共 50 条
- [41] Detecting and Analyzing Zero-day Attacks using Honeypots 19TH INTERNATIONAL CONFERENCE ON CONTROL SYSTEMS AND COMPUTER SCIENCE (CSCS 2013), 2013, : 543 - 548
- [43] A Hybrid Detection Approach For Zero-day Polymorphic Shellcodes 2009 INTERNATIONAL CONFERENCE ON E-BUSINESS AND INFORMATION SYSTEM SECURITY, VOLS 1 AND 2, 2009, : 45 - 49
- [44] Distributed Detection of Zero-Day Network Traffic Flows DATA MINING, AUSDM 2017, 2018, 845 : 173 - 191
- [47] Zero-day recovery: the key to mitigating the ransomware threat Computer Fraud and Security, 2019, 2019 (01): : 6 - 9
- [48] Towards Probabilistic Identification of Zero-day Attack Paths 2016 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2016, : 64 - 72
- [49] Protecting Embedded Systems from Zero-Day Attacks NAECON 2018 - IEEE NATIONAL AEROSPACE AND ELECTRONICS CONFERENCE, 2018, : 165 - 168
- [50] A Survey on Zero-Day Polymorphic Worm Detection Techniques IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2014, 16 (03): : 1520 - 1549