Cybersecurity and Applied Mathematics explores the mathematical concepts necessary for effective cybersecurity research and practice, taking an applied approach for practitioners and students entering the field. This book covers methods of statistical exploratory data analysis and visualization as a type of model for driving decisions, also discussing key topics, such as graph theory, topological complexes, and persistent homology.
Defending the Internet is a complex effort, but applying the right techniques from mathematics can make this task more manageable. This book is essential reading for creating useful and replicable methods for analyzing data.
- Describes mathematical tools for solving cybersecurity problems, enabling analysts to pick the most optimal tool for the task at hand
- Contains numerous cybersecurity examples and exercises using real world data
- Written by mathematicians and statisticians with hands-on practitioner experience
Please Note: This is an On Demand product, delivery may take up to 11 working days after payment has been received.
Ch. 1: Collecting and Reasoning about Cybersecurity Data
Ch. 2: Exploratory Data Analysis
Ch. 3: Measures, Differences and Similarities
Ch. 4: Graph Theory
Ch. 5: Topological Data Analysis
Ch. 6: Visualization
Ch. 7: Cyber Stringology
Ch. 8: Probability and Probability Models
Ch. 9: Hierarchical Models
Leigh Metcalf research's network security, game theory, formal languages, and dynamical systems. She is Editor in Chief of the Journal on Digital Threats and has a PhD in Mathematics.
Will Casey works in threat analysis, code analysis, natural language processing, genomics, bioinformatics, and applied mathematics. He has a MS and MA in Mathematics and a PhD in Applied Mathematics.