publication . Preprint . 2015

Science of Cyber Security as a System of Models and Problems

Kott, Alexander;
Open Access English
  • Published: 29 Nov 2015
Terms like "Science of Cyber" or "Cyber Science" have been appearing in literature with growing frequency, and influential organizations initiated research initiatives toward developing such a science even though it is not clearly defined. We propose to define the domain of the science of cyber security by noting the most salient artifact within cyber security -- malicious software -- and defining the domain as comprised of phenomena that involve malicious software (as well as legitimate software and protocols used maliciously) used to compel a computing device or a network of computing devices to perform actions desired by the perpetrator of malicious software ...
free text keywords: Computer Science - Cryptography and Security
Download from

Axelsson, S. 2000. The base-rate fallacy and the difficulty of intrusion detection. ACM Trans. Inf. Syst. Secur. 3, 3 (August 2000), 186-205.

Anderson Co., Fort Washington, PA (Apr. 1980).

Bojinov et al., Address space randomization for mobile devices, in Proc Fourth ACM Conf. on Wireless Network Security, 127-138, 2011 Barrantes, E., et al., Randomized Instruction Set Emulation, ACM Transactions on Information and System Security, 8(1), 3-30, February 2005.

Bartol, N., et al., “Measuring Cyber Security and Information Assurance: A State of the Art Report,” Defense Technical Information Center, May 2009.

Boyce, M., Duma, K., Hettinger, L., Malone, T., Wilson, D., Lockett Reynolds, J. (2011).

Human performance in cyber security: A research agenda. Proceedings of the Human Factors and Ergonomics Society 55th Annual Meeting. 55:1115.

Bau, J., and Mitchell, J.C., “Security Modeling and Analysis,” Security & Privacy, IEEE, May-June 2011 Bostrom, H., et al.: On the definition of information fusion as a field of research. In: Technical report, University of Skovde, School of Humanities and Informatics, Skovde, Sweden (2007) Cam, H., "PeerShield: determining control and resilience criticality of collaborative cyber assets in networks", Proc. SPIE 8408, Cyber Sensing 2012, 840808 (May 1, 2012) Cartwright, Nancy (1983), How the Laws of Physics Lie. Oxford: Oxford University Press.

Dempsey, K.,, “Information Security Continuous Monitoring (ISCM_ for Federal Information Systems and Organizations,” NIST Special Publication 800-137, September 2011 Frigg, R., Models in Science, Stanford Encyclopedia of Philosophy, 2012; Ge, Linqiang; Liu, Hui; Zhang, Difan; Yu, Wei; Hardy, Rommie; Reschly, Robert; On effective sampling techniques for host-based intrusion detection in MANET, MILITARY COMMUNICATIONS CONFERENCE, 2012 - MILCOM 2012 Gil, Santiago, Alexander Kott, and Albert-László Barabási. "A genetic epidemiology approach to cyber-security." Scientific reports 4 (2014).

Harang, R.E.; Glodek, W.J.; "Identification of anomalous network security token usage via clustering and density estimation," 46th Annual Conference on Information Sciences Ownby, Michael, and Alexander Kott. Reading the mind of the enemy: predictive analysis and command effectiveness. CCRT Symposium, 2006.

Animesh Patcha and Jung-Min Park. 2007. An overview of anomaly detection techniques: Existing solutions and latest technological trends. Comput. Netw. 51, 12 (August 2007), 3448-3470. [OpenAIRE]

Any information missing or wrong?Report an Issue