Modern discrete mathematics and analysis : with applications in cryptography, information systems and modeling /: with applications in cryptography, information systems and modeling. ([2018])
- Record Type:
- Book
- Title:
- Modern discrete mathematics and analysis : with applications in cryptography, information systems and modeling /: with applications in cryptography, information systems and modeling. ([2018])
- Main Title:
- Modern discrete mathematics and analysis : with applications in cryptography, information systems and modeling
- Further Information:
- Note: Nicholas J. Daras, Themistocles M. Rassias, editors.
- Editors:
- Daras, Nicholas J
Rassias, Themistocles M, 1951- - Contents:
- Intro; Preface; Contents; Contributors; Fixed Point Theorems in Generalized b-Metric Spaces; Introduction and Preliminaries; Linear Quasi-Contractions; Nonlinear Contractions; References; Orlicz Dual Brunn-Minkowski Theory: Addition, Dual Quermassintegrals and Inequalities; Introduction; Preliminaries; Mixed p-Quermassintegrals of Convex Bodies; Dual Mixed Quermassintegrals; Dual Mixed p-Quermassintegrals; Dual Mixed Harmonic p-Quermassintegrals; Orlicz Radial Harmonic Addition; Orlicz Dual Mixed Quermassintegral; Orlicz Dual Minkowski Inequality; Orlicz Dual Brunn-Minkowski Inequality Dual Log-Minkowski InequalityReferences; Modeling Cyber-Security; Introduction; Mathematical Definition of Cyberspace; Mathematical Description of Cyber-Attacks; Valuations and Vulnerabilities of Parts of a Node Constituent; Cyber-Effects and Cyber-Interactions; Description of Cyber Navigations and Protection from Unplanned Attacks; Cyber Navigations; Inadequacy of Cyber Nodes; Infected Cyber Nodes; Dangerous Navigations; Protection of Cyber Nodes from Unplanned Attacks; Description of Various Types of Cyber-Attacks and Protection; Passive Cyber-Attacks Protected Cyber Nodes from Passive AttacksActive Cyber-Attacks; Protected Cyber Nodes from Active Attacks; References; Solutions of Hard Knapsack Problems Using Extreme Pruning; Introduction; Lattices; Lenstra-Lenstra-Lovsz Algorithm (LLL); Gram-Schmidt Orthogonalization (GSO); LLL-Pseudocode; Analysis of LLL; Blockwise Korkine-Zolotarev (BKZ);Intro; Preface; Contents; Contributors; Fixed Point Theorems in Generalized b-Metric Spaces; Introduction and Preliminaries; Linear Quasi-Contractions; Nonlinear Contractions; References; Orlicz Dual Brunn-Minkowski Theory: Addition, Dual Quermassintegrals and Inequalities; Introduction; Preliminaries; Mixed p-Quermassintegrals of Convex Bodies; Dual Mixed Quermassintegrals; Dual Mixed p-Quermassintegrals; Dual Mixed Harmonic p-Quermassintegrals; Orlicz Radial Harmonic Addition; Orlicz Dual Mixed Quermassintegral; Orlicz Dual Minkowski Inequality; Orlicz Dual Brunn-Minkowski Inequality Dual Log-Minkowski InequalityReferences; Modeling Cyber-Security; Introduction; Mathematical Definition of Cyberspace; Mathematical Description of Cyber-Attacks; Valuations and Vulnerabilities of Parts of a Node Constituent; Cyber-Effects and Cyber-Interactions; Description of Cyber Navigations and Protection from Unplanned Attacks; Cyber Navigations; Inadequacy of Cyber Nodes; Infected Cyber Nodes; Dangerous Navigations; Protection of Cyber Nodes from Unplanned Attacks; Description of Various Types of Cyber-Attacks and Protection; Passive Cyber-Attacks Protected Cyber Nodes from Passive AttacksActive Cyber-Attacks; Protected Cyber Nodes from Active Attacks; References; Solutions of Hard Knapsack Problems Using Extreme Pruning; Introduction; Lattices; Lenstra-Lenstra-Lovsz Algorithm (LLL); Gram-Schmidt Orthogonalization (GSO); LLL-Pseudocode; Analysis of LLL; Blockwise Korkine-Zolotarev (BKZ); The Enumeration Subroutine; Extreme Pruning; Attacks to Subset Sum Problem; Birthday Attacks; Lattice Attacks; Experiments; Conclusions; Appendix; References; A Computational Intelligence System Identifying Cyber-Attacks on Smart Energy Grids IntroductionSmart Energy Grids; Conceptual Framework; Conceptual Model; Cybersecurity for Smart Grid Systems; A New, Smart Era for the Energy Grids; Risks Involved; Threats; Types of Attacks; Cyber Attacks on Smart Grid; SCADA Systems; Methods of Attack; Literature Review; Power System Attack Datasets; SCADA Power System Architecture; Types of Scenarios; The Final Dataset; Methodology and Techniques; Extreme Learning Machines; Adaptive Elitist Differential Evolution (AEDE); Adaptive Elitist Differential Evolution ELM (AEDE-ELM); Results and Comparative Analysis; Discussion: Conclusions … (more)
- Publisher Details:
- Cham, Switzerland : Springer
- Publication Date:
- 2018
- Extent:
- 1 online resource
- Subjects:
- 515
Mathematics
Mathematical analysis
Computer science -- Mathematics
Mathematical optimization
Global analysis (Mathematics)
MATHEMATICS / Calculus
MATHEMATICS / Mathematical Analysis
Computer science -- Mathematics
Mathematical analysis
Mathematical optimization
Mathematics -- Mathematical Analysis
Mathematics -- Applied
Calculus & mathematical analysis
Mathematical modelling
Applied mathematics
Mathematics -- Discrete Mathematics
Discrete mathematics
Mathematics
Discrete Mathematics
Analysis
Mathematical Modeling and Industrial Mathematics
Applications of Mathematics
Electronic books - Languages:
- English
- ISBNs:
- 9783319743257
3319743252
3319743244
9783319743240 - Related ISBNs:
- 9783319743240
3319743244 - Notes:
- Note: Includes bibliographical references.
Note: Online resource; title from PDF title page (EBSCO, viewed July 13, 2018). - Access Rights:
- Legal Deposit; Only available on premises controlled by the deposit library and to one user at any one time; The Legal Deposit Libraries (Non-Print Works) Regulations (UK).
- Access Usage:
- Restricted: Printing from this resource is governed by The Legal Deposit Libraries (Non-Print Works) Regulations (UK) and UK copyright law currently in force.
- View Content:
- Available online (eLD content is only available in our Reading Rooms) ↗
- Physical Locations:
- British Library HMNTS - ELD.DS.333953
- Ingest File:
- 02_334.xml