共 50 条
- [1] Training for the unknown: The role of feedback and similarity in detecting zero-day attacks [J]. 6TH INTERNATIONAL CONFERENCE ON APPLIED HUMAN FACTORS AND ERGONOMICS (AHFE 2015) AND THE AFFILIATED CONFERENCES, AHFE 2015, 2015, 3 : 1088 - 1095
- [2] Detection of Zero-day Attacks on IoT [J]. 2024 INTERNATIONAL CONFERENCE ON SMART APPLICATIONS, COMMUNICATIONS AND NETWORKING, SMARTNETS-2024, 2024,
- [3] Detecting Zero-Day Intrusion Attacks Using Semi-Supervised Machine Learning Approaches [J]. IEEE ACCESS, 2022, 10 : 69822 - 69838
- [5] Detecting zero-day attacks using context-aware anomaly detection at the application-layer [J]. International Journal of Information Security, 2017, 16 : 475 - 490
- [6] Detecting Zero-day Polymorphic Worm: A Review [J]. 2018 21ST SAUDI COMPUTER SOCIETY NATIONAL COMPUTER CONFERENCE (NCC), 2018,
- [7] Detection of zero-day attacks in computer networks using combined classification [J]. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2022, 34 (27):
- [8] Protecting Embedded Systems from Zero-Day Attacks [J]. NAECON 2018 - IEEE NATIONAL AEROSPACE AND ELECTRONICS CONFERENCE, 2018, : 165 - 168
- [9] Detecting targeted attacks using shadow honeypots [J]. USENIX ASSOCIATION PROCEEDINGS OF THE 14TH USENIX SECURITY SYMPOSIUM, 2005, : 129 - 144
- [10] ZeroWall: Detecting Zero-Day Web Attacks through Encoder-Decoder Recurrent Neural Networks [J]. IEEE INFOCOM 2020 - IEEE CONFERENCE ON COMPUTER COMMUNICATIONS, 2020, : 2479 - 2488