Showing 1 - 8 results of 8 for search '"Zero Days"', query time: 0.08s Refine Results
  1. 1
  2. 2

    Analisis Kinerja Intrusion Detection System Berbasis Algoritma Random Forest Menggunakan Dataset Unbalanced Honeynet BSSN by Kuni Inayah, Kalamullah Ramli

    Published 2024-08-01
    “…Namun, IDS ini tidak bekerja maksimal untuk mendeteksi jenis serangan baru yang belum pernah terjadi sebelumnya (zero-day). Untuk meningkatkan performa IDS salah satunya dengan menggunakan machine learning. …”
    Get full text
    Article
  3. 3

    Unsupervised intrusion detection model based on temporal convolutional network by LIAO Jinju, DING Jiawei, FENG Guanghui

    Published 2025-01-01
    “…Moreover, UDMT was capable of detecting both known and zero-day attacks without relying on labeled attack data. …”
    Get full text
    Article
  4. 4

    An Improved Deep Belief Network IDS on IoT-Based Network for Traffic Systems by Rayeesa Malik, Yashwant Singh, Zakir Ahmad Sheikh, Pooja Anand, Pradeep Kumar Singh, Tewabe Chekole Workneh

    Published 2022-01-01
    “…Moreover, these techniques collapse, while detecting zero-day attacks. Hence, there is a need to use an intelligent mechanism based on machine learning (ML) and deep learning (DL), to detect attacks. …”
    Get full text
    Article
  5. 5

    Hopf Bifurcation in an SEIDQV Worm Propagation Model with Quarantine Strategy by Yu Yao, Wenlong Xiang, Andong Qu, Ge Yu, Fuxiang Gao

    Published 2012-01-01
    “…Worms exploiting zero-day vulnerabilities have drawn significant attention owing to their enormous threats to the Internet. …”
    Get full text
    Article
  6. 6

    A Federated Learning Framework for Enhanced Data Security and Cyber Intrusion Detection in Distributed Network of Underwater Drones by Mansahaj Singh Popli, Rudra Pratap Singh, Navneet Kaur Popli, Mohammad Mamun

    Published 2025-01-01
    “…The proposed framework improves cyber intrusion detection by leveraging localized insights from individual drones to detect threats, including zero-day attacks, without directly exposing sensitive data. …”
    Get full text
    Article
  7. 7

    The Effect of Erythritol Injection in Decreasing of Abortion Rate in Local Breed Ewes by Maher Saber Owain, Mustafa Salah Hasan, Ali Ghazi Atiyah

    Published 2023-01-01
    “…These animals were tests for brucella by using rose Bengal and ELISA at zero day for confirmation; these animals were divided into 5 groups: G1 was brucella −ve and pregnant at 60 days, G2 was brucella +ve and pregnant at 60 days, G3 brucella+ve pregnant animals and treated by antibiotics gentamicin 10%, 3 ml/animal for 3 days, G4 brucella +ve and pregnant and giving erythritol, 10 ml S/C of 10% solution (solve in water and glycerol), and G5 was brucella +ve, and all pregnant and giving Erythritol+ gentamycin 10%, 3 ml/animal for 3 days. …”
    Get full text
    Article
  8. 8

    Transformer-based malware detection using process resource utilization metrics by Dimosthenis Natsos, Andreas L. Symeonidis

    Published 2025-03-01
    “…Malware detection has long relied on signature-based methods limited in detecting zero-day malware attacks. Although efficient, these approaches are vulnerable to obfuscation and evasion techniques. …”
    Get full text
    Article