HMS-IDS: Threat intelligence integration for zero-day exploits and advanced persistent threats in IIoT
Abstract Critical Industries such as Manufacturing, Power, and Intelligent Transportation are
increasingly using IIoT systems, making them more susceptible to cyberattacks. To counter …
increasingly using IIoT systems, making them more susceptible to cyberattacks. To counter …
From zero-shot machine learning to zero-day attack detection
Abstract Machine learning (ML) models have proved efficient in classifying data samples
into their respective categories. The standard ML evaluation methodology assumes that test …
into their respective categories. The standard ML evaluation methodology assumes that test …
Zero-day malware detection and effective malware analysis using Shapley ensemble boosting and bagging approach
R Kumar, G Subbiah - Sensors, 2022 - mdpi.com
Software products from all vendors have vulnerabilities that can cause a security concern.
Malware is used as a prime exploitation tool to exploit these vulnerabilities. Machine …
Malware is used as a prime exploitation tool to exploit these vulnerabilities. Machine …
A blended deep learning intrusion detection framework for consumable edge-centric iomt industry
The demand for medical sensors in the Smart Healthcare System (SHS) creates an
intelligent Internet of Medical Things (IoMT) system. This system plays an important role in …
intelligent Internet of Medical Things (IoMT) system. This system plays an important role in …
[PDF][PDF] Adopting a Conceptual Architecture to Mitigate an IoT Zero-Day Threat that Might Result in a Zero-Day Attack with Regard to Operational Costs and …
VV Vegesna - International Journal of Current Engineering and …, 2023 - researchgate.net
Internet of Things (IoT) aims at providing connectivity between every computing entity.
However, this facilitation is also leading to more cyber threats which may exploit the …
However, this facilitation is also leading to more cyber threats which may exploit the …
WCGAN-GP based synthetic attack data generation with GA based feature selection for IDS
Cyber-attack is one of the alarming issues in today's era. Firewalls, Intrusion Detection
Systems (IDSs), and other techniques are popularly applied to prevent those attacks …
Systems (IDSs), and other techniques are popularly applied to prevent those attacks …
Utilizing trusted lightweight ciphers to support electronic-commerce transaction cryptography
GS Shyaa, M Al-Zubaidie - Applied Sciences, 2023 - mdpi.com
Electronic-commerce (e-commerce) has become a provider of distinctive services to
individuals and companies due to the speed and flexibility of transferring orders and …
individuals and companies due to the speed and flexibility of transferring orders and …
[PDF][PDF] An Asset-Based Approach to Mitigate Zero-Day Ransomware Attacks.
This article presents an asset-based security system where security practitioners build their
systems based on information they own and not solicited by observing attackers' behavior …
systems based on information they own and not solicited by observing attackers' behavior …
Experience report on the challenges and opportunities in securing smartphones against zero-click attacks
Zero-click attacks require no user interaction and typically exploit zero-day (ie, unpatched)
vulnerabilities in instant chat applications (such as WhatsApp and iMessage) to gain root …
vulnerabilities in instant chat applications (such as WhatsApp and iMessage) to gain root …
An active learning framework using deep Q-network for zero-day attack detection
Y Wu, Y Hu, J Wang, M Feng, A Dong, Y Yang - Computers & Security, 2024 - Elsevier
Zero-day attacks from highly dynamic and complex cyberspace make severe threats to the
existing network intrusion detection systems. Robust and intelligent solutions are required to …
existing network intrusion detection systems. Robust and intelligent solutions are required to …