Home > Business and Economics > Economics > Economic systems and structures > Stochastic Modeling and Optimization Methods for Critical Infrastructure Protection, Volume 2: Methods and Tools(ISTE Invoiced)
14%
Stochastic Modeling and Optimization Methods for Critical Infrastructure Protection, Volume 2: Methods and Tools(ISTE Invoiced)

Stochastic Modeling and Optimization Methods for Critical Infrastructure Protection, Volume 2: Methods and Tools(ISTE Invoiced)

          
5
4
3
2
1

International Edition


Premium quality
Premium quality
Bookswagon upholds the quality by delivering untarnished books. Quality, services and satisfaction are everything for us!
Easy Return
Easy return
Not satisfied with this product! Keep it in original condition and packaging to avail easy return policy.
Certified product
Certified product
First impression is the last impression! Address the book’s certification page, ISBN, publisher’s name, copyright page and print quality.
Secure Checkout
Secure checkout
Security at its finest! Login, browse, purchase and pay, every step is safe and secured.
Money back guarantee
Money-back guarantee:
It’s all about customers! For any kind of bad experience with the product, get your actual amount back after returning the product.
On time delivery
On-time delivery
At your doorstep on time! Get this book delivered without any delay.
Quantity:
Add to Wishlist

About the Book

Stochastic Modeling and Optimization Methods for Critical Infrastructure Protection is a thorough exploration of mathematical models and tools that are designed to strengthen critical infrastructures against threats – both natural and adversarial. Divided into two volumes, this first volume examines stochastic modeling across key economic sectors and their interconnections, while the second volume focuses on advanced mathematical methods for enhancing infrastructure protection. The book covers a range of themes, including risk assessment techniques that account for systemic interdependencies within modern technospheres, the dynamics of uncertainty, instability and system vulnerabilities. The book also presents other topics such as cryptographic information protection and Shannon’s theory of secret systems, alongside solutions arising from optimization, game theory and machine learning approaches. Featuring research from international collaborations, this book covers both theory and applications, offering vital insights for advanced risk management curricula. It is intended not only for researchers, but also educators and professionals in infrastructure protection and stochastic optimization.

