A Systematic Literature Review on the Methods and Challenges in Detecting Zero-Day Attacks: Insights from the Recent CrowdStrike Incident
The detection of zero-day attacks remains one of the most critical challenges in
cybersecurity. This systematic literature review focuses on the various AI-based methods …
cybersecurity. This systematic literature review focuses on the various AI-based methods …
Cyber attacker's next action prediction on dynamic real-time behavior model
This paper addresses the critical need for enhanced threat analysis amid escalating cyber
threats. Recognizing limitations in current network-level Attack Graphs (AGs), including …
threats. Recognizing limitations in current network-level Attack Graphs (AGs), including …
FuzzAGG: A fuzzing-driven attack graph generation framework for industrial robot systems
X Liu, W Jiang, Z Li, X Jin, Z Ma, Q Li - Computers & Security, 2025 - Elsevier
As industrial robot systems (IRS) are increasingly utilized in smart factories, their information
security issues have become particularly critical. Attack graphs, an essential system-level …
security issues have become particularly critical. Attack graphs, an essential system-level …
Key Vulnerable Nodes Discovery Based on Bayesian Attack Subgraphs and Improved Fuzzy C-Means Clustering
Y Xu, Y Liu, Z Sun, Y Xue, W Liao, C Liu, Z Sun - Mathematics, 2024 - mdpi.com
Aiming at the problem that the search efficiency of key vulnerable nodes in large-scale
networks is not high and the consideration factors are not comprehensive enough, in order …
networks is not high and the consideration factors are not comprehensive enough, in order …