Backwards from zero: How the US public evaluates the use of zero-day vulnerabilities in cybersecurity

MM Leal, P Musgrave - Contemporary Security Policy, 2023 - Taylor & Francis
Zero-day vulnerabilities are software and hardware flaws that are unknown to computer
vendors. As powerful means of carrying out cyber intrusions, such vulnerabilities present a …

[PDF][PDF] Nation states, cyberconflict and the web of profit

M McGuire - HP Development Company, LP Retrieved from https …, 2021 - hpmarketing.ee
The world of Nation State cyberconflict and cyberespionage is covert by nature. Finding
evidence of how such players operate, what tools they use, what motivates them and how …

What we know about bug bounty programs-an exploratory systematic mapping study

A Magazinius, N Mellegård, L Olsson - … Aspects in Security and Trust: 9th …, 2021 - Springer
This paper presents a systematic mapping study of the research on crowdsourced security
vulnerability discovery. The aim is to identify aspects of bug bounty program (BBP) research …

[PDF][PDF] Protect System Using Defense Techniques of Zero Day Attacks

GP Bherde, MA Pund - OAIJSE, 2019 - oaijse.com
Every organization connected to the internet is a common threat of zero-day attacks. Zero-
day attacks will not be noticed until a specific vulnerability is actually identified and reported …

Minimator: A Serious Game on Zero-Day Markets

E Cseresnyes, H Sharma - 2022 - diva-portal.org
Zero-days are vulnerabilities that the software vendor does not know about and thus cannot
provide a patch for. Their value has caused markets to develop, divided by the purchase …

[PDF][PDF] 国民国家, サイバー紛争と

OF PROFIT - jp.ext.hp.com
02 今や各国はサイバースペースにおける戦略的優位性の獲得に向けて, 膨大な時間と資源を投入
する準備ができています. 1 サイバーセキュリティへの支出は, 米国では 11%(2019 年~ 2021 年 …