
Stochastic Modeling and Optimization Methods for Critical Infrastructure Protection, Volume 2
Methods and Tools
- 271 pages
- English
- PDF
- Available on iOS & Android
Stochastic Modeling and Optimization Methods for Critical Infrastructure Protection, Volume 2
Methods and Tools
About this book
Stochastic Modeling and Optimization Methods for Critical Infrastructure Protection is a thorough exploration of mathematical models and tools that are designed to strengthen critical infrastructures against threats – both natural and adversarial. Divided into two volumes, this first volume examines stochastic modeling across key economic sectors and their interconnections, while the second volume focuses on advanced mathematical methods for enhancing infrastructure protection.
The book covers a range of themes, including risk assessment techniques that account for systemic interdependencies within modern technospheres, the dynamics of uncertainty, instability and system vulnerabilities. The book also presents other topics such as cryptographic information protection and Shannon's theory of secret systems, alongside solutions arising from optimization, game theory and machine learning approaches.
Featuring research from international collaborations, this book covers both theory and applications, offering vital insights for advanced risk management curricula. It is intended not only for researchers, but also educators and professionals in infrastructure protection and stochastic optimization.
Frequently asked questions
- Essential is ideal for learners and professionals who enjoy exploring a wide range of subjects. Access the Essential Library with 800,000+ trusted titles and best-sellers across business, personal growth, and the humanities. Includes unlimited reading time and Standard Read Aloud voice.
- Complete: Perfect for advanced learners and researchers needing full, unrestricted access. Unlock 1.4M+ books across hundreds of subjects, including academic and specialized titles. The Complete Plan also includes advanced features like Premium Read Aloud and Research Assistant.
Please note we cannot support devices running on iOS 13 and Android 7 or earlier. Learn more about using the app.
Information
Table of contents
- Cover
- Title Page
- Copyright Page
- Contents
- Preface
- Part 1. Mathematical Models and Methods for Risk Mitigation and Defending Critical Infrastructure
- Part 2. Cyber Security of Critical Infrastructure Facilities
- List of Authors
- Index
- Summary of Volume 1
- Other titles from ISTE in Mathematics and Statistics
- EULA