• May 03, 2016 News! IJIET Vol. 5, No. 10 has been indexed by EI (Inspec).   [Click]
  • Mar 13, 2017 News!Vol. 7, No. 5 has been indexed by Crossref.
  • Mar 10, 2017 News!Vol. 7, No. 5 issue has been published online!   [Click]
General Information
    • ISSN: 2010-3689
    • Frequency: Bimonthly (2011-2014); Monthly (Since 2015)
    • DOI: 10.18178/IJIET
    • Editor-in-Chief: Prof. Dr. Steve Thatcher
    • Executive Editor: Ms. Nancy Y. Liu
    • Abstracting/ Indexing: EI (INSPEC, IET), Electronic Journals Library, Google Scholar, Crossref and ProQuest
    • E-mail: ijiet@ejournal.net
Editor-in-chief
Prof. Dr. Steve Thatcher
University of South Australia, Australia
It is my honor to be the editor-in-chief of IJIET. The journal publishes good papers which focous on the advanced researches in the field of information and education technology. Hopefully, IJIET will become a recognized journal among the scholars in the filed of information and education technology.
IJIET 2013 Vol.3(3): 300-303 ISSN: 2010-3689
DOI: 10.7763/IJIET.2013.V3.285

Hacking-Vigilance Distribution with Application to Assess Cyber Insecurity Level

Ramalingam Shanmugam
Abstract—Hacking into other’s computers for a variety of reasons is a serious concern and nightmare to government agencies, private and public institutions in almost all parts of the world in this fast communication age of 21st century. The owners of confidential and sensitive files are consciously and constantly undertaking vigilances to protect their files from hackers. They are refereed here vigilantes. The intrusions are increased by the hacker’s efforts, p when the vigilances are weaker. When the intrusion rate,  is more, the vigilante’s efforts, are bumped up. Both the hacker’s and vigilante’s efforts are latent, non-observable and hence are treated in this article as parameters. Only the number of intrusions is observable and hence is treated as a random variable, Y. This article introduces a new probability model connecting Y p and names it as Hacking-Vigilance Distribution (HVD). After deriving the properties of HVD, this article demonstrates their use to analyze and interpret computer intrusions data.

Index Terms—Computer intrusion, mean-variance relation, poisson, cyber intrusion, count and chi-squared distributions.

R. Shanmugam is with the School of Health Administration, Texas State University - San Marcos 78666, USA (e-mail: rs25@txstate.edu).

[PDF]

Cite:Ramalingam Shanmugam, "Hacking-Vigilance Distribution with Application to Assess Cyber Insecurity Level," International Journal of Information and Education Technology vol. 3, no. 3, pp. 300-303, 2013.

Copyright © 2008-2016. International Journal of Information and Education Technology. All rights reserved.
E-mail: ijiet@ejournal.net