##plugins.themes.academic_pro.article.main##
Abstract
In Cyber Science cyber-security, any one can evaluate whether there are underlying fundamental principles that would make it possible to adopt a more scientiï¬c approach, identify what is needed in creating a science of cyber-security, and recommend speciï¬c ways in which scientiï¬c methods can be applied. Our study identiï¬ed several sub-ï¬elds of computer science that are speciï¬cally relevant and also provides some recommendations on further developing the Cyber science.Â
Â
Â
##plugins.themes.academic_pro.article.details##
How to Cite
Venugopal, D. D. (2015). Cyber-Science and Cyber Security. International Journal of Emerging Trends in Science and Technology, 2(02). Retrieved from http://igmpublication.org/ijetst.in/index.php/ijetst/article/view/490
References
1) T. Alpcan and Bas¸ar T. , Network Security: A Decision and Game Theoretic Approach. Cambridge University Press, 2011.
2) Al Bessey, Ken Block, et al., A few billion lines of code later: Using static analysis to find bugs in the real world. software systems. Communications of the ACM, 53, 2010.
3) Leventa Buttyan and Jean-Pierre Hubaux, Security and Cooperation inWireless Networks. Cambridge University Press, 2007.
4) Michael R. Clarkson and Fred B. Schneider, Hyperproperties. In CSF 2008: 21st IEEE Computer Security Foundations, Symposium. - Foundation Conference, Pittsburgh, PA, JUN 23-25, 2008.
5) Ulfar Erlingsson, Low-level software security: Attacks an Audun Josang, Security protocol using spin. Proc. TACAS96, LNCS, 1996.
2) Al Bessey, Ken Block, et al., A few billion lines of code later: Using static analysis to find bugs in the real world. software systems. Communications of the ACM, 53, 2010.
3) Leventa Buttyan and Jean-Pierre Hubaux, Security and Cooperation inWireless Networks. Cambridge University Press, 2007.
4) Michael R. Clarkson and Fred B. Schneider, Hyperproperties. In CSF 2008: 21st IEEE Computer Security Foundations, Symposium. - Foundation Conference, Pittsburgh, PA, JUN 23-25, 2008.
5) Ulfar Erlingsson, Low-level software security: Attacks an Audun Josang, Security protocol using spin. Proc. TACAS96, LNCS, 1996.