Cyber-Science and Cyber Security
Journal Title: International journal of Emerging Trends in Science and Technology - Year 2015, Vol 2, Issue 2
Abstract
In Cyber Science cyber-security, anyone can evaluate whether there are underlying fundamental principles that would make it possible to adopt a more scientific approach, identify what is needed in creating a science of cyber-security, and recommend specific ways in which scientific methods can be applied. Our study identified several sub-fields of computer science that are specifically relevant and also provides some recommendations on further developing the Cyber science
Authors and Affiliations
Dr Daruri Venugopal
Analyzing Human Traits Based on Hardy – Weinberg’s Principle
The H-W Equilibrium states that allele frequency does not change, outside force is required to change the frequency from generation to generation. If the gene frequencies are p and q, the genotype frequency will be p2 ,...
Secure Mining of Generalized Association Rules from Horizontally Distributed Databases
We consider the problem of secure mining of generalized association rules from horizontally distributed databases. Given a large horizontally distributed database of transactions, where each transaction consists of a set...
Behavior of Steel Fiber Reinforced Concrete for M-25 Grade
It is now well established that one of the important properties of steel fibre reinforced concrete (SFRC) is its superior resistance to cracking and crack propagation. As a result of this ability to arrest cracks, fibre...
Intensity of pain after separator placement, banding and bonding in fixed Orthodontic patients
The most common question that appears to be first in almost everyone’s mind as they pursue orthodontic treatment is: “Is it going to hurt? The cause of pain with fixed orthodontic treatment is still not completely unders...
Hoarding Disorder
This article reviews the literature on compulsive hoarding, including the definition and manifestations of the problem and a conceptual model for understanding hoarding behavior. This model addresses information processi...