A MARKOV MODEL OF NON-MUTUALLY EXCLUSIVE CYBER THREATS AND ITS APPLICATIONS FOR SELECTING AN OPTIMAL SET OF INFORMATION SECURITY REMEDIES

A Markov Model of Non-Mutually Exclusive Cyber Threats and its Applications for Selecting an Optimal Set of Information Security Remedies

In this work, we study a Markov model of cyber threats that act on a computer system.Within the framework of the model the computer system is considered as a system with failures and recoveries by analogy with models of reliability theory.To estimate functionally-temporal properties of the system we introduce a parameter called the lifetime of the

read more

What Is Going On? The Process of Generating Questions about Emotion and Social Cognition in Bipolar Disorder and Schizophrenia with Cartoon Situations and Faces

Regarding the notion of putative “best” practices in social neuroscience and science in general, we contend that following established procedures has advantages, but prescriptive uniformity in methodology can obscure flaws, bias thinking, stifle creativity, and restrict exploration.Generating hypotheses is at least as important as testi

read more



Criminal Responsibility for Legalization (Laundering) of the Money or Other Property Acquired by Other Persons by the Criminal Way as a Result of Evasion of Taxes

The article is devoted to problems of criminal liability PEACE for legalization (laundering) of the money or other property acquired by other persons by the criminal way because of evasion of taxes.Identification and suppression of this illegal activity by the staff of tax and law enforcement agencies is one of the important directions of guarantee

read more