Limit search to available items
Book Cover
E-book
Author Metcalf, Leigh, author.

Title Cybersecurity and applied mathematics / Leigh Metcalf, William Casey
Published Cambridge, MA : Syngress is an imprint of Elsevier, [2016]
©2016

Copies

Description 1 online resource (xi, 188 pages) : illustrations
Contents Machine generated contents note: 2.1. Introduction to Set Theory -- 2.2. Operations on Sets -- 2.2.1.Complement -- 2.2.2. Intersection -- 2.2.3. Union -- 2.2.4. Difference -- 2.2.5. Symmetric Difference -- 2.2.6. Cross Product -- 2.3. Set Theory Laws -- 2.4. Functions -- 2.5. Metrics -- 2.6. Distance Variations -- 2.6.1. Pseudometric -- 2.6.2. Quasimetric -- 2.6.3. Semimetric -- 2.7. Similarities -- 2.8. Metrics and Similarities of Numbers -- 2.8.1. Lp Metrics -- 2.8.2. Gaussian Kernel -- 2.9. Metrics and Similarities of Strings -- 2.9.1. Levenshtein Distance -- 2.9.2. Hamming Distance -- 2.10. Metrics and Similarities of Sets of Sets -- 2.10.1. Jaccard Index -- 2.10.2. Tanimoto Distance -- 2.10.3. Overlap Coefficient -- 2.10.4. Hausdorff Metric -- 2.10.5. Kendall's Tau -- 2.11. Mahalanobis Distance -- 2.12. Internet Metrics -- 2.12.1. Great Circle Distance -- 2.12.2. Hop Distance -- 2.12.3. Keyword Distance -- 3.1. Basic Probability Review -- 3.1.1. Language and Axioms of Probability
Note continued: 3.1.2.Combinatorics Aka Parlor Tricks -- 3.1.3. Joint and Conditional Probability -- 3.1.4. Independence and Bayes Rule -- 3.2. From Parlor Tricks to Random Variables -- 3.2.1. Types of Random Variables -- 3.2.2. Properties of Random Variables -- 3.3. The Random Variable as a Model -- 3.3.1. Bernoulli and Geometric Distributions -- 3.3.2. Binomial Distribution -- 3.3.3. Poisson Distribution -- 3.3.4. Normal Distribution -- 3.3.5. Pareto Distributions -- 3.3.6. Uniform Distribution -- 3.4. Multiple Random Variables -- 3.5. Using Probability and Random Distributions -- 3.6. Conclusion -- 4.1. The Language of Data Analysis -- 4.1.1. Producing Data -- 4.1.2. Exploratory Data Analysis -- 4.1.3. Inference -- 4.2. Units, Variables, and Repeated Measures -- 4.2.1. Measurement Error and Random Variation -- 4.3. Distributions of Data -- 4.4. Visualizing Distributions -- 4.4.1. Bar Plot -- 4.4.2. Histogram -- 4.4.3. Box Plots -- 4.4.4. Density Plot -- 4.5. Data Outliers
Note continued: 4.6. Log Transformation -- 4.7. Parametric Families -- 4.8. Bivariate Analysis -- 4.8.1. Visualizing Bipartite Variables -- 4.8.2. Correlation -- 4.9. Time Series -- 4.10. Classification -- 4.11. Generating Hypotheses -- 4.12. Conclusion -- 5.1. An Introduction to Graph Theory -- 5.2. Varieties of Graphs -- 5.2.1. Undirected Graph -- 5.2.2. Directed Graph -- 5.2.3. Multigraph -- 5.2.4. Bipartite Graph -- 5.2.5. Subgraph -- 5.2.6. Graph Complement -- 5.3. Properties of Graphs -- 5.3.1. Graph Sizes -- 5.3.2. Vertices and Their Edges -- 5.3.3. Degree -- 5.3.4. Directed Graphs and Degrees -- 5.3.5. Scale Free Graphs -- 5.4. Paths, Cycles and Trees -- 5.4.1. Paths and Cycles -- 5.4.2. Shortest Paths -- 5.4.3. Connected and Disconnected Graphs -- 5.4.4. Trees -- 5.4.5. Cycles and Their Properties -- 5.4.6. Spanning Trees -- 5.5. Varieties of Graphs Revisited -- 5.5.1. Graph Density, Sparse and Dense Graphs -- 5.5.2.Complete and Regular Graphs -- 5.5.3. Weighted Graph
