2016
DOI: 10.1016/j.cose.2016.05.001
|View full text |Cite
|
Sign up to set email alerts
|

Cyber resilience recovery model to combat zero-day malware attacks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
12
0
1

Year Published

2017
2017
2024
2024

Publication Types

Select...
3
3
3

Relationship

0
9

Authors

Journals

citations
Cited by 34 publications
(13 citation statements)
references
References 8 publications
0
12
0
1
Order By: Relevance
“…Recent researches in the detection and correction of vulnerabilities include reactive security approaches. Hence, Tran et al [4] propose an early vulnerabilities detection model to identify and prevent zero-day attacks. Murtaza et al [5] analyze tendencies and patterns of vulnerabilities in software.…”
Section: Background and Related Workmentioning
confidence: 99%
“…Recent researches in the detection and correction of vulnerabilities include reactive security approaches. Hence, Tran et al [4] propose an early vulnerabilities detection model to identify and prevent zero-day attacks. Murtaza et al [5] analyze tendencies and patterns of vulnerabilities in software.…”
Section: Background and Related Workmentioning
confidence: 99%
“…Haider et al [16] applied data sets based on the Windows Operating System to evaluate the robustness of host-based intrusion detection systems to zero-day and stealth attacks. Tran et al [17] implemented an epidemiological model to combat zero-day attacks. They proposed a dynamic recovery model to combat the simulated attack and minimize disruptions.…”
Section: Mitigation Robustness Recovery and Simulationmentioning
confidence: 99%
“…If it is exceeded, Player 1 must decrease either the effort Z 11 or the stockpiling S 1 that deters Player 2 in Period 2. Let us analyze the event that Player 1 chooses stockpiling S 1 to deter, as in (24), and uses the budget constraint R 11 in (1) to determine Z 11 (which is then lower than the optimal Z 11 with no budget constraint in (17)). Applying (24), and the budget constraint in (1) gives the three equations = 0 in (17) together with S 1 in (18).…”
Section: Solution 5 (Z 12mentioning
confidence: 99%
“…Zero-day Attack (0-gün) -əsasən bir proqramda boşluğun aşkar etdikdən gün və ya zəyiflik tapıldıqdan sonra proqram yaradıcı şirkət tərəfindən yeniləmə tətbiq edilənə qədər istifadə edilən boşluq növüdür [2].…”
Section: Ki̇ber Hücum Metodlariunclassified