Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Discipline
Articles 1 - 2 of 2
Full-Text Articles in Physical Sciences and Mathematics
Cybersecurity: Probabilistic Behavior Of Vulnerability And Life Cycle, Sasith Maduranga Rajasooriya
Cybersecurity: Probabilistic Behavior Of Vulnerability And Life Cycle, Sasith Maduranga Rajasooriya
USF Tampa Graduate Theses and Dissertations
Analysis on Vulnerabilities and Vulnerability Life Cycle is at the core of Cybersecurity related studies. Vulnerability Life Cycle discussed by S. Frei and studies by several other scholars have noted the importance of this approach. Application of Statistical Methodologies in Cybersecurity related studies call for a greater deal of new information. Using currently available data from National Vulnerability Database this study develops and presents a set of useful Statistical tools to be applied in Cybersecurity related decision making processes.
In the present study, the concept of Vulnerability Space is defined as a probability space. Relevant theoretical analyses are conducted and …
Cybersecurity: Stochastic Analysis And Modelling Of Vulnerabilities To Determine The Network Security And Attackers Behavior, Pubudu Kalpani Kaluarachchi
Cybersecurity: Stochastic Analysis And Modelling Of Vulnerabilities To Determine The Network Security And Attackers Behavior, Pubudu Kalpani Kaluarachchi
USF Tampa Graduate Theses and Dissertations
Development of Cybersecurity processes and strategies should take two main approaches. One is to develop an efficient and effective set of methodologies to identify software vulnerabilities and patch them before being exploited. Second is to develop a set of methodologies to predict the behavior of attackers and execute defending techniques based on attacking behavior. Managing of Vulnerabilities and analyzing them is directly related to the first approach. Developing of methodologies and models to predict the behavior of attackers is related to the second approach. Both these approaches are inseparably interconnected. Our effort in this study mainly focuses on developing useful …