Mathematical Approaches Transform Cybersecurity from Protoscience to Science
نویسندگان
چکیده
The area of cybersecurity problems has reached the stage becoming a science. This raises questions about connection between mathematical theories used in research and their relation to methodology for experiments conceptual models synthesized from academic community. proposes an analytical review ideas applied cyber-security theoretical explorations. meta viewpoint is dedicated standard issues. ground work methodological relating validation with exploration digital space. emphasizes application game theory, catastrophe queuing systems, Markov chains. methods are shown without claiming be exhaustive. goal currently established implementation approaches cybersecurity. A spectrum possibilities applying apparatus future given. After literature each presented approach, we expose list problematic areas which this already been implemented.
منابع مشابه
Cybersecurity: From Engineering to Science
Engineers design and build artifacts bridges, sewers, cars, airplanes, circuits, software -for human purposes. In their quest for function and elegance, they draw on the knowledge of materials, forces, and relationships developed through scientific study, but frequently their pursuit drives them to use materials and methods that go beyond the available scientific basis. Before the underlying sc...
متن کاملFrom physical security to cybersecurity
Security is a critical concern around the world. In many domains from cyber-security to sustainability, limited security resources prevent complete security coverage at all times. Instead, these limited resources must be scheduled (or allocated or deployed), while simultaneously taking into account the importance of different targets, the responses of the adversaries to the security posture, an...
متن کاملA systematic review of approaches to assessing cybersecurity awareness
Purpose – The purpose of this paper is to survey, explore and inform researchers about the previous methodologies applied, target audience and coverage of previous assessment of cybersecurity awareness by capturing, summarizing, synthesizing and critically comment on it. It is also conducted to identify the gaps in the cybersecurity awareness assessment research which warrants the future work. ...
متن کاملDiscrete Fourier Transform Compiler: From Mathematical Representation to Efficient Hardware
A wide range of hardware implementations are possible for the discrete Fourier transform (DFT), offering different tradeoffs in throughput, latency and cost. The well-understood structure of DFT algorithms makes possible a fully automatic synthesis framework that can span the viable interesting design choices. In this paper, we present such a synthesis framework that starts from formal mathemat...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Applied sciences
سال: 2023
ISSN: ['2076-3417']
DOI: https://doi.org/10.3390/app13116508