Buy Mathematics in Cyber Research by Daniel T. Bennett
Book 1
Book 2
Book 3
Book 1
Book 2
Book 3
Book 1
Book 2
Book 3
Book 1
Book 2
Book 3
Home > Mathematics and Science Textbooks > Mathematics > Applied mathematics > Mathematics in Cyber Research
Mathematics in Cyber Research

Mathematics in Cyber Research


     0     
5
4
3
2
1



Out of Stock


Notify me when this book is in stock
X
About the Book

In the last decade, both scholars and practitioners have sought novel ways to address the problem of cybersecurity. Innovative outcomes have included applications such as blockchain as well as creative methods for cyber forensics, software development, and intrusion prevention. Accompanying these technological advancements, discussion on cyber matters at national and international levels has focused primarily on the topics of law, policy, and strategy. The objective of these efforts is typically to promote security by establishing agreements among stakeholders on regulatory activities. Varying levels of investment in cyberspace, however, comes with varying levels of risk; in some ways, this can translate directly to the degree of emphasis for pushing substantial change. At the very foundation or root of cyberspace systems and processes are tenets and rules governed by principles in mathematics. Topics such as encrypting or decrypting file transmissions, modeling networks, performing data analysis, quantifying uncertainty, measuring risk, and weighing decisions or adversarial courses of action represent a very small subset of activities highlighted by mathematics. To facilitate education and a greater awareness of the role of mathematics in cyber systems and processes, a description of research in this area is needed. Mathematics in Cyber Research aims to familiarize educators and young researchers with the breadth of mathematics in cyber-related research. Each chapter introduces a mathematical sub-field, describes relevant work in this field associated with the cyber domain, provides methods and tools, as well as details cyber research examples or case studies. Features One of the only books to bring together such a diverse and comprehensive range of topics within mathematics and apply them to cyber research. Suitable for college undergraduate students or educators that are either interested in learning about cyber-related mathematics or intend to perform research within the cyber domain. The book may also appeal to practitioners within the commercial or government industry sectors. Most national and international venues for collaboration and discussion on cyber matters have focused primarily on the topics of law, policy, strategy, and technology. This book is among the first to address the underpinning mathematics.

Table of Contents:
1. Combinatorics. 2. Cryptography. 3. Algebraic Geometry. 4. Topology. 5. Differential Equations. 6. Network Science. 7. Operations Research. 8. Data Analysis. 9. Statistics. 10. Probability Theory. 11. Game Theory. 12. Number Theory. 13. Quantum Theory. 14. Group Theory. 15. Ring Theory.

About the Author :
Dr. Paul L. Goethals is an Academy Professor and the Director of Research for the Department of Mathematical Sciences at the United States Military Academy. He earned an M.S. degree in Mathematics from Florida State University in 2002 and a Ph.D. in Industrial Engineering from Clemson University in 2011. Dr. Goethals has served 29 years of active duty service within the United States Army, most recently as a Research Scientist at the Army Cyber Institute and as a member of the Commander’s Action Group within the United States Cyber Command. He currently serves on the editorial board for the Cyber Defense Review and has served as the Editor-in-Chief of the International Journal of Experimental Design and Process Optimization since 2012. Dr. Natalie M. Scala is an Associate Professor and Director of the graduate programs in Supply Chain Management in the College of Business and Economics at Towson University. She earned Ph.D. and M.S. degrees in Industrial Engineering from the University of Pittsburgh. Her primary research is in decision analysis, with foci on military applications and cybersecurity. Specific projects include army unit readiness, risk in voting systems, cybersecurity metrics and best practices, naval seabasing, nuclear power plants, and workforce planning. Dr. Scala frequently consults to government clients and has extensive professional experience, to include positions with Innovative Decisions, Inc., the United States Department of Defense, and the RAND Corporation. Her first book, a co-edited volume titled Handbook of Military and Defense Operations Research, was released by CRC Press in early 2020. Dr. Daniel T. Bennett is the Senior Research and Operations Advisor for Energy Security and Resilience at the National Renewable Energy Laboratory (NREL). He has a Ph.D. and M.S. in Electrical Engineering from the University of Colorado at Boulder. Dan came to NREL from the Army Cyber Institute at the U.S. Military Academy where he led research for the Army’s cyber think tank. While at West Point, he was also an Associate Professor in the Department of Electrical Engineering and Computer Science where he was the Academy’s recognized expert in analog, digital and wireless communications systems and networks. He also recently served a yearlong tour as Technical Director Advisor to the 2-star commander of U.S. Cyber Command’s Cyber National Mission Force at Ft. Meade, MD. Previous experiences include 15 months as Director of the Joint Network Operations & Security Center for Combined Joint Task Force-101 in Bagram, Afghanistan. Currently he is a technical lead on the Department of Energy’s ‘5G Catalogue’.

