A stochastic model of cyber attacks with imperfect detection
From MaRDI portal
Publication:5077413
DOI10.1080/03610926.2019.1568489OpenAlexW2913306586WikidataQ128415629 ScholiaQ128415629MaRDI QIDQ5077413FDOQ5077413
Publication date: 18 May 2022
Published in: Communications in Statistics: Theory and Methods (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1080/03610926.2019.1568489
Recommendations
hidden Markov chainfirst hitting timestochastic orderstrong dominancesub-probability transition matrix
Cites Work
- Inequalities: theory of majorization and its applications
- Stochastic orders
- Stochastic Processes with Applications
- Service reliability modeling of distributed computing systems with virus epidemics
- Cyber Epidemic Models with Dependences
- Dependence Comparison of Multivariate Extremes via Stochastic Tail Orders
- Defense and attack for interdependent systems
- Usual and stochastic tail orders between hitting times for two Markov chains
Cited In (8)
- Ordering fail-safe systems having dependent components with Archimedean copula and exponentiated location-scale distributions
- A Markov Model of Non-Mutually Exclusive Cyber Threats and its Applications for Selecting an Optimal Set of Information Security Remedies
- Mathematical description of cyber-attacks and proactive defences
- Dynamic system with random structure for modeling security and risk management in cyberspace
- Modeling cyber-security
- Stochastic comparisons on extremes of burr type XII samples associated with Archimedean copula and heterogeneous shape parameters
- On strategic defense in stochastic networks
- Stochastic analysis of cyber-attacks
This page was built for publication: A stochastic model of cyber attacks with imperfect detection
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5077413)