Standard

Four-State Model of Cybersecurity. / Kolokoltsov, Vassili N.; Malafeyev, Oleg A.

Springer Series in Operations Research and Financial Engineering. Springer Nature, 2019. стр. 133-146 (Springer Series in Operations Research and Financial Engineering).

Результаты исследований: Публикации в книгах, отчётах, сборниках, трудах конференцийглава/разделнаучнаяРецензирование

Harvard

Kolokoltsov, VN & Malafeyev, OA 2019, Four-State Model of Cybersecurity. в Springer Series in Operations Research and Financial Engineering. Springer Series in Operations Research and Financial Engineering, Springer Nature, стр. 133-146. https://doi.org/10.1007/978-3-030-12371-0_7

APA

Kolokoltsov, V. N., & Malafeyev, O. A. (2019). Four-State Model of Cybersecurity. в Springer Series in Operations Research and Financial Engineering (стр. 133-146). (Springer Series in Operations Research and Financial Engineering). Springer Nature. https://doi.org/10.1007/978-3-030-12371-0_7

Vancouver

Kolokoltsov VN, Malafeyev OA. Four-State Model of Cybersecurity. в Springer Series in Operations Research and Financial Engineering. Springer Nature. 2019. стр. 133-146. (Springer Series in Operations Research and Financial Engineering). https://doi.org/10.1007/978-3-030-12371-0_7

Author

Kolokoltsov, Vassili N. ; Malafeyev, Oleg A. / Four-State Model of Cybersecurity. Springer Series in Operations Research and Financial Engineering. Springer Nature, 2019. стр. 133-146 (Springer Series in Operations Research and Financial Engineering).

BibTeX

@inbook{001cb32e1bc443b6a7f3fbda0aba972d,
title = "Four-State Model of Cybersecurity",
abstract = "Here we introduce yet another concrete MFG model in the framework of cybersecurity. It is a four-state model, and it models the response of computer owners to various offers of defense systems against a cyberhacker (for instance, a botnet attack). The model takes into account both the random process of the propagation of the infection (controlled by the botnet herder) and the decision-making process of customers. Its stationary version is again exactly solvable (but not at all trivial), though under an additional asymptotic assumption that the execution time of the decisions of the customers (say, switch on or out the defense system) is much faster that the infection rates. In particular, the phase transitions and the bifurcation points changing the number of solutions can be found explicitly.",
author = "Kolokoltsov, {Vassili N.} and Malafeyev, {Oleg A.}",
note = "Publisher Copyright: {\textcopyright} 2019, Springer Nature Switzerland AG. Copyright: Copyright 2020 Elsevier B.V., All rights reserved.",
year = "2019",
doi = "10.1007/978-3-030-12371-0_7",
language = "English",
series = "Springer Series in Operations Research and Financial Engineering",
publisher = "Springer Nature",
pages = "133--146",
booktitle = "Springer Series in Operations Research and Financial Engineering",
address = "Germany",

}

RIS

TY - CHAP

T1 - Four-State Model of Cybersecurity

AU - Kolokoltsov, Vassili N.

AU - Malafeyev, Oleg A.

N1 - Publisher Copyright: © 2019, Springer Nature Switzerland AG. Copyright: Copyright 2020 Elsevier B.V., All rights reserved.

PY - 2019

Y1 - 2019

N2 - Here we introduce yet another concrete MFG model in the framework of cybersecurity. It is a four-state model, and it models the response of computer owners to various offers of defense systems against a cyberhacker (for instance, a botnet attack). The model takes into account both the random process of the propagation of the infection (controlled by the botnet herder) and the decision-making process of customers. Its stationary version is again exactly solvable (but not at all trivial), though under an additional asymptotic assumption that the execution time of the decisions of the customers (say, switch on or out the defense system) is much faster that the infection rates. In particular, the phase transitions and the bifurcation points changing the number of solutions can be found explicitly.

AB - Here we introduce yet another concrete MFG model in the framework of cybersecurity. It is a four-state model, and it models the response of computer owners to various offers of defense systems against a cyberhacker (for instance, a botnet attack). The model takes into account both the random process of the propagation of the infection (controlled by the botnet herder) and the decision-making process of customers. Its stationary version is again exactly solvable (but not at all trivial), though under an additional asymptotic assumption that the execution time of the decisions of the customers (say, switch on or out the defense system) is much faster that the infection rates. In particular, the phase transitions and the bifurcation points changing the number of solutions can be found explicitly.

UR - http://www.scopus.com/inward/record.url?scp=85098074920&partnerID=8YFLogxK

U2 - 10.1007/978-3-030-12371-0_7

DO - 10.1007/978-3-030-12371-0_7

M3 - Chapter

AN - SCOPUS:85098074920

T3 - Springer Series in Operations Research and Financial Engineering

SP - 133

EP - 146

BT - Springer Series in Operations Research and Financial Engineering

PB - Springer Nature

ER -

ID: 72678842