Modeling cyber-security
From MaRDI portal
Publication:1624975
DOI10.1007/978-3-319-74325-7_3zbMath1400.68147OpenAlexW2833476206MaRDI QIDQ1624975
Nicholas J. Daras, Argyrios Alexopoulos
Publication date: 28 November 2018
Full work available at URL: https://doi.org/10.1007/978-3-319-74325-7_3
mathematical modelingmeasure theorycomplex spacescyber-defensecyber-effectcyber-interactiongerm of cyber-attackinternet topicsnode supervisionproactive cyber-protectionvaluation of a part of node constituentvulnerability of a part of node constituent
Graph theory (including graph drawing) in computer science (68R10) Internet topics (68M11) Theory of computing (68Q99)
This page was built for publication: Modeling cyber-security