tsinghua Univ. (Sci. Technol.)"},{"key":"9991_CR26","doi-asserted-by":"crossref","unstructured":"Zhao, H., Li, Z., Wei, H., Shi, J., Huang, Y.: Seqfuzzer: An industrial protocol fuzzing framework from a deep learning perspective. In: 2019 12th IEEE Conference on Software Testing, Validation and Verification (ICST), pp. 59\u201367. IEEE (2019)","DOI":"10.1109\/ICST.2019.00016"},{"key":"9991_CR27","doi-asserted-by":"crossref","unstructured":"Liu, X., Li, X., Prajapati, R., Wu, D.: Deepfuzz: Automatic generation of syntax valid c programs for fuzz testing. In: Proceedings of the AAAI Conference on Artificial Intelligence, vol. 33, pp. 1044\u20131051 (2019)","DOI":"10.1609\/aaai.v33i01.33011044"},{"key":"9991_CR28","doi-asserted-by":"crossref","unstructured":"Zhou, X., Li, L., Dong, D., Liu, Y., Chen, Y., Zhao, W.X., Yu, D., Wu, H.: Multi-turn response selection for chatbots with deep attention matching network. In: Proceedings of the 56th Annual Meeting of the Association for Computational Linguistics (Volume 1: Long Papers), pp. 1118\u20131127 (2018)","DOI":"10.18653\/v1\/P18-1103"},{"key":"9991_CR29","doi-asserted-by":"crossref","unstructured":"Thom\u00e9, J., Gorla, A., Zeller, A.: Search-based security testing of web applications. In: Proceedings of the 7th International Workshop on Search-based Software Testing, pp. 5\u201314 (2014)","DOI":"10.1145\/2593833.2593835"},{"key":"9991_CR30","doi-asserted-by":"crossref","unstructured":"Bozic, J., Garn, B., Simos, D.E., Wotawa, F.: Evaluation of the ipo-family algorithms for test case generation in web security testing. In: 2015 IEEE Eighth International Conference on Software Testing, Verification and Validation Workshops (ICSTW), pp. 1\u201310. IEEE (2015)","DOI":"10.1109\/ICSTW.2015.7107436"},{"key":"9991_CR31","doi-asserted-by":"crossref","unstructured":"Liu, M., Li, K., Chen, T.: Deepsqli: Deep semantic learning for testing sql injection. In: Proceedings of the 29th ACM SIGSOFT International Symposium on Software Testing and Analysis, pp. 286\u2013297 (2020)","DOI":"10.1145\/3395363.3397375"}],"container-title":["Journal of Network and Systems Management"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10922-025-09991-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10922-025-09991-4","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10922-025-09991-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T03:13:32Z","timestamp":1769915612000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10922-025-09991-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,27]]},"references-count":31,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2026,1]]}},"alternative-id":["9991"],"URL":"https:\/\/doi.org\/10.1007\/s10922-025-09991-4","relation":{},"ISSN":["1064-7570","1573-7705"],"issn-type":[{"value":"1064-7570","type":"print"},{"value":"1573-7705","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,10,27]]},"assertion":[{"value":"17 May 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 September 2025","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 October 2025","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 October 2025","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no Conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"15"}}