A MARKOV MODEL OF NON-MUTUALLY EXCLUSIVE CYBER THREATS AND ITS APPLICATIONS FOR SELECTING AN OPTIMAL SET OF INFORMATION SECURITY REMEDIES

A Markov Model of Non-Mutually Exclusive Cyber Threats and its Applications for Selecting an Optimal Set of Information Security Remedies

In this work, we study a Markov model of cyber threats that act on a computer system.Within the framework of the model the computer system is considered as a system with failures and recoveries by analogy with models of reliability theory.To estimate functionally-temporal properties of the system we introduce a parameter called the lifetime of the

read more

Media, art and technology: a contemporary reflection

This article is based on a report about cultural industries and their reflexes on media saturation.From that point, a reflection on technology, media and contemporary arts is presented, Jewelry especially on the role of the body in the manifestation of art.This work seeks to ratify the influence of technology, of mass media and of information over

read more

Comparative cyto-histological study of needle tip aspirates and entry sites after intravitreal injection using different needle types.

A comparison of the cellular content of needle tip aspirates and entry sites after transconjunctival intravitreal injection (IVI) using different needle types was performed.White outbred rats and human cadaver eyes were used for IVI by hypodermic 27 gauge (G) and 30G needles, and spinal anesthesia Pencan 27G needles.Aspiration of vitreous for quant

read more