Showing 1 - 13 results of 13 for search '"Zero Days"', query time: 0.05s Refine Results
  1. 1
  2. 2
  3. 3
  4. 4
  5. 5

    Analisis Kinerja Intrusion Detection System Berbasis Algoritma Random Forest Menggunakan Dataset Unbalanced Honeynet BSSN by Kuni Inayah, Kalamullah Ramli

    Published 2024-08-01
    “…Namun, IDS ini tidak bekerja maksimal untuk mendeteksi jenis serangan baru yang belum pernah terjadi sebelumnya (zero-day). Untuk meningkatkan performa IDS salah satunya dengan menggunakan machine learning. …”
    Get full text
    Article
  6. 6

    Unsupervised intrusion detection model based on temporal convolutional network by LIAO Jinju, DING Jiawei, FENG Guanghui

    Published 2025-01-01
    “…Moreover, UDMT was capable of detecting both known and zero-day attacks without relying on labeled attack data. …”
    Get full text
    Article
  7. 7

    An Improved Deep Belief Network IDS on IoT-Based Network for Traffic Systems by Rayeesa Malik, Yashwant Singh, Zakir Ahmad Sheikh, Pooja Anand, Pradeep Kumar Singh, Tewabe Chekole Workneh

    Published 2022-01-01
    “…Moreover, these techniques collapse, while detecting zero-day attacks. Hence, there is a need to use an intelligent mechanism based on machine learning (ML) and deep learning (DL), to detect attacks. …”
    Get full text
    Article
  8. 8

    Hopf Bifurcation in an SEIDQV Worm Propagation Model with Quarantine Strategy by Yu Yao, Wenlong Xiang, Andong Qu, Ge Yu, Fuxiang Gao

    Published 2012-01-01
    “…Worms exploiting zero-day vulnerabilities have drawn significant attention owing to their enormous threats to the Internet. …”
    Get full text
    Article
  9. 9

    Automated vulnerability discovery method for 5G core network protocol by Peixiang WU, Zhilong ZHANG, Libo CHEN, Yijun WANG, Zhi XUE

    Published 2024-02-01
    “…With the widespread development of fifth-generation (5G) mobile communication technology, concerns regarding 5G network security have also increased.Blackbox fuzzing is a commonly used method for automated vulnerability discovery in software security.However, applying dynamic approaches like fuzzing to discover vulnerabilities in the complex design of 5G core network protocols poses challenges such as low efficiency, poor versatility, and lack of scalability.Therefore, a novel static method to examine the open-source solution of the 5G core network was proposed.Through this method, a series of memory leak security issues caused by improper variable life cycle management were identified, which can lead to denial-of-service attacks on the 5G core network.To summarize these weaknesses, a general vulnerability model and an automated vulnerability discovery method called HoI were presented, which utilized hybrid analysis based on control and data flow.By successfully discovering five zero-day bugs in Open5GS, an open-source solution for the 5G core network, vulnerabilities that cover practical application scenarios of multiple interface protocols in the 5G core network were identified.These vulnerabilities have wide-ranging impact, are highly detrimental, and can be easily exploited.They have been reported to the vendor and assigned four Common Vulnerabilities and Exposures (CVE) numbers, demonstrating the effectiveness of this automated vulnerability discovery method.…”
    Get full text
    Article
  10. 10

    Digital Health: The Cybersecurity for AI-Based Healthcare Communication by Abdullah M. Algarni, Vijey Thayananthan

    Published 2025-01-01
    “…Despite numerous approaches introduced internationally, the field continues to grapple with real-world issues, demands, and a rising number of unforeseen diseases stemming from vulnerabilities, such as zero-day attacks. Purpose: The healthcare system, including communication between medical devices, must evolve alongside new technologies, such as AI-based proactive devices. …”
    Get full text
    Article
  11. 11

    A Federated Learning Framework for Enhanced Data Security and Cyber Intrusion Detection in Distributed Network of Underwater Drones by Mansahaj Singh Popli, Rudra Pratap Singh, Navneet Kaur Popli, Mohammad Mamun

    Published 2025-01-01
    “…The proposed framework improves cyber intrusion detection by leveraging localized insights from individual drones to detect threats, including zero-day attacks, without directly exposing sensitive data. …”
    Get full text
    Article
  12. 12

    The Effect of Erythritol Injection in Decreasing of Abortion Rate in Local Breed Ewes by Maher Saber Owain, Mustafa Salah Hasan, Ali Ghazi Atiyah

    Published 2023-01-01
    “…These animals were tests for brucella by using rose Bengal and ELISA at zero day for confirmation; these animals were divided into 5 groups: G1 was brucella −ve and pregnant at 60 days, G2 was brucella +ve and pregnant at 60 days, G3 brucella+ve pregnant animals and treated by antibiotics gentamicin 10%, 3 ml/animal for 3 days, G4 brucella +ve and pregnant and giving erythritol, 10 ml S/C of 10% solution (solve in water and glycerol), and G5 was brucella +ve, and all pregnant and giving Erythritol+ gentamycin 10%, 3 ml/animal for 3 days. …”
    Get full text
    Article
  13. 13

    Transformer-based malware detection using process resource utilization metrics by Dimosthenis Natsos, Andreas L. Symeonidis

    Published 2025-03-01
    “…Malware detection has long relied on signature-based methods limited in detecting zero-day malware attacks. Although efficient, these approaches are vulnerable to obfuscation and evasion techniques. …”
    Get full text
    Article