2023
DOI: 10.1080/13523260.2023.2216112
|View full text |Cite
|
Sign up to set email alerts
|

Backwards from zero: How the U.S. public evaluates the use of zero-day vulnerabilities in cybersecurity

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
0
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(1 citation statement)
references
References 45 publications
0
0
0
Order By: Relevance
“…In the domain of Ethical Hacking (EH), developing innovative tools is essential to tackle emerging threats and vulnerabilities. Ethical Hacking tools are designed mainly by industry practitioners, occasionally by underground communities [2], and sometimes even by state actors [3]. However, even experienced security developers may overlook critical requirements for such applications.…”
Section: Introductionmentioning
confidence: 99%
“…In the domain of Ethical Hacking (EH), developing innovative tools is essential to tackle emerging threats and vulnerabilities. Ethical Hacking tools are designed mainly by industry practitioners, occasionally by underground communities [2], and sometimes even by state actors [3]. However, even experienced security developers may overlook critical requirements for such applications.…”
Section: Introductionmentioning
confidence: 99%