๐Ÿ”ฌ

Cybersecurity

1
Open Unknowns
1
Cross-Domain Bridges
2
Active Hypotheses

Cross-Domain Bridges

Bridge Bond/site percolation thresholds on graphs โ†” lateral movement probability and blast-radius growth in enterprise networks (probability โ†” cybersecurity)

Fields: Mathematics, Computer Science, Cybersecurity, Network Science

Lateral movement after initial compromise is often modeled as random or attacker-chosen hops on a graph of hosts, accounts, and trust relationships. Bond percolation (edges open with probability p) an...

Open Unknowns (1)

Unknown What is the optimal cybersecurity investment strategy for an organization under adversarial uncertainty โ€” when the attacker's capabilities, objectives, and rationality are unknown and the defender cannot observe the true threat landscape? u-optimal-cybersecurity-investment-under-adversarial-uncertainty

Active Hypotheses

Hypothesis The Stackelberg defender-attacker equilibrium predicts that organizations systematically overinvest in visible, deterrence-oriented security and underinvest in detection and response โ€” a prediction testable through breach cost and security spending decomposition data. medium
Hypothesis Implementing least-privilege identity segmentation and device compliance gates increases the effective percolation threshold p_c on measured enterprise graphs, measurably shrinking giant-component probability in Monte Carlo hop models seeded at random workstations. high

Know something about Cybersecurity? Contribute an unknown or hypothesis โ†’

Generated 2026-05-10 ยท USDR Dashboard