Search results

1 – 3 of 3
Book part
Publication date: 4 April 2017

Aleksandra Thurman

If moments of historical rupture create spaces for social change, what emerges to fill those gaps? This article approaches this question by exploring the creation of the…

Abstract

If moments of historical rupture create spaces for social change, what emerges to fill those gaps? This article approaches this question by exploring the creation of the “domestic” in 17th century Europe and Asia following the decline of the Spanish Habsburgs in the West and the Ming Dynasty in the East. Two events will serve as lenses through which that process will be explored. The first case centers on arguments for the legitimacy of the 1603 Dutch seizure of a Portuguese carrack in what would serve as the basis for Hugo Grotius’s defense of the free seas. The second debate focuses on the appropriate mourning ritual following the 1659 death of King Hyojong, the 17th ruler in Korea’s Choson dynasty. I argue that, in the process of responding to the crises they faced in their environments, social elites in both cases defined and articulated a conception of themselves as sovereign societies, creating a political space and corporate identity distinct from the extant institutional apparatus of the state and cultural framework of the nation.

Details

International Origins of Social and Political Theory
Type: Book
ISBN: 978-1-78714-267-1

Keywords

Book part
Publication date: 6 September 2019

Abstract

Details

Experiencing Persian Heritage
Type: Book
ISBN: 978-1-78754-813-8

Book part
Publication date: 29 May 2023

Divya Nair and Neeta Mhavan

A zero-day vulnerability is a complimentary ticket to the attackers for gaining entry into the network. Thus, there is necessity to device appropriate threat detection systems and…

Abstract

A zero-day vulnerability is a complimentary ticket to the attackers for gaining entry into the network. Thus, there is necessity to device appropriate threat detection systems and establish an innovative and safe solution that prevents unauthorised intrusions for defending various components of cybersecurity. We present a survey of recent Intrusion Detection Systems (IDS) in detecting zero-day vulnerabilities based on the following dimensions: types of cyber-attacks, datasets used and kinds of network detection systems.

Purpose: The study focuses on presenting an exhaustive review on the effectiveness of the recent IDS with respect to zero-day vulnerabilities.

Methodology: Systematic exploration was done at the IEEE, Elsevier, Springer, RAID, ESCORICS, Google Scholar, and other relevant platforms of studies published in English between 2015 and 2021 using keywords and combinations of relevant terms.

Findings: It is possible to train IDS for zero-day attacks. The existing IDS have strengths that make them capable of effective detection against zero-day attacks. However, they display certain limitations that reduce their credibility. Novel strategies like deep learning, machine learning, fuzzing technique, runtime verification technique, and Hidden Markov Models can be used to design IDS to detect malicious traffic.

Implication: This paper explored and highlighted the advantages and limitations of existing IDS enabling the selection of best possible IDS to protect the system. Moreover, the comparison between signature-based and anomaly-based IDS exemplifies that one viable approach to accurately detect the zero-day vulnerabilities would be the integration of hybrid mechanism.

Details

Smart Analytics, Artificial Intelligence and Sustainable Performance Management in a Global Digitalised Economy
Type: Book
ISBN: 978-1-80382-555-7

Keywords

1 – 3 of 3