Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 227,732,036 papers from all fields of science
Search
Sign In
Create Free Account
Zero-day (computing)
Known as:
Zero day vulnerability
, Zero day virus
, Zero-Day Exploit
Expand
A zero-day (also known as zero-hour or 0-day or day zero) vulnerability is an undisclosed computer-software vulnerability that hackers can exploit to…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
35 relations
Access control
Adobe Flash Player
Antivirus software
Complexity
Expand
Broader (1)
Warez
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2016
Highly Cited
2016
Emerging Security Challenges of Cloud Virtual Infrastructure
Amani S. Ibrahim
,
J. Hamlyn-Harris
,
J. Grundy
Asia-Pacific Software Engineering Conference
2016
Corpus ID: 2232156
The c loud computing model transforming the IT landscape. Cloud computing is a new computing paradigm that deli vers computing…
Expand
2016
2016
APT Traffic Detection Based on Time Transform
Jiazhong Lu
,
Xiaosong Zhang
,
Junfeng Wang
,
Lingyun Ying
International Conference on Intelligent…
2016
Corpus ID: 21084587
APT(Advanced persist threat) is an emerging attack on the Internet. Attackers may combine phishing emails, malware, social…
Expand
2015
2015
The Threat of Obfuscated Zero Day Polymorphic Malwares: An Analysis
Brightstarlang Wanswett
,
H. Kalita
International Conference on Computational…
2015
Corpus ID: 17747655
When a Zero day malware crops up and with the advent of polymorphism and obfuscation, such malware poses a serious threat to…
Expand
2005
2005
Ethnicity and Causal Mechanisms: Race and Ethnic Inequality in Educational Attainment in the United States
C. Hirschman
,
Jennifer C. Lee
2005
Corpus ID: 151164455
In the United States, as in other modern industrial societies, education is the primary gateway to socioeconomic attainment. The…
Expand
2005
2005
ARP-based Detection of Scanning Worms Within an Enterprise Network
D. Whyte
,
P. V. Oorschot
,
E. Kranakis
2005
Corpus ID: 18413660
Rapidly propagating worms are arguably the greatest security threat currently facing the Internet. To date, worm writers have…
Expand
2005
2005
On an analysis of the day-to-day variability in the individual's action space : an exploration of the six-week Mobidrive travel diary data
Y. Susilo
,
R. Kitamura
2005
Corpus ID: 107012989
On an analysis of the day-to-day variability in the individual’s action space : An exploration of the six-week Mobidrive travel…
Expand
2004
2004
Regional differences in outpatient antibiotic consumption in Switzerland
M. Filippini
,
G. Masiero
,
K. Moschetti
2004
Corpus ID: 51835224
This paper investigates regional variations in outpatient antibiotic use and provides a first empirical analysis based on Swiss…
Expand
1998
1998
USO DE ANTIHIPERTENSIVOS EN ESPANA, 1985-1995
M. Prieto
,
F. Abajo
,
Dolores Montero
,
Gloria Martín-Serrano
,
M. Madurga
,
R. Palop
1998
Corpus ID: 70637220
BACKGROUND: This study has analysed the trend of antihypertensive drugs consumption in Spain from 1985 to 1995, its economical…
Expand
Highly Cited
1988
Highly Cited
1988
INTERMEDIATE PERIOD RESPONSE OF WATER LEVELS IN WELLS TO CRUSTAL STRAIN: SENSITIVITY AND NOISE LEVEL
S. Rojstaczer
1988
Corpus ID: 140651619
The response of water levels in wells to earth tides indicates that wells can be used to detect small crustal strain. Vertical…
Expand
Review
1977
Review
1977
Xylanase from Trichoderma pseudokoningii: Purification, Characterization, and Effects on Isolated Plant Cell Walls
C. Baker
1977
Corpus ID: 53589283
BAKER, C. J., C. H. WHALEN, and D. F. BATEMAN. 1977. Xylanase from Trichoderma pseudokoningii: purification, characterization…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE