Photo from wikipedia
Sign Up to like & get
recommendations!
0
Published in 2020 at "Wireless Personal Communications"
DOI: 10.1007/s11277-020-07808-y
Abstract: Attacks from network applications establish considerable security threats for computer networks and end users. Existing cyber-attack detection methods are designed primarily in signature-based approaches that can not recognize zero-day vulnerabilities. In addition, with the minimum…
read more here.
Keywords:
system;
network;
wireless;
approach ... See more keywords
Sign Up to like & get
recommendations!
2
Published in 2022 at "IEEE Access"
DOI: 10.1109/access.2022.3177272
Abstract: Traffic detection has attracted much attention in recent years, playing an essential role in intrusion detection systems (IDS). This paper proposes a new approach for traffic detection at the packet level, inspired by natural language…
read more here.
Keywords:
day attack;
traffic;
zero day;
detection ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2022 at "IEEE Access"
DOI: 10.1109/access.2022.3206367
Abstract: The fast expansion of the Internet of Things (IoT) in the technology and communication industries necessitates a continuously updated cyber-security mechanism to keep protecting the systems’ users from any possible attack that might target their…
read more here.
Keywords:
network;
regularization;
service;
detection ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
2
Published in 2023 at "IEEE Network"
DOI: 10.1109/mnet.018.2200349
Abstract: Smart community networks bring great comfort and convenience for people, but also increase security risks of exposing system vulnerabilities and private data to network intruders. This problem has become more prominent as the ever-increasing zero-day…
read more here.
Keywords:
intrusion detection;
zero day;
detection;
day attacks ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2023 at "IEEE Transactions on Emerging Topics in Computing"
DOI: 10.1109/tetc.2022.3170544
Abstract: Zero-day malicious software (malware) refers to a previously unknown or newly discovered software vulnerability. The fundamental objective of this paper is to enhance detection for analogous zero-day malware by efficient learning to plausible generated data.…
read more here.
Keywords:
malware;
day malware;
zero day;
gan ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
0
Published in 2018 at "IEEE Transactions on Information Forensics and Security"
DOI: 10.1109/tifs.2018.2821095
Abstract: Enforcing a variety of security measures (such as intrusion detection systems, and so on) can provide a certain level of protection to computer networks. However, such security practices often fall short in face of zero-day…
read more here.
Keywords:
attack paths;
attack path;
day attack;
day ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2019 at "ANZ Journal of Surgery"
DOI: 10.1111/ans.15304
Abstract: Hepatectomy has been the gold standard procedure for curative treatment of benign and malignant hepatobiliary lesions for over a century. The aim of this study is to report on the 16‐year experience of a single…
read more here.
Keywords:
year;
towards near;
day mortality;
progress towards ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2022 at "Computational Intelligence and Neuroscience"
DOI: 10.1155/2022/1615528
Abstract: For the enormous growth and the hysterical impact of undocumented malicious software, otherwise known as Zero-Day malware, specialized practices were joined to implement systems capable of detecting these kinds of software to avert possible disastrous…
read more here.
Keywords:
day;
zevigilante detecting;
machine learning;
day malware ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2018 at "International Journal of Integrated Engineering"
DOI: 10.30880/ijie.2018.10.06.011
Abstract: Crypto-ransomware employs the cryptography to lock user personal files and demands ransom to release them. By utilizing several technological utilities like cyber-currency and cloud-based developing platforms, crypto-ransomware has gained high popularity among adversaries. Motivated by…
read more here.
Keywords:
detection;
crypto ransomware;
model;
rate ... See more keywords