Review :
"This volume edited by Goethals (United States Military Academy), Scala (Towson Univ.), and Bennett (National Renewable Energy Laboratory) is one of the best showcases of foundational algorithms and new research directions applied to computing this reviewer has seen. The range of topics could provide a basis for implementation in many areas. Although it would be impossible to cover all mathematical contributions to computer science in one book, the breadth of content here inspires awe. Fields include combinatorics, cryptography, data analytics, game theory, and quantum theory, and cybersecurity is emphasized in several chapters. Contributing authors position their material in the context of interconnectivity, the Internet of Things, and quantum computing. Readers will need significant background in linear algebra, calculus, and statistics. Naturally, foundational knowledge in computer science (networking, AI, and the theory of computation) will be helpful. A list of references accompanies each chapter, facilitating preliminary research toward more-advanced studies. Overall, the book is an excellent resource for students interested in applied math or advanced algorithms and for experienced scientists, educators, or practitioners who must investigate mathematical topics in a computing domain. Practically all areas covered are worthy of attention from graduate and postgraduate researchers. In addition, many sections include practical applications in computing and system development. Summing Up: Highly recommended. Lower- and upper-division undergraduates. Graduate students, faculty, and professionals." - J. Brzezinski, McHenry County College, CHOICE Review


Best Sellers


Product Details
  • ISBN-13: 9781000542691
  • Publisher: Taylor & Francis Ltd
  • Publisher Imprint: Chapman & Hall/CRC
  • Language: English
  • ISBN-10: 1000542696
  • Publisher Date: 06 Feb 2022
  • Binding: Digital (delivered electronically)


Similar Products

Add Photo
Add Photo

Customer Reviews

REVIEWS      0     
Click Here To Be The First to Review this Product
Mathematics in Cyber Research
Taylor & Francis Ltd -
Mathematics in Cyber Research
Writing guidlines
We want to publish your review, so please:
  • keep your review on the product. Review's that defame author's character will be rejected.
  • Keep your review focused on the product.
  • Avoid writing about customer service. contact us instead if you have issue requiring immediate attention.
  • Refrain from mentioning competitors or the specific price you paid for the product.
  • Do not include any personally identifiable information, such as full names.

Mathematics in Cyber Research

Required fields are marked with *

Review Title*
Review
    Add Photo Add up to 6 photos
    Would you recommend this product to a friend?
    Tag this Book Read more
    Does your review contain spoilers?
    What type of reader best describes you?
    I agree to the terms & conditions
    You may receive emails regarding this submission. Any emails will include the ability to opt-out of future communications.

    CUSTOMER RATINGS AND REVIEWS AND QUESTIONS AND ANSWERS TERMS OF USE

    These Terms of Use govern your conduct associated with the Customer Ratings and Reviews and/or Questions and Answers service offered by Bookswagon (the "CRR Service").


    By submitting any content to Bookswagon, you guarantee that:
    • You are the sole author and owner of the intellectual property rights in the content;
    • All "moral rights" that you may have in such content have been voluntarily waived by you;
    • All content that you post is accurate;
    • You are at least 13 years old;
    • Use of the content you supply does not violate these Terms of Use and will not cause injury to any person or entity.
    You further agree that you may not submit any content:
    • That is known by you to be false, inaccurate or misleading;
    • That infringes any third party's copyright, patent, trademark, trade secret or other proprietary rights or rights of publicity or privacy;
    • That violates any law, statute, ordinance or regulation (including, but not limited to, those governing, consumer protection, unfair competition, anti-discrimination or false advertising);
    • That is, or may reasonably be considered to be, defamatory, libelous, hateful, racially or religiously biased or offensive, unlawfully threatening or unlawfully harassing to any individual, partnership or corporation;
    • For which you were compensated or granted any consideration by any unapproved third party;
    • That includes any information that references other websites, addresses, email addresses, contact information or phone numbers;
    • That contains any computer viruses, worms or other potentially damaging computer programs or files.
    You agree to indemnify and hold Bookswagon (and its officers, directors, agents, subsidiaries, joint ventures, employees and third-party service providers, including but not limited to Bazaarvoice, Inc.), harmless from all claims, demands, and damages (actual and consequential) of every kind and nature, known and unknown including reasonable attorneys' fees, arising out of a breach of your representations and warranties set forth above, or your violation of any law or the rights of a third party.


    For any content that you submit, you grant Bookswagon a perpetual, irrevocable, royalty-free, transferable right and license to use, copy, modify, delete in its entirety, adapt, publish, translate, create derivative works from and/or sell, transfer, and/or distribute such content and/or incorporate such content into any form, medium or technology throughout the world without compensation to you. Additionally,  Bookswagon may transfer or share any personal information that you submit with its third-party service providers, including but not limited to Bazaarvoice, Inc. in accordance with  Privacy Policy


    All content that you submit may be used at Bookswagon's sole discretion. Bookswagon reserves the right to change, condense, withhold publication, remove or delete any content on Bookswagon's website that Bookswagon deems, in its sole discretion, to violate the content guidelines or any other provision of these Terms of Use.  Bookswagon does not guarantee that you will have any recourse through Bookswagon to edit or delete any content you have submitted. Ratings and written comments are generally posted within two to four business days. However, Bookswagon reserves the right to remove or to refuse to post any submission to the extent authorized by law. You acknowledge that you, not Bookswagon, are responsible for the contents of your submission. None of the content that you submit shall be subject to any obligation of confidence on the part of Bookswagon, its agents, subsidiaries, affiliates, partners or third party service providers (including but not limited to Bazaarvoice, Inc.)and their respective directors, officers and employees.

    Accept

    Fresh on the Shelf


    Inspired by your browsing history


    Your review has been submitted!

    You've already reviewed this product!