A MARKOV MODEL OF NON-MUTUALLY EXCLUSIVE CYBER THREATS AND ITS APPLICATIONS FOR SELECTING AN OPTIMAL SET OF INFORMATION SECURITY REMEDIES

A Markov Model of Non-Mutually Exclusive Cyber Threats and its Applications for Selecting an Optimal Set of Information Security Remedies

In this work, we study a Markov model of cyber threats that act on a computer system.Within the framework of the model the computer system is considered as a system with failures and recoveries by analogy with models of reliability theory.To estimate functionally-temporal properties of the system we introduce a parameter called the lifetime of the

read more



This historical study presents an explanation of Saudi influence in the northwest of The Arabian island during the period (1208-1227 AH/ 1793-1812 AD)

This historical study presents an explanation of Saudi influence in the northwest of The Arabian island during the period (1208-1227 AH/ 1793-1812 AD) where the convoys of Shami Hajj and the convoys of the jumbo wind gold Egyptian hajj became directly under the authority and administration of the first Saudi state (1175-1223 AH / 1744-1818 AD) , as

read more