[PDF][PDF] CESSO-HCRNN: A Hybrid CRNN With Chaotic Enriched SSO-based Improved Information Gain to Detect Zero-Day Attacks.

DK Roy, R Patgiri - International Journal of Advanced …, 2023 - pdfs.semanticscholar.org
Hackers use the vulnerability before programmers have a chance to fix it, which is known as
a zero-day attack. Zero-day attackers have a variety of abilities, including the ability to alter …

Analysis of Techniques for Detection and Removal of Zero-Day Attacks (ZDA)

K Hamid, MW Iqbal, M Aqeel, X Liu, M Arif - International Conference on …, 2022 - Springer
Zero-day attacks (ZDAs) are previously unknown flaws and errors in operating systems,
networks, and general-purpose software. ZDAs are the cause to open security breach holes …

Zero Day Vulnerabilities Assessments, Exploits Detection, and Various Design Patterns in Cyber Software

VM Thapa, S Srivastava, S Garg - AI Tools for Protecting and …, 2023 - igi-global.com
In this technology-driven era, software development and maintenance is a rapidly growing
domain and is predestined to thrive over the coming decade. But the growing demand for …

A Comparative Study of Novelty Detection Models for Zero Day Intrusion Detection in Industrial Internet of Things

U Otokwala, M Arifeen, A Petrovski - UK Workshop on Computational …, 2022 - Springer
The detection of zero-day attacks in the IoT network is a challenging task due to unknown
security vulnerabilities. Also, the unavailability of the data makes it difficult to train a machine …

Check for updates A Comparative Study of Novelty Detection Models for Zero Day Intrusion Detection in Industrial Internet of Things

U Otokwala, M Arifeen, A Petrovski - … Presented at the 21st UK Workshop … - books.google.com
The detection of zero-day attacks in the IoT network is a challenging task due to unknown
security vulnerabilities. Also, the unavailability of the data makes it difficult to train a machine …