Month: January 2023

The Bulgarian team presented project objectives to”Panteley Toshev OOD”

The Bulgarian team presented project objectives to”Panteley Toshev OOD”

On 31.01.2023, the local coordinator of the FAAI project Prof. Georgi Dimitrov presented the project to the company “Panteley Toshev OOD”, an innovative and technological leader in the development and production of ingredients for drinks and food in Bulgaria. The representatives of the company showed serious interest in the possibilities of applying AI in the development of new products.

Trenchev, Ivan,Dimitrov, Willian,Dimitrov, Georgi,Ostrovska, Tanya,Trencheva, Miglena, Mathematical Approaches Transform Cybersecurity from Protoscience to Science, 2023, Applied Sciences (Switzerland)Open Access, Volume 13, Issue 11, June 2023 Article number 6508; Publisher – MDPI; ISSN – 20763417; DOI – 10.3390/app13116508;

Trenchev, Ivan,Dimitrov, Willian,Dimitrov, Georgi,Ostrovska, Tanya,Trencheva, Miglena, Mathematical Approaches Transform Cybersecurity from Protoscience to Science, 2023, Applied Sciences (Switzerland)Open Access, Volume 13, Issue 11, June 2023 Article number 6508; Publisher – MDPI; ISSN – 20763417; DOI – 10.3390/app13116508;

The area of cybersecurity problems has reached the stage of becoming a science. This raises questions about the connection between the mathematical theories used in cybersecurity research and their relation to the methodology for experiments and conceptual models synthesized from the academic community. This research proposes an analytical review of the mathematical ideas used in applied cyber-security and theoretical explorations. This meta viewpoint is dedicated to standard mathematical theories applied in cybersecurity issues. The ground of the work is methodological problems relating to the validation of experiments and models with mathematical ideas in the cybersecurity exploration of digital space. This research emphasizes the application of game theory, catastrophe theory, queuing systems, and Markov chains. The methods are shown without claiming to be exhaustive. The goal is to review the currently established implementation of mathematical approaches to cybersecurity. A spectrum of possibilities for applying mathematical apparatus in future research for cybersecurity is given. After a review of the literature for each presented mathematical approach, we expose a list of problematic areas in which this has already been implemented.