Cybersecurity insurance: Modeling and pricing
Cybersecurity risk has attracted considerable attention in recent decades. However, the
modeling of cybersecurity risk is still in its infancy, mainly because of its unique …
modeling of cybersecurity risk is still in its infancy, mainly because of its unique …
[کتاب][B] Some models in the theory of computer viruses propagation
A Iliev, N Kyurkchiev, A Rahnev, T Terzieva - 2019 - researchgate.net
3.1 Introduction 35 3.2 Approximating cumulative number of Netsky worm variants 37 3.3
Approximating number of malicious hosts 39 3.4 Approximating cdf of content signatures for …
Approximating number of malicious hosts 39 3.4 Approximating cdf of content signatures for …
[PDF][PDF] Selected Topics in Mathematical Modeling: Some New Trends
1.1 Introduction 12 1.2 Preliminaries 13 1.3 Main Results 14 1.3. 1 Approximating the” real
wealth data” 18 1.3. 2 Approximating the” growth data (mean height) of sunflower plants” 18 …
wealth data” 18 1.3. 2 Approximating the” growth data (mean height) of sunflower plants” 18 …
A NEW CLASS OF ACTIVATION FUNCTIONS BASED ON THE CORRECTING AMENDMENTS OF GOMPERTZ-MAKEHAM TYPE.
We will explore the interesting methodological task for constructing new activation functions
using" correcting amendments" of" Gompertz-Makeham-type"(GMAF). We also define the …
using" correcting amendments" of" Gompertz-Makeham-type"(GMAF). We also define the …
From the dialectical perspective: Modeling and exploiting of hybrid worm propagation
The hierarchical network is the more effective platform, which provides multiple channels for
various worm propagation. Thus, emerging worms can infect vulnerable hosts by scanning …
various worm propagation. Thus, emerging worms can infect vulnerable hosts by scanning …
Hybrid spreading mechanisms and T cell activation shape the dynamics of HIV-1 infection
HIV-1 can disseminate between susceptible cells by two mechanisms: cell-free infection
following fluid-phase diffusion of virions and by highly-efficient direct cell-to-cell transmission …
following fluid-phase diffusion of virions and by highly-efficient direct cell-to-cell transmission …
Dynamic Malware Mitigation Strategies for IoT Networks: A Mathematical Epidemiology Approach
With the progress and evolution of the IoT, which has resulted in a rise in both the number of
devices and their applications, there is a growing number of malware attacks with higher …
devices and their applications, there is a growing number of malware attacks with higher …
[PDF][PDF] Investigations on some generalized trigonometric distributions. Properties and Applications
N Kyurkchiev, O Rahneva, A Iliev, A Malinova… - 2021 - researchgate.net
Untitled Page 1 Page 2 Nikolay Kyurkchiev, Olga Rahneva, Anton Iliev, Anna Malinova,
Asen Rahnev INVESTIGATIONS ON SOME GENERALIZED TRIGONOMETRIC …
Asen Rahnev INVESTIGATIONS ON SOME GENERALIZED TRIGONOMETRIC …
Optimizing hybrid spreading in metapopulations
Epidemic spreading phenomena are ubiquitous in nature and society. Examples include the
spreading of diseases, information and computer viruses. Epidemics can spread by local …
spreading of diseases, information and computer viruses. Epidemics can spread by local …
Statistical modeling of computer malware propagation dynamics in cyberspace
Modeling cyber threats, such as the computer malicious software (malware) propagation
dynamics in cyberspace, is an important research problem because models can deepen our …
dynamics in cyberspace, is an important research problem because models can deepen our …