Topology in cyber research
August 10, 2020 Β· Declared Dead Β· + Add venue
"No code URL or promise found in abstract"
Evidence collected by the PWNC Scanner
Authors
Steve Huntsman, Jimmy Palladino, Michael Robinson
arXiv ID
2008.03299
Category
math.AT
Cross-listed
cs.NI,
math.CO
Citations
3
Last Checked
1 month ago
Abstract
We give an idiosyncratic overview of applications of topology to cyber research, spanning the analysis of variables/assignments and control flow in computer programs, a brief sketch of topological data analysis in one dimension, and the use of sheaves to analyze wireless networks. The text is from a chapter in the forthcoming book Mathematics in Cyber Research, to be published by Taylor and Francis.
Community Contributions
Found the code? Know the venue? Think something is wrong? Let us know!
π Similar Papers
In the same crypt β math.AT
R.I.P.
π»
Ghosted
R.I.P.
π»
Ghosted
Persistence Diagrams with Linear Machine Learning Models
R.I.P.
π»
Ghosted
Comparing persistence diagrams through complex vectors
R.I.P.
π»
Ghosted
A Riemannian Framework for Statistical Analysis of Topological Persistence Diagrams
R.I.P.
π»
Ghosted
Path homologies of deep feedforward networks
R.I.P.
π»
Ghosted
From trees to barcodes and back again: theoretical and statistical perspectives
Died the same way β π» Ghosted
R.I.P.
π»
Ghosted
Language Models are Few-Shot Learners
R.I.P.
π»
Ghosted
PyTorch: An Imperative Style, High-Performance Deep Learning Library
R.I.P.
π»
Ghosted
XGBoost: A Scalable Tree Boosting System
R.I.P.
π»
Ghosted