Mathematical Approaches Transform Cybersecurity from Protoscience to Science

نویسندگان

چکیده

The area of cybersecurity problems has reached the stage becoming a science. This raises questions about connection between mathematical theories used in research and their relation to methodology for experiments conceptual models synthesized from academic community. proposes an analytical review ideas applied cyber-security theoretical explorations. meta viewpoint is dedicated standard issues. ground work methodological relating validation with exploration digital space. emphasizes application game theory, catastrophe queuing systems, Markov chains. methods are shown without claiming be exhaustive. goal currently established implementation approaches cybersecurity. A spectrum possibilities applying apparatus future given. After literature each presented approach, we expose list problematic areas which this already been implemented.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Cybersecurity: From Engineering to Science

Engineers design and build artifacts bridges, sewers, cars, airplanes, circuits, software -for human purposes. In their quest for function and elegance, they draw on the knowledge of materials, forces, and relationships developed through scientific study, but frequently their pursuit drives them to use materials and methods that go beyond the available scientific basis. Before the underlying sc...

متن کامل

From physical security to cybersecurity

Security is a critical concern around the world. In many domains from cyber-security to sustainability, limited security resources prevent complete security coverage at all times. Instead, these limited resources must be scheduled (or allocated or deployed), while simultaneously taking into account the importance of different targets, the responses of the adversaries to the security posture, an...

متن کامل

A systematic review of approaches to assessing cybersecurity awareness

Purpose – The purpose of this paper is to survey, explore and inform researchers about the previous methodologies applied, target audience and coverage of previous assessment of cybersecurity awareness by capturing, summarizing, synthesizing and critically comment on it. It is also conducted to identify the gaps in the cybersecurity awareness assessment research which warrants the future work. ...

متن کامل

Discrete Fourier Transform Compiler: From Mathematical Representation to Efficient Hardware

A wide range of hardware implementations are possible for the discrete Fourier transform (DFT), offering different tradeoffs in throughput, latency and cost. The well-understood structure of DFT algorithms makes possible a fully automatic synthesis framework that can span the viable interesting design choices. In this paper, we present such a synthesis framework that starts from formal mathemat...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Applied sciences

سال: 2023

ISSN: ['2076-3417']

DOI: https://doi.org/10.3390/app13116508