-
1
Zero-day exploits detection with adaptive WavePCA-Autoencoder (AWPA) adaptive hybrid exploit detection network (AHEDNet)
Published 2025-02-01Subjects: “…Zero-Day Exploits…”
Get full text
Article -
2
-
3
Research on network traffic classification based on machine learning and deep learning
Published 2021-03-01Subjects: Get full text
Article -
4
Cascaded intrusion detection system using machine learning
Published 2025-12-01Subjects: Get full text
Article -
5
Analisis Kinerja Intrusion Detection System Berbasis Algoritma Random Forest Menggunakan Dataset Unbalanced Honeynet BSSN
Published 2024-08-01“…Namun, IDS ini tidak bekerja maksimal untuk mendeteksi jenis serangan baru yang belum pernah terjadi sebelumnya (zero-day). Untuk meningkatkan performa IDS salah satunya dengan menggunakan machine learning. …”
Get full text
Article -
6
Unsupervised intrusion detection model based on temporal convolutional network
Published 2025-01-01“…Moreover, UDMT was capable of detecting both known and zero-day attacks without relying on labeled attack data. …”
Get full text
Article -
7
An Improved Deep Belief Network IDS on IoT-Based Network for Traffic Systems
Published 2022-01-01“…Moreover, these techniques collapse, while detecting zero-day attacks. Hence, there is a need to use an intelligent mechanism based on machine learning (ML) and deep learning (DL), to detect attacks. …”
Get full text
Article -
8
Hopf Bifurcation in an SEIDQV Worm Propagation Model with Quarantine Strategy
Published 2012-01-01“…Worms exploiting zero-day vulnerabilities have drawn significant attention owing to their enormous threats to the Internet. …”
Get full text
Article -
9
Automated vulnerability discovery method for 5G core network protocol
Published 2024-02-01“…With the widespread development of fifth-generation (5G) mobile communication technology, concerns regarding 5G network security have also increased.Blackbox fuzzing is a commonly used method for automated vulnerability discovery in software security.However, applying dynamic approaches like fuzzing to discover vulnerabilities in the complex design of 5G core network protocols poses challenges such as low efficiency, poor versatility, and lack of scalability.Therefore, a novel static method to examine the open-source solution of the 5G core network was proposed.Through this method, a series of memory leak security issues caused by improper variable life cycle management were identified, which can lead to denial-of-service attacks on the 5G core network.To summarize these weaknesses, a general vulnerability model and an automated vulnerability discovery method called HoI were presented, which utilized hybrid analysis based on control and data flow.By successfully discovering five zero-day bugs in Open5GS, an open-source solution for the 5G core network, vulnerabilities that cover practical application scenarios of multiple interface protocols in the 5G core network were identified.These vulnerabilities have wide-ranging impact, are highly detrimental, and can be easily exploited.They have been reported to the vendor and assigned four Common Vulnerabilities and Exposures (CVE) numbers, demonstrating the effectiveness of this automated vulnerability discovery method.…”
Get full text
Article -
10
Digital Health: The Cybersecurity for AI-Based Healthcare Communication
Published 2025-01-01“…Despite numerous approaches introduced internationally, the field continues to grapple with real-world issues, demands, and a rising number of unforeseen diseases stemming from vulnerabilities, such as zero-day attacks. Purpose: The healthcare system, including communication between medical devices, must evolve alongside new technologies, such as AI-based proactive devices. …”
Get full text
Article -
11
A Federated Learning Framework for Enhanced Data Security and Cyber Intrusion Detection in Distributed Network of Underwater Drones
Published 2025-01-01“…The proposed framework improves cyber intrusion detection by leveraging localized insights from individual drones to detect threats, including zero-day attacks, without directly exposing sensitive data. …”
Get full text
Article -
12
The Effect of Erythritol Injection in Decreasing of Abortion Rate in Local Breed Ewes
Published 2023-01-01“…These animals were tests for brucella by using rose Bengal and ELISA at zero day for confirmation; these animals were divided into 5 groups: G1 was brucella −ve and pregnant at 60 days, G2 was brucella +ve and pregnant at 60 days, G3 brucella+ve pregnant animals and treated by antibiotics gentamicin 10%, 3 ml/animal for 3 days, G4 brucella +ve and pregnant and giving erythritol, 10 ml S/C of 10% solution (solve in water and glycerol), and G5 was brucella +ve, and all pregnant and giving Erythritol+ gentamycin 10%, 3 ml/animal for 3 days. …”
Get full text
Article -
13
Transformer-based malware detection using process resource utilization metrics
Published 2025-03-01“…Malware detection has long relied on signature-based methods limited in detecting zero-day malware attacks. Although efficient, these approaches are vulnerable to obfuscation and evasion techniques. …”
Get full text
Article