2013
DOI: 10.1007/978-1-4614-7597-2_1
|View full text |Cite
|
Sign up to set email alerts
|

Towards Fundamental Science of Cyber Security

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
25
0

Year Published

2016
2016
2022
2022

Publication Types

Select...
5
1

Relationship

1
5

Authors

Journals

citations
Cited by 25 publications
(25 citation statements)
references
References 20 publications
0
25
0
Order By: Relevance
“…Although many solutions have been proposed, there is still no definite answer on how to effectively and precisely predict cyber attacks. Attack prediction is not yet used in practice and sometimes seen as rather misleading [121], but it is still an open and an imperative, desirable research problem [1], [3], [120].…”
Section: Discussionmentioning
confidence: 99%
See 3 more Smart Citations
“…Although many solutions have been proposed, there is still no definite answer on how to effectively and precisely predict cyber attacks. Attack prediction is not yet used in practice and sometimes seen as rather misleading [121], but it is still an open and an imperative, desirable research problem [1], [3], [120].…”
Section: Discussionmentioning
confidence: 99%
“…The modification consists of an extension of the underlining Grey-Verhulst model. While the original model from which the differential equation is derived assumes that x 0 (k) + az 1…”
Section: B Grey Modelsmentioning
confidence: 99%
See 2 more Smart Citations
“…Quantum computing and networking are already fueling lively debate, with one side making claims for the technologies' inherent security while the other side highlights the opportunities it presents for hacking. Biologically inspired computation and communication paradigms-for example, the Gaian dynamic distributed federated database (Toth et al 2013) and related cybersecurity applications, such as artificial immune systems-will attract growing interest, especially as they offer promises for autonomous adaptation to previously unknown threats and even self-healing (Kott 2014).…”
Section: New Computing Paradigmsmentioning
confidence: 99%