共 50 条
- [4] Empirical Evaluation of the A3 Environment: Evaluating Defenses Against Zero-Day Attacks [J]. PROCEEDINGS 10TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY ARES 2015, 2015, : 80 - 89
- [5] Detection of Zero-day Attacks on IoT [J]. 2024 INTERNATIONAL CONFERENCE ON SMART APPLICATIONS, COMMUNICATIONS AND NETWORKING, SMARTNETS-2024, 2024,
- [7] Detection of zero-day attacks in computer networks using combined classification [J]. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2022, 34 (27):
- [8] Detecting and Analyzing Zero-day Attacks using Honeypots [J]. 19TH INTERNATIONAL CONFERENCE ON CONTROL SYSTEMS AND COMPUTER SCIENCE (CSCS 2013), 2013, : 543 - 548
- [9] Effective Defence Against Zero-Day Exploits Using Bayesian Networks [J]. CRITICAL INFORMATION INFRASTRUCTURES SECURITY (CRITIS 2016), 2018, 10242 : 123 - 136
- [10] Protecting Embedded Systems from Zero-Day Attacks [J]. NAECON 2018 - IEEE NATIONAL AEROSPACE AND ELECTRONICS CONFERENCE, 2018, : 165 - 168