Note continued: 5.5.4. And Yet More Graphs! -- 5.6. Representing Graphs -- 5.6.1. Adjacency Matrix -- 5.6.2. Incidence Matrix -- 5.7. Triangles, the Smallest Cycle -- 5.7.1. Introduction and Counting -- 5.7.2. Triangle Free Graphs -- 5.7.3. The Local Clustering Coefficient -- 5.8. Distances on Graphs -- 5.8.1. Eccentricity -- 5.8.2. Cycle Length Properties -- 5.9. More Properties of Graphs -- 5.9.1. Cut -- 5.9.2. Bridge -- 5.9.3. Partitions -- 5.9.4. Vertex Separators -- 5.9.5. Cliques -- 5.10. Centrality -- 5.10.1. Betweenness -- 5.10.2. Degree Centrality -- 5.10.3. Closeness and Farness -- 5.10.4. Cross-Clique Centrality -- 5.11. Covering -- 5.11.1. Vertex Covering -- 5.11.2. Edge Cover -- 5.12. Creating New Graphs from Old -- 5.12.1. Union Graphs -- 5.12.2. Intersection Graphs -- 5.12.3. Uniting Graphs -- 5.12.4. The Intersection Graph -- 5.12.5. Modifying Existing Graphs -- 5.13. Conclusion -- 6.1. The Prisoner's Dilemma -- 6.2. The Mathematical Definition of a Game
Note continued: 6.2.1. Strategies, Payoffs and Normal Form -- 6.2.2. Normal Form -- 6.2.3. Extensive Form -- 6.3. Snowdrift Game -- 6.4. Stag Hunt Game -- 6.5. Iterative Prisoner's Dilemma -- 6.6. Game Solutions -- 6.6.1. Cooperative and Non-Cooperative Games -- 6.6.2. Zero Sum Game -- 6.6.3. Dominant Strategy -- 6.6.4. Nash Equilibrium -- 6.6.5. Mixed Strategy Nash Equilibrium -- 6.7. Partially Informed Games -- 6.8. Leader-Follower Game -- 6.8.1. Stackelberg Game -- 6.8.2. Colonel Blotto -- 6.9. Signaling Games -- 7.1. Why Visualize? -- 7.2. What We Visualize -- 7.2.1. Considering the Efficacy of a Visualization -- 7.2.2. Data Collection and Visualization -- 7.2.3. Visualizing Malware Features -- 7.2.4. Existence Plots -- 7.2.5.Combining Plots -- 7.3. Visualizing IP Addresses -- 7.3.1. Hilbert Curve -- 7.3.2. Heat Map -- 7.4. Plotting Higher Dimensional Data -- 7.4.1. Principal Component Analysis -- 7.4.2. Sammon Mapping -- 7.5. Graph Plotting -- 7.6. Visualizing Malware
Summary Cybersecurity and Applied Mathematics explores the mathematical concepts necessary for effective cybersecurity research and practice, taking an applied approach for practitioners and students entering the field. This book covers methods of statistical exploratory data analysis and visualization as a type of model for driving decisions, also discussing key topics, such as graph theory, topological complexes, and persistent homology. Defending the Internet is a complex effort, but applying the right techniques from mathematics can make this task more manageable. This book is essential reading for creating useful and replicable methods for analyzing data. Describes mathematical tools for solving cybersecurity problems, enabling analysts to pick the most optimal tool for the task at hand Contains numerous cybersecurity examples and exercises using real world data Written by mathematicians and statisticians with hands-on practitioner experience
Bibliography Includes bibliographical references (pages 179-182) and index
Notes Copyright and#169: Elsevier Science and Technology 2016
Print version record
Subject Computer security -- Mathematics
MATHEMATICS -- Discrete Mathematics.
Form Electronic book
Author Casey, William, author
ISBN 9780128044995
0128044993