Cybersecurity and Applied Mathematics

  • ID: 3692714
  • Book
  • 240 Pages
  • Elsevier Science and Technology
1 of 4

Cybersecurity and Applied Mathematics explores the mathematical concepts necessary for effective cybersecurity research and practice, taking an applied approach for practitioners and students entering the field. This book covers methods of statistical exploratory data analysis and visualization as a type of model for driving decisions, also discussing key topics, such as graph theory, topological complexes, and persistent homology.

Defending the Internet is a complex effort, but applying the right techniques from mathematics can make this task more manageable. This book is essential reading for creating useful and replicable methods for analyzing data.

  • Describes mathematical tools for solving cybersecurity problems, enabling analysts to pick the most optimal tool for the task at hand
  • Contains numerous cybersecurity examples and exercises using real world data
  • Written by mathematicians and statisticians with hands-on practitioner experience
Note: Product cover images may vary from those shown
2 of 4

Ch. 1: Collecting and Reasoning about Cybersecurity Data

Ch. 2: Exploratory Data Analysis

Ch. 3: Measures, Differences and Similarities

Ch. 4: Graph Theory

Ch. 5: Topological Data Analysis

Ch. 6: Visualization

Ch. 7: Cyber Stringology

Ch. 8: Probability and Probability Models

Ch. 9: Hierarchical Models

Note: Product cover images may vary from those shown
3 of 4


4 of 4
Metcalf, Leigh
Leigh Metcalf research's network security, game theory, formal languages, and dynamical systems. She is Editor in Chief of the Journal on Digital Threats and has a PhD in Mathematics.
Casey, William
Will Casey works in threat analysis, code analysis, natural language processing, genomics, bioinformatics, and applied mathematics. He has a MS and MA in Mathematics and a PhD in Applied Mathematics.
Note: Product cover images may vary from those shown
5 of 4
Note: Product cover images may vary from those shown