Inhaltsverzeichnis
Auswahl der wissenschaftlichen Literatur zum Thema „Known and Zero-Day Attacks Detection“
Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an
Machen Sie sich mit den Listen der aktuellen Artikel, Bücher, Dissertationen, Berichten und anderer wissenschaftlichen Quellen zum Thema "Known and Zero-Day Attacks Detection" bekannt.
Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.
Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.
Zeitschriftenartikel zum Thema "Known and Zero-Day Attacks Detection"
Saurabh Kansal. "Utilizing Deep Learning Techniques for Effective Zero-Day Attack Detection." Economic Sciences 21, no. 1 (2025): 246–57. https://doi.org/10.69889/m3jzbt24.
Der volle Inhalt der QuelleNerella Sameera, M.Siva Jyothi, K.Lakshmaji, and V.S.R.Pavan Kumar. Neeli. "Clustering based Intrusion Detection System for effective Detection of known and Zero-day Attacks." Journal of Advanced Zoology 44, no. 4 (2023): 969–75. http://dx.doi.org/10.17762/jaz.v44i4.2423.
Der volle Inhalt der QuelleOhtani, Takahiro, Ryo Yamamoto, and Satoshi Ohzahata. "IDAC: Federated Learning-Based Intrusion Detection Using Autonomously Extracted Anomalies in IoT." Sensors 24, no. 10 (2024): 3218. http://dx.doi.org/10.3390/s24103218.
Der volle Inhalt der QuelleHindy, Hanan, Robert Atkinson, Christos Tachtatzis, Jean-Noël Colin, Ethan Bayne, and Xavier Bellekens. "Utilising Deep Learning Techniques for Effective Zero-Day Attack Detection." Electronics 9, no. 10 (2020): 1684. http://dx.doi.org/10.3390/electronics9101684.
Der volle Inhalt der QuelleAbdel Wahed, Mutaz. "AI-Enhanced Threat Intelligence for Proactive Zero-Day Attack Detection." Gamification and Augmented Reality 3 (April 13, 2025): 112. https://doi.org/10.56294/gr2025112.
Der volle Inhalt der QuelleHairab, Belal Ibrahim, Heba K. Aslan, Mahmoud Said Elsayed, Anca D. Jurcut, and Marianne A. Azer. "Anomaly Detection of Zero-Day Attacks Based on CNN and Regularization Techniques." Electronics 12, no. 3 (2023): 573. http://dx.doi.org/10.3390/electronics12030573.
Der volle Inhalt der QuelleAlam, Naushad, and Muqeem Ahmed. "Zero-day Network Intrusion Detection using Machine Learning Approach." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 8s (2023): 194–201. http://dx.doi.org/10.17762/ijritcc.v11i8s.7190.
Der volle Inhalt der QuelleAL Rafy, Md Mashfiquer Rahman, Sharmin Nahar, Md. Najmul Gony, and MD IMRANUL HOQUE Bhuiyan. "The role of machine learning in predicting zero-day vulnerabilities." International Journal of Science and Research Archive 10, no. 1 (2023): 1197–208. https://doi.org/10.30574/ijsra.2023.10.1.0838.
Der volle Inhalt der QuelleBu, Seok-Jun, and Sung-Bae Cho. "Deep Character-Level Anomaly Detection Based on a Convolutional Autoencoder for Zero-Day Phishing URL Detection." Electronics 10, no. 12 (2021): 1492. http://dx.doi.org/10.3390/electronics10121492.
Der volle Inhalt der QuelleAl-Rushdan, Huthifh, Mohammad Shurman, and Sharhabeel Alnabelsi. "On Detection and Prevention of Zero-Day Attack Using Cuckoo Sandbox in Software-Defined Networks." International Arab Journal of Information Technology 17, no. 4A (2020): 662–70. http://dx.doi.org/10.34028/iajit/17/4a/11.
Der volle Inhalt der QuelleDissertationen zum Thema "Known and Zero-Day Attacks Detection"
Toure, Almamy. "Collection, analysis and harnessing of communication flows for cyber-attack detection." Electronic Thesis or Diss., Valenciennes, Université Polytechnique Hauts-de-France, 2024. http://www.theses.fr/2024UPHF0023.