Table of Contents:
Preface xi Alexei A. GAIVORONSKI, Pavel S. KNOPOV, Vladimir I. NORKIN and Volodymyr A. ZASLAVSKYI Part 1. Mathematical Models and Methods for Risk Mitigation and Defending Critical Infrastructure 1 Introduction to Part 1 3 Pavel S. KNOPOV and Vladimir I. NORKIN Chapter 1. Three Approaches to Decision-making Under Risk and Uncertainty for the Critical Infrastructure Protection 5 Vladimir S. KIRILYUK 1.1. Introduction 5 1.2. Decision-making in stochastic conditions of risk and uncertainty 7 1.3. Some traditional risk assessments and worst-case analysis 19 1.4. Adversarial risk analysis in conditions of terrorist threat 26 1.5. Conclusion 28 1.6. Acknowledgments 29 1.7. List of abbreviations 29 1.8. References 29 Chapter 2. Models of Anti-Terrorist Protection 33 Vladimir I. NORKIN 2.1. Area control tasks 33 2.2. Simulation of attack and passive defense 37 2.3. Modeling attack on a market: a linear programming model 39 2.4. A probabilistic version of the problem of attacking the objective function 41 2.5. Modeling an attack on resources of optimal systems 42 2.6. Modeling an attack on the transport system 42 2.7. Models of protection of transport and information networks 44 2.8. Stochastic models of passive protection of transport and information networks 47 2.9. Acknowledgments 49 2.10. References 49 Chapter 3. Allocation of Resources for the Critical Infrastructure Protection 53 Vladimir I. NORKIN, Alexei A. GAIVORONSKI, Pavel S. KNOPOV and Volodymyr A. ZASLAVSKYI 3.1. The hierarchical dynamic programming 53 3.2. Examples of resource allocation problems 60 3.3. Conclusion 64 3.4. Acknowledgments 64 3.5. References 64 Chapter 4. Simulation of the Defender-Attacker Game for Critical Objects Protection 67 Vladimir I. NORKIN 4.1. Introduction 67 4.2. A simple strategic attacker-defender game 70 4.3. Generalizations 76 4.4. Further generalization 77 4.5. Conclusion 77 4.6. Acknowledgments 78 4.7. References 78 Chapter 5. Making Decisions and Motion Control in Conditions of Conflict 81 Arkadii CHIKRII 5.1. Introduction 81 5.2. Problem statement 82 5.3. Pontryagin’s first direct method 84 5.4. Schemes of the method of resolving functions 86 5.5. Scheme with fixed points of the terminal set solid part 96 5.6. Connection of the first direct method with the method of resolving functions 98 5.7. Conclusion 103 5.8. Acknowledgments 103 5.9. References 104 Chapter 6. Contemporary Stochastic Quasi-gradient Algorithms 107 Vladimir I. NORKIN, Alexei A. GAIVORONSKI, Pavel S. KNOPOV and Anton KOZYRIEV 6.1. Introduction 107 6.2. A stochastic optimization problem 109 6.3. Stochastic approximation 109 6.4. Application of stochastic quasi-gradient algorithms in machine learning 110 6.5. Stochastic gradient methods 111 6.6. Conclusion 123 6.7. Acknowledgments 123 6.8. References 123 Chapter 7. Two Classes of Optimization Problems for Arcs Capacities Modernization for Fault-tolerant Networks 127 Petro STETSYUK, Viktor STOVBA and Volodymyr ZHYDKOV 7.1. Basic concepts for a fault-tolerant network 127 7.2. Basic LP-problems A and P 131 7.3. Boolean problems A and P 134 7.4. Convex problems A and P: decomposition algorithms 138 7.5. Software: programs SolverA and SolverP 142 7.6. Acknowledgements 145 7.7. References 145 Part 2. Cyber Security of Critical Infrastructure Facilities 147 Introduction to Part 2 149 Alexei A. GAIVORONSKI and Volodymyr A. ZASLAVSKYI Chapter 8. Digital Authentication of the Type "friend-or-foe" by Means of One-time Signatures 151 Anatoly ANISIMOV 8.1. Introduction 151 8.2. Coalition group 153 8.3. Authentication in public-key cryptography 155 8.4. Authentication through digital signatures and sigma protocols 156 8.5. A general description of a "friend-or-foe" authentication protocol using OTSs 162 8.6. References 171 Chapter 9. Main Directions and Basic Mathematical Ideas of Cryptographic Information Security 175 Lyudmila KOVALCHUK and Mikhail SAVCHUK 9.1. Introduction 175 9.2. Problems and aspects of information security, basic concepts of cryptographic information security. 175 9.3. Classification of cryptosystems 179 9.4. Symmetric cryptography 180 9.5. Asymmetric cryptography: public key cryptosystems 195 9.6. Conclusion 208 9.7. References 209 Chapter 10. Cybersecurity Investments in Networks 211 Vasyl GORBACHUK, Maksym DUNAIEVSKYI and Seit-Bekir SULEIMANOV 10.1. Introduction 211 10.2. Cybersecurity in SCNs 212 10.3. Numerical experiments for networks 219 10.4. Critical and risky SCNs 226 10.5. Acknowledgements 231 10.6. References 231 List of Authors 235 Index 239 Summary of Volume 1 243


Best Sellers


Product Details
  • ISBN-13: 9781836690283
  • Publisher: ISTE Ltd
  • Publisher Imprint: ISTE Ltd
  • Language: English
  • Returnable: Y
  • Sub Title: Methods and Tools
  • ISBN-10: 1836690282
  • Publisher Date: 08 Jul 2025
  • Binding: Hardback
  • No of Pages: 272
  • Series Title: ISTE Invoiced


Similar Products

How would you rate your experience shopping for books on Bookswagon?

