Skip to main content

Showing 1–4 of 4 results for author: Dshalalow, J H

Searching in archive math. Search in all archives.
.
  1. arXiv:1901.07178  [pdf, ps, other

    math.PR

    Discrete Operational Calculus in Delayed Stochastic Games

    Authors: J. H. Dshalalow, K. Iwezulu, R. T. White

    Abstract: This article deals with classes of antagonistic games with two players. A game is specified in terms of two `hostile' stochastic processes representing mutual attacks upon random times exerting casualties of random magnitudes. The game ends when one of the players is defeated. We target the first passage time $τ_ρ$ of the defeat and the number of casualties to either player upon $τ_ρ$. Here we val… ▽ More

    Submitted 22 January, 2019; originally announced January 2019.

    Comments: Pre-print

    MSC Class: 60G51; 60G55; 60G57; 60K05; 82B41; 91A05; 91A10; 91A60

    Journal ref: Neural, Parallel, and Scientific Computations, 24: 55-64 (2016)

  2. Time Sensitive Analysis of Independent and Stationary Increment Processes

    Authors: Jewgeni H. Dshalalow, Ryan T. White

    Abstract: We study the behavior of independent and stationary increments jump processes as they approach fixed thresholds. The exact crossing time is unavailable because the real-time information about successive jumps is unknown. Instead, the underlying process $A(t)$ is observed only upon a third-party independent point process ${τ_n}$. The observed time series ${A(τ_n)}$ presents crude, delayed data. The… ▽ More

    Submitted 21 January, 2019; originally announced January 2019.

    Comments: Post-print, Journal of Mathematical Analysis and Applications

    MSC Class: 60G50; 60G51; 60G52; 60G55; 60G57; 60K05; 60K35; 60K40; 60G25; 90B18; 90B15; 90B25

  3. On Strategic Defense of Stochastic Networks

    Authors: Jewgeni H. Dshalalow, Ryan T. White

    Abstract: This paper deals with the detection and prediction of losses due to cyber attacks waged on vital networks. The accumulation of losses to a network during a series of attacks is modeled by a 2-dimensional monotone random walk process as observed by an independent delayed renewal process. The first component of the process is associated with the number of nodes (such as routers or operational sites)… ▽ More

    Submitted 21 January, 2019; originally announced January 2019.

    Comments: Post-print, 5 figures

    MSC Class: 60G50; 60G51; 60G52; 60G55; 60G57; 60K05; 60K35; 60K40; 60G25; 90B18; 90B10; 90B15; 90B25

    Journal ref: Stochastic Analysis and Applications, 32:3, 365-396

  4. arXiv:1901.07137  [pdf, other

    math.PR

    On Reliability of Stochastic Networks

    Authors: Jewgeni H. Dshalalow, Ryan T. White

    Abstract: In recent times we hear increasingly often about cyber attacks on various commercial and strategic sites that manage to escape any defense. In this article, we model such attacks on networks via stochastic processes and predict the time of a total or partial failure of a network including the magnitude of losses (such as the number of compromised nodes, lost weights, and a loss of other associated… ▽ More

    Submitted 21 January, 2019; originally announced January 2019.

    Comments: Pre-print

    MSC Class: 60G50; 60G51; 60G55; 60K05; 60K10; 90B15

    Journal ref: Neural, Parallel, and Scientific Computations, 21, 141-160