Zero-day vulnerability (English Wikipedia)

Analysis of information sources in references of the Wikipedia article "Zero-day vulnerability" in English language version.

refsWebsite
Global rank English rank
2,921st place
2,118th place
1st place
1st place
5th place
5th place
26th place
20th place
2nd place
2nd place
274th place
309th place
69th place
59th place
11th place
8th place
low place
low place
193rd place
152nd place
low place
low place
low place
low place
low place
low place
low place
low place
786th place
558th place
low place
low place
2,435th place
1,699th place
low place
low place
low place
low place

arxiv.org

  • Guo, Mingyu; Wang, Guanhua; Hata, Hideaki; Babar, Muhammad Ali (2021-07-01). "Revenue maximizing markets for zero-day exploits". Autonomous Agents and Multi-Agent Systems. 35 (2): 36. arXiv:2006.14184. doi:10.1007/s10458-021-09522-w. ISSN 1387-2532. S2CID 254225904.

ccdcoe.org

cyberlaw.ccdcoe.org

citizenlab.ca

doi.org

  • Guo, Mingyu; Wang, Guanhua; Hata, Hideaki; Babar, Muhammad Ali (2021-07-01). "Revenue maximizing markets for zero-day exploits". Autonomous Agents and Multi-Agent Systems. 35 (2): 36. arXiv:2006.14184. doi:10.1007/s10458-021-09522-w. ISSN 1387-2532. S2CID 254225904.
  • Leal, Marcelo M.; Musgrave, Paul (2023). "Backwards from zero: How the U.S. public evaluates the use of zero-day vulnerabilities in cybersecurity". Contemporary Security Policy. 44 (3): 437–461. doi:10.1080/13523260.2023.2216112. ISSN 1352-3260.
  • Ahmad et al. 2023, p. 10733. Ahmad, Rasheed; Alsmadi, Izzat; Alhamdani, Wasim; Tawalbeh, Lo’ai (2023). "Zero-day attack detection: a systematic literature review". Artificial Intelligence Review. 56 (10): 10733–10811. doi:10.1007/s10462-023-10437-z. ISSN 1573-7462.

eset.co.uk

jstor.org

kaspersky.com

eugene.kaspersky.com

markmaunder.com

pctools.com

  • Compare: "What is a Zero-Day Vulnerability?". pctools. Symantec. Archived from the original on 2017-07-04. Retrieved 2016-01-20. A zero day vulnerability refers to an exploitable bug in software that is unknown to the vendor. This security hole may be exploited by crackers before the vendor becomes aware and hurries to fix it—this exploit is called a zero day attack.

rand.org

s-rminform.com

semanticscholar.org

api.semanticscholar.org

  • Guo, Mingyu; Wang, Guanhua; Hata, Hideaki; Babar, Muhammad Ali (2021-07-01). "Revenue maximizing markets for zero-day exploits". Autonomous Agents and Multi-Agent Systems. 35 (2): 36. arXiv:2006.14184. doi:10.1007/s10458-021-09522-w. ISSN 1387-2532. S2CID 254225904.

springer.com

link.springer.com

  • Guo, Mingyu; Wang, Guanhua; Hata, Hideaki; Babar, Muhammad Ali (2021-07-01). "Revenue maximizing markets for zero-day exploits". Autonomous Agents and Multi-Agent Systems. 35 (2): 36. arXiv:2006.14184. doi:10.1007/s10458-021-09522-w. ISSN 1387-2532. S2CID 254225904.
  • Ahmad et al. 2023, p. 10733. Ahmad, Rasheed; Alsmadi, Izzat; Alhamdani, Wasim; Tawalbeh, Lo’ai (2023). "Zero-day attack detection: a systematic literature review". Artificial Intelligence Review. 56 (10): 10733–10811. doi:10.1007/s10462-023-10437-z. ISSN 1573-7462.

techmonitor.ai

techtarget.com

web.archive.org

wired.com

worldcat.org

search.worldcat.org

  • Guo, Mingyu; Wang, Guanhua; Hata, Hideaki; Babar, Muhammad Ali (2021-07-01). "Revenue maximizing markets for zero-day exploits". Autonomous Agents and Multi-Agent Systems. 35 (2): 36. arXiv:2006.14184. doi:10.1007/s10458-021-09522-w. ISSN 1387-2532. S2CID 254225904.
  • Leal, Marcelo M.; Musgrave, Paul (2023). "Backwards from zero: How the U.S. public evaluates the use of zero-day vulnerabilities in cybersecurity". Contemporary Security Policy. 44 (3): 437–461. doi:10.1080/13523260.2023.2216112. ISSN 1352-3260.
  • Ahmad et al. 2023, p. 10733. Ahmad, Rasheed; Alsmadi, Izzat; Alhamdani, Wasim; Tawalbeh, Lo’ai (2023). "Zero-day attack detection: a systematic literature review". Artificial Intelligence Review. 56 (10): 10733–10811. doi:10.1007/s10462-023-10437-z. ISSN 1573-7462.
  • Dellago, Simpson & Woods 2022, p. 41. Dellago, Matthias; Simpson, Andrew C.; Woods, Daniel W. (2022). "Exploit Brokers and Offensive Cyber Operations". The Cyber Defense Review. 7 (3): 31–48. ISSN 2474-2120. JSTOR 48682321.
  • Dellago, Simpson & Woods 2022, p. 33. Dellago, Matthias; Simpson, Andrew C.; Woods, Daniel W. (2022). "Exploit Brokers and Offensive Cyber Operations". The Cyber Defense Review. 7 (3): 31–48. ISSN 2474-2120. JSTOR 48682321.
  • Dellago, Simpson & Woods 2022, pp. 31, 41. Dellago, Matthias; Simpson, Andrew C.; Woods, Daniel W. (2022). "Exploit Brokers and Offensive Cyber Operations". The Cyber Defense Review. 7 (3): 31–48. ISSN 2474-2120. JSTOR 48682321.
  • Dellago, Simpson & Woods 2022, p. 42: "The number of independent active sellers (between 400[31] and 1500[35] individuals) ... 2015,[35] suggests an annual pay of $5.5k - 20.8k per researcher." Dellago, Matthias; Simpson, Andrew C.; Woods, Daniel W. (2022). "Exploit Brokers and Offensive Cyber Operations". The Cyber Defense Review. 7 (3): 31–48. ISSN 2474-2120. JSTOR 48682321.

zdnet.com