Add Photo
Add Photo

Customer Reviews

REVIEWS           
Click Here To Be The First to Review this Product
Stochastic Modeling and Optimization Methods for Critical Infrastructure Protection, Volume 2: Methods and Tools(ISTE Invoiced)
ISTE Ltd -
Stochastic Modeling and Optimization Methods for Critical Infrastructure Protection, Volume 2: Methods and Tools(ISTE Invoiced)
Writing guidlines
We want to publish your review, so please:
  • keep your review on the product. Review's that defame author's character will be rejected.
  • Keep your review focused on the product.
  • Avoid writing about customer service. contact us instead if you have issue requiring immediate attention.
  • Refrain from mentioning competitors or the specific price you paid for the product.
  • Do not include any personally identifiable information, such as full names.

Stochastic Modeling and Optimization Methods for Critical Infrastructure Protection, Volume 2: Methods and Tools(ISTE Invoiced)

Required fields are marked with *

Review Title*
Review
    Add Photo Add up to 6 photos
    Would you recommend this product to a friend?
    Tag this Book
    Read more
    Does your review contain spoilers?
    What type of reader best describes you?
    I agree to the terms & conditions
    You may receive emails regarding this submission. Any emails will include the ability to opt-out of future communications.

    CUSTOMER RATINGS AND REVIEWS AND QUESTIONS AND ANSWERS TERMS OF USE

    These Terms of Use govern your conduct associated with the Customer Ratings and Reviews and/or Questions and Answers service offered by Bookswagon (the "CRR Service").


    By submitting any content to Bookswagon, you guarantee that:
    • You are the sole author and owner of the intellectual property rights in the content;
    • All "moral rights" that you may have in such content have been voluntarily waived by you;
    • All content that you post is accurate;
    • You are at least 13 years old;
    • Use of the content you supply does not violate these Terms of Use and will not cause injury to any person or entity.
    You further agree that you may not submit any content:
    • That is known by you to be false, inaccurate or misleading;
    • That infringes any third party's copyright, patent, trademark, trade secret or other proprietary rights or rights of publicity or privacy;
    • That violates any law, statute, ordinance or regulation (including, but not limited to, those governing, consumer protection, unfair competition, anti-discrimination or false advertising);
    • That is, or may reasonably be considered to be, defamatory, libelous, hateful, racially or religiously biased or offensive, unlawfully threatening or unlawfully harassing to any individual, partnership or corporation;
    • For which you were compensated or granted any consideration by any unapproved third party;
    • That includes any information that references other websites, addresses, email addresses, contact information or phone numbers;
    • That contains any computer viruses, worms or other potentially damaging computer programs or files.
    You agree to indemnify and hold Bookswagon (and its officers, directors, agents, subsidiaries, joint ventures, employees and third-party service providers, including but not limited to Bazaarvoice, Inc.), harmless from all claims, demands, and damages (actual and consequential) of every kind and nature, known and unknown including reasonable attorneys' fees, arising out of a breach of your representations and warranties set forth above, or your violation of any law or the rights of a third party.


    For any content that you submit, you grant Bookswagon a perpetual, irrevocable, royalty-free, transferable right and license to use, copy, modify, delete in its entirety, adapt, publish, translate, create derivative works from and/or sell, transfer, and/or distribute such content and/or incorporate such content into any form, medium or technology throughout the world without compensation to you. Additionally,  Bookswagon may transfer or share any personal information that you submit with its third-party service providers, including but not limited to Bazaarvoice, Inc. in accordance with  Privacy Policy


    All content that you submit may be used at Bookswagon's sole discretion. Bookswagon reserves the right to change, condense, withhold publication, remove or delete any content on Bookswagon's website that Bookswagon deems, in its sole discretion, to violate the content guidelines or any other provision of these Terms of Use.  Bookswagon does not guarantee that you will have any recourse through Bookswagon to edit or delete any content you have submitted. Ratings and written comments are generally posted within two to four business days. However, Bookswagon reserves the right to remove or to refuse to post any submission to the extent authorized by law. You acknowledge that you, not Bookswagon, are responsible for the contents of your submission. None of the content that you submit shall be subject to any obligation of confidence on the part of Bookswagon, its agents, subsidiaries, affiliates, partners or third party service providers (including but not limited to Bazaarvoice, Inc.)and their respective directors, officers and employees.

    Accept

    New Arrivals


    Inspired by your browsing history


    Your review has been submitted!

    You've already reviewed this product!
    ASK VIDYA