Articles with "zero day" as a keyword



Photo from wikipedia

An Efficient Hybrid Evolutionary Approach for Identification of Zero-Day Attacks on Wired/Wireless Network System

Sign Up to like & get
recommendations!
Published in 2020 at "Wireless Personal Communications"

DOI: 10.1007/s11277-020-07808-y

Abstract: Attacks from network applications establish considerable security threats for computer networks and end users. Existing cyber-attack detection methods are designed primarily in signature-based approaches that can not recognize zero-day vulnerabilities. In addition, with the minimum… read more here.

Keywords: system; network; wireless; approach ... See more keywords
Photo by gcalebjones from unsplash

SimCSE for Encrypted Traffic Detection and Zero-Day Attack Detection

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Access"

DOI: 10.1109/access.2022.3177272

Abstract: Traffic detection has attracted much attention in recent years, playing an essential role in intrusion detection systems (IDS). This paper proposes a new approach for traffic detection at the packet level, inspired by natural language… read more here.

Keywords: day attack; traffic; zero day; detection ... See more keywords
Photo by dulhiier from unsplash

Anomaly Detection Based on CNN and Regularization Techniques Against Zero-Day Attacks in IoT Networks

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Access"

DOI: 10.1109/access.2022.3206367

Abstract: The fast expansion of the Internet of Things (IoT) in the technology and communication industries necessitates a continuously updated cyber-security mechanism to keep protecting the systems’ users from any possible attack that might target their… read more here.

Keywords: network; regularization; service; detection ... See more keywords
Photo from wikipedia

Federated Incremental Learning based Evolvable Intrusion Detection System for Zero-Day Attacks

Sign Up to like & get
recommendations!
Published in 2023 at "IEEE Network"

DOI: 10.1109/mnet.018.2200349

Abstract: Smart community networks bring great comfort and convenience for people, but also increase security risks of exposing system vulnerabilities and private data to network intruders. This problem has become more prominent as the ever-increasing zero-day… read more here.

Keywords: intrusion detection; zero day; detection; day attacks ... See more keywords
Photo by gcalebjones from unsplash

PlausMal-GAN: Plausible Malware Training Based on Generative Adversarial Networks for Analogous Zero-Day Malware Detection

Sign Up to like & get
recommendations!
Published in 2023 at "IEEE Transactions on Emerging Topics in Computing"

DOI: 10.1109/tetc.2022.3170544

Abstract: Zero-day malicious software (malware) refers to a previously unknown or newly discovered software vulnerability. The fundamental objective of this paper is to enhance detection for analogous zero-day malware by efficient learning to plausible generated data.… read more here.

Keywords: malware; day malware; zero day; gan ... See more keywords
Photo from wikipedia

Using Bayesian Networks for Probabilistic Identification of Zero-Day Attack Paths

Sign Up to like & get
recommendations!
Published in 2018 at "IEEE Transactions on Information Forensics and Security"

DOI: 10.1109/tifs.2018.2821095

Abstract: Enforcing a variety of security measures (such as intrusion detection systems, and so on) can provide a certain level of protection to computer networks. However, such security practices often fall short in face of zero-day… read more here.

Keywords: attack paths; attack path; day attack; day ... See more keywords
Photo by impulsq from unsplash

Progress towards near‐zero 90‐day mortality: 388 consecutive hepatectomies over a 16‐year period

Sign Up to like & get
recommendations!
Published in 2019 at "ANZ Journal of Surgery"

DOI: 10.1111/ans.15304

Abstract: Hepatectomy has been the gold standard procedure for curative treatment of benign and malignant hepatobiliary lesions for over a century. The aim of this study is to report on the 16‐year experience of a single… read more here.

Keywords: year; towards near; day mortality; progress towards ... See more keywords
Photo by cokdewisnu from unsplash

ZeVigilante: Detecting Zero-Day Malware Using Machine Learning and Sandboxing Analysis Techniques

Sign Up to like & get
recommendations!
Published in 2022 at "Computational Intelligence and Neuroscience"

DOI: 10.1155/2022/1615528

Abstract: For the enormous growth and the hysterical impact of undocumented malicious software, otherwise known as Zero-Day malware, specialized practices were joined to implement systems capable of detecting these kinds of software to avert possible disastrous… read more here.

Keywords: day; zevigilante detecting; machine learning; day malware ... See more keywords
Photo by thinkmagically from unsplash

Zero-Day Aware Decision Fusion-Based Model for Crypto-Ransomware Early Detection

Sign Up to like & get
recommendations!
Published in 2018 at "International Journal of Integrated Engineering"

DOI: 10.30880/ijie.2018.10.06.011

Abstract: Crypto-ransomware employs the cryptography to lock user personal files and demands ransom to release them. By utilizing several technological utilities like cyber-currency and cloud-based developing platforms, crypto-ransomware has gained high popularity among adversaries. Motivated by… read more here.

Keywords: detection; crypto ransomware; model; rate ... See more keywords