Der volle Inhalt der QuelleKhraisat, Ansam. "Intelligent zero-day intrusion detection framework for internet of things." Thesis, Federation University Australia, 2020. http://researchonline.federation.edu.au/vital/access/HandleResolver/1959.17/179729.
Der volle Inhalt der QuellePeddisetty, Naga Raju. "State-of-the-art Intrusion Detection: Technology, Challenges, and Evaluation." Thesis, Linköping University, Department of Electrical Engineering, 2005. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-2792.
Der volle Inhalt der QuelleBuchteile zum Thema "Known and Zero-Day Attacks Detection"
Wang, Lingyu, Mengyuan Zhang, and Anoop Singhal. "Network Security Metrics: From Known Vulnerabilities to Zero Day Attacks." In Lecture Notes in Computer Science. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-04834-1_22.
Der volle Inhalt der QuelleHamid, Khalid, Muhammad Waseem Iqbal, Muhammad Aqeel, Xiangyong Liu, and Muhammad Arif. "Analysis of Techniques for Detection and Removal of Zero-Day Attacks (ZDA)." In Communications in Computer and Information Science. Springer Nature Singapore, 2023. http://dx.doi.org/10.1007/978-981-99-0272-9_17.
Der volle Inhalt der QuelleNgo, Quoc-Dung, and Quoc-Huu Nguyen. "A Reinforcement Learning-Based Approach for Detection Zero-Day Malware Attacks on IoT System." In Artificial Intelligence Trends in Systems. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-09076-9_34.
Der volle Inhalt der QuelleSingh, Mahendra Pratap, Virendra Pratap Singh, and Maanak Gupta. "Early Detection and Classification of Zero-Day Attacks in Network Traffic Using Convolutional Neural Network." In Lecture Notes in Networks and Systems. Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-60935-0_70.
Der volle Inhalt der QuelleBlancaflor, Eric B., Charlene Grazielle E. Lara, Leila Joy M. Bautista, Drizzle Joy V. Caberto, and Danielle Franchesca L. Mancilla. "Detecting the Unknown: Evaluating the Efficacy of Host-Based Intrusion Detection Systems (IDS) in Zero-Day Attacks." In Signals and Communication Technology. Springer Nature Switzerland, 2025. https://doi.org/10.1007/978-3-031-78131-5_3.
Der volle Inhalt der QuelleJorquera Valero, José María, Manuel Gil Pérez, Alberto Huertas Celdrán, and Gregorio Martínez Pérez. "Identification and Classification of Cyber Threats Through SSH Honeypot Systems." In Handbook of Research on Intrusion Detection Systems. IGI Global, 2020. http://dx.doi.org/10.4018/978-1-7998-2242-4.ch006.
Der volle Inhalt der QuelleRoseline, S. Abijah, and S. Geetha. "Intelligent Malware Detection Using Deep Dilated Residual Networks for Cyber Security." In Countering Cyber Attacks and Preserving the Integrity and Availability of Critical Systems. IGI Global, 2019. http://dx.doi.org/10.4018/978-1-5225-8241-0.ch011.
Der volle Inhalt der QuelleThapa, Vidhanth Maan, Sudhanshu Srivastava, and Shelly Garg. "Zero Day Vulnerabilities Assessments, Exploits Detection, and Various Design Patterns in Cyber Software." In AI Tools for Protecting and Preventing Sophisticated Cyber Attacks. IGI Global, 2023. http://dx.doi.org/10.4018/978-1-6684-7110-4.ch006.
Der volle Inhalt der QuelleSethuraman, Murugan Sethuraman. "Survey of Unknown Malware Attack Finding." In Advances in Systems Analysis, Software Engineering, and High Performance Computing. IGI Global, 2018. http://dx.doi.org/10.4018/978-1-5225-3129-6.ch011.
Der volle Inhalt der QuelleSethuraman, Murugan Sethuraman. "Survey of Unknown Malware Attack Finding." In Intelligent Systems. IGI Global, 2018. http://dx.doi.org/10.4018/978-1-5225-5643-5.ch099.
