Semantic Filter
show all semantic filters
Found 6 articles
  • Attack and Defense Strategies in Cyber War Involving Production and Stockpiling of Zero-Day Cyber Exploits

    PDF

    2021 | Information Systems Frontiers | Citations: 0

    Authors: Hausken, Kjell; Welburn, Jonathan W.

    Abstract: Two players strike balances between allocating resources for defense and product ... Expand

    Semantic filters: zero-day vulnerability

    Topics: zero-day vulnerability accounting anonymity

    Methods: simulation

  • An Architecture for Federated Learning Enabled Collaborative Intrusion Detection System

    2021 | Americas Conference on Information Systems | Citations: 0

    Authors: McOsker, Caitlin; Handlin, Michael; Li, Lei; Shahriar, Hossain; Zhao, Liang

    Abstract: Intrusion Detection Systems (IDSs) are essential part of a security solution to ... Expand

    Semantic filters: zero-day vulnerability

    Topics: privacy intrusion detection system zero-day vulnerability open source open source software project

    Methods: machine learning federated learning experiment design artifact computational algorithm

  • Examining Exploitability Risk of Vulnerabilities: A Hazard Model

    PDF

    2020 | Communications of the Association for Information Systems | Citations: 1

    Authors: Roumani, Yaman; Nwankpa, Joseph

    Abstract: With the increasing number and severity of security incidents and exploits, info ... Expand

    Semantic filters: zero-day vulnerability

    Topics: electronic authentication research and development database system privacy SQL injection

    Methods: regression analysis method survival analysis proportional hazards model game theoretical model Compustat

    Theories: game theory theory of bounded rationality

  • Detection of online phishing email using dynamic evolving neural network based on reinforcement learning

    PDF

    2018 | Decision Support Systems | Citations: 11

    Authors: Smadi, Sami; Aslam, Nauman; Zhang, Li

    Abstract: Despite state-of-the-art solutions to detect phishing attacks, there is still a ... Expand

    Semantic filters: zero-day vulnerability

    Topics: electronic mail phishing email phishing email spam systems development

    Methods: computational algorithm experiment machine learning decision tree classification reinforcement learning

  • Information Disclosure and the Diffusion of Information Security Attacks

    PDF

    2015 | Information Systems Research | Citations: 32

    Authors: Mitra, Sabyasachi; Ransbotham, Sam

    Abstract: With the nearly instantaneous dissemination of information in the modern era, po ... Expand

    Semantic filters: zero-day vulnerability

    Topics: innovation management intrusion detection system database system data security diffusion of innovation

    Methods: longitudinal research mathematical model proportional hazards model regression analysis method Poisson regression

  • Using time-driven activity-based costing to manage digital forensic readiness in large organisations

    PDF

    2012 | Information Systems Frontiers | Citations: 0

    Authors: Reddy, K.; Venter, H. S.; Olivier, M. S.

    Abstract: A digital forensic readiness (DFR) programme consists of a number of activities ... Expand

    Semantic filters: zero-day vulnerability

    Topics: firewall data security decision making privacy Java

    Methods: simulation literature study survey stochastic simulation computational algorithm