##plugins.themes.academic_pro.article.main##

Abstract

In Cyber Science  cyber-security, any one can  evaluate whether there are underlying fundamental principles that would make it possible to adopt a more scientiï¬c approach, identify what is needed in creating a science of cyber-security, and recommend  speciï¬c ways in which scientiï¬c methods can be applied. Our study identiï¬ed several sub-ï¬elds of computer science that are speciï¬cally relevant and also provides some recommendations on further developing the Cyber science. 

 

 

##plugins.themes.academic_pro.article.details##

Author Biography

Dr Daruri Venugopal, Siddhartha Institute of Technology and Sciences Narapally, Ghatkesar, R.R.Dist.

                          PROFESSOR & DEAN

M.Sc; M.Phil; M.Tech; Ph.D.(Post.Doc.)

Dept. of Computer Scinece & Engineering

 

How to Cite
Venugopal, D. D. (2015). Cyber-Science and Cyber Security. International Journal of Emerging Trends in Science and Technology, 2(02). Retrieved from http://igmpublication.org/ijetst.in/index.php/ijetst/article/view/490

References

1) T. Alpcan and Bas¸ar T. , Network Security: A Decision and Game Theoretic Approach. Cambridge University Press, 2011.
2) Al Bessey, Ken Block, et al., A few billion lines of code later: Using static analysis to find bugs in the real world. software systems. Communications of the ACM, 53, 2010.
3) Leventa Buttyan and Jean-Pierre Hubaux, Security and Cooperation inWireless Networks. Cambridge University Press, 2007.
4) Michael R. Clarkson and Fred B. Schneider, Hyperproperties. In CSF 2008: 21st IEEE Computer Security Foundations, Symposium. - Foundation Conference, Pittsburgh, PA, JUN 23-25, 2008.
5) Ulfar Erlingsson, Low-level software security: Attacks an Audun Josang, Security protocol using spin. Proc. TACAS96, LNCS, 1996.