Der volle Inhalt der QuelleKonferenzberichte zum Thema "Known and Zero-Day Attacks Detection"
Anjum, Asma, P. Rama Subramanian, R. Stalinbabu, Deepthi Kothapeta, K. Santha Sheela, and B. Jegajothi. "Detecting Zero-Day Attacks using Advanced Anomaly Detection in Network Traffic." In 2025 5th International Conference on Pervasive Computing and Social Networking (ICPCSN). IEEE, 2025. https://doi.org/10.1109/icpcsn65854.2025.11034868.
Der volle Inhalt der QuelleChenet, Cristiano Pegoraro, Alessandro Savino, and Stefano Di Carlo. "Zero-Day Hardware-Supported Malware Detection of Stack Buffer Overflow Attacks: An Application Exploiting the CV32e40p RISC-V Core." In 2025 IEEE 26th Latin American Test Symposium (LATS). IEEE, 2025. https://doi.org/10.1109/lats65346.2025.10963939.
Der volle Inhalt der QuelleMote, Mrs Savitri Ashok, and Dr Sudhakar Arabagatte. "Survey on Detection and Mitigation Strategies for Zero-day Attacks: An Extensive Analysis of Current Developments and Case Studies." In First International Conference on Computer, Computation and Communication (IC3C-2025). River Publishers, 2025. https://doi.org/10.13052/rp-9788743808268a037.
Der volle Inhalt der QuelleWang, Di, Tuba Unsal, Tingyue Gu, Sith Kumseranee, and Suchada Punpruk. "Severe Microbiologically Influenced Corrosion (MIC) of Pure Zinc and Galvanized Steel in the Presence of Sulfate Reducing Desulfovibrio Vulgaris." In CORROSION 2020. NACE International, 2020. https://doi.org/10.5006/c2020-14537.
Der volle Inhalt der QuelleWang, Shen, Zhengzhang Chen, Xiao Yu, et al. "Heterogeneous Graph Matching Networks for Unknown Malware Detection." In Twenty-Eighth International Joint Conference on Artificial Intelligence {IJCAI-19}. International Joint Conferences on Artificial Intelligence Organization, 2019. http://dx.doi.org/10.24963/ijcai.2019/522.
Der volle Inhalt der QuelleSejr, Jonas Herskind, Arthur Zimek, and Peter Schneider-Kamp. "Explainable Detection of Zero Day Web Attacks." In 2020 3rd International Conference on Data Intelligence and Security (ICDIS). IEEE, 2020. http://dx.doi.org/10.1109/icdis50059.2020.00016.
Der volle Inhalt der QuelleReardon, Shay, Murtadha D. Hssayeni, and Imadeldin Mahgoub. "Detection of Zero-Day Attacks on IoT." In 2024 International Conference on Smart Applications, Communications and Networking (SmartNets). IEEE, 2024. http://dx.doi.org/10.1109/smartnets61466.2024.10577735.
Der volle Inhalt der QuelleAlEroud, Ahmed, and George Karabatis. "A Contextual Anomaly Detection Approach to Discover Zero-Day Attacks." In 2012 International Conference on Cyber Security (CyberSecurity). IEEE, 2012. http://dx.doi.org/10.1109/cybersecurity.2012.12.
Der volle Inhalt der QuelleGao, Xueqin, Kai Chen, Yufei Zhao, Peng Zhang, Longxi Han, and Daojuan Zhang. "A Zero-Shot Learning-Based Detection Model Against Zero-Day Attacks in IoT." In 2024 9th International Conference on Electronic Technology and Information Science (ICETIS). IEEE, 2024. http://dx.doi.org/10.1109/icetis61828.2024.10593684.
Der volle Inhalt der QuelleRadhakrishnan, Kiran, Rajeev R. Menon, and Hiran V. Nath. "A survey of zero-day malware attacks and its detection methodology." In TENCON 2019 - 2019 IEEE Region 10 Conference (TENCON). IEEE, 2019. http://dx.doi.org/10.1109/tencon.2019.8929620.
Der volle Inhalt der Quelle