Zero-day

Known as: Zero day vulnerability, Zero day virus, Zero-Day Exploit 
A zero-day (also known as zero-hour or 0-day or day zero) vulnerability is an undisclosed computer-software vulnerability that hackers can exploit to… (More)
Wikipedia

Topic mentions per year

Topic mentions per year

2004-2016
05101520042016

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
Zero-day attacks continue to challenge the enterprise network security defense. A zero-day attack path is formed when a multi… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2014
2014
Worms are a serious potential threat to computer network security. The high potential speed of propagation of worms and their… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2013
2013
With growing sophistication of computer worms, it is very important to detect and prevent the worms quickly and accurately at… (More)
  • table 1
  • figure 1
Is this relevant?
2013
2013
Intrusion Detection Systems (IDSs) have been developed for many years, but in general they fall short in efficiently detecting… (More)
  • figure 1
  • table I
  • table II
  • table III
  • table IV
Is this relevant?
2012
2012
Self-propagating malware, such as worms, have prompted cyber attacks that compromise regular computer systems via exploiting… (More)
Is this relevant?
2011
2011
Zero-day or unknown malware are created using code obfuscation techniques that can modify the parent code to produce offspring… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2008
2008
Signature-based intrusion detection systems (IDSs) can be evaded by polymorphic worms which vary their payloads in every… (More)
  • figure 1
  • figure 2
Is this relevant?
2007
2007
It is crucial to detect zero-day polymorphic worms and to generate signatures at the edge network gateways or honeynets so that… (More)
  • table I
  • figure 1
  • figure 3
  • table II
  • table III
Is this relevant?
2007
2007
Next-generation malware adopt self-mutation to circumvent current malware detection techniques. The authors propose a strategy… (More)
  • figure 1
  • figure 2
  • figure 3
  • table 3
Is this relevant?
Highly Cited
2006
Highly Cited
2006
Zero-day polymorphic worms pose a serious threat to the security of Internet infrastructures. Given their rapid propagation, it… (More)
  • figure 1
  • figure 2
  • figure 3
  • table 1
  • table 2
Is this relevant?