Cybersecurity insurance: Modeling and pricing

M Xu, L Hua - North American Actuarial Journal, 2019‏ - Taylor & Francis
Cybersecurity risk has attracted considerable attention in recent decades. However, the
modeling of cybersecurity risk is still in its infancy, mainly because of its unique …

[کتاب][B] Some models in the theory of computer viruses propagation

A Iliev, N Kyurkchiev, A Rahnev, T Terzieva - 2019‏ - researchgate.net
3.1 Introduction 35 3.2 Approximating cumulative number of Netsky worm variants 37 3.3
Approximating number of malicious hosts 39 3.4 Approximating cdf of content signatures for …

[PDF][PDF] Selected Topics in Mathematical Modeling: Some New Trends

N Kyurkchiev - … to Academician Blagovest Sendov (1932-2020) …, 2020‏ - researchgate.net
1.1 Introduction 12 1.2 Preliminaries 13 1.3 Main Results 14 1.3. 1 Approximating the” real
wealth data” 18 1.3. 2 Approximating the” growth data (mean height) of sunflower plants” 18 …

A NEW CLASS OF ACTIVATION FUNCTIONS BASED ON THE CORRECTING AMENDMENTS OF GOMPERTZ-MAKEHAM TYPE.

N Kyurkchiev, A Iliev, A Rahnev - Dynamic Systems and Applications, 2019‏ - go.gale.com
We will explore the interesting methodological task for constructing new activation functions
using" correcting amendments" of" Gompertz-Makeham-type"(GMAF). We also define the …

From the dialectical perspective: Modeling and exploiting of hybrid worm propagation

T Wang, H Li, C **a, H Zhang… - IEEE Transactions on …, 2023‏ - ieeexplore.ieee.org
The hierarchical network is the more effective platform, which provides multiple channels for
various worm propagation. Thus, emerging worms can infect vulnerable hosts by scanning …

Hybrid spreading mechanisms and T cell activation shape the dynamics of HIV-1 infection

C Zhang, S Zhou, E Groppelli… - PLoS computational …, 2015‏ - journals.plos.org
HIV-1 can disseminate between susceptible cells by two mechanisms: cell-free infection
following fluid-phase diffusion of virions and by highly-efficient direct cell-to-cell transmission …

Dynamic Malware Mitigation Strategies for IoT Networks: A Mathematical Epidemiology Approach

R Casado-Vara, M Severt, A Díaz-Longueira, ÁM Rey… - Mathematics, 2024‏ - mdpi.com
With the progress and evolution of the IoT, which has resulted in a rise in both the number of
devices and their applications, there is a growing number of malware attacks with higher …

[PDF][PDF] Investigations on some generalized trigonometric distributions. Properties and Applications

N Kyurkchiev, O Rahneva, A Iliev, A Malinova… - 2021‏ - researchgate.net
Untitled Page 1 Page 2 Nikolay Kyurkchiev, Olga Rahneva, Anton Iliev, Anna Malinova,
Asen Rahnev INVESTIGATIONS ON SOME GENERALIZED TRIGONOMETRIC …

Optimizing hybrid spreading in metapopulations

C Zhang, S Zhou, JC Miller, IJ Cox, BM Chain - Scientific reports, 2015‏ - nature.com
Epidemic spreading phenomena are ubiquitous in nature and society. Examples include the
spreading of diseases, information and computer viruses. Epidemics can spread by local …

Statistical modeling of computer malware propagation dynamics in cyberspace

Z Fang, P Zhao, M Xu, S Xu, T Hu… - Journal of Applied …, 2022‏ - Taylor & Francis
Modeling cyber threats, such as the computer malicious software (malware) propagation
dynamics in cyberspace, is an important research problem because models can deepen our …