Modeling Cascading Risk Dynamics in Governance, Risk, and Compliance Systems through Nonlinear Wave Profile Decomposition and Adaptive Control Optimization
-
https://doi.org/10.14419/8aed0265
Received date: June 16, 2025
Accepted date: January 22, 2026
Published date: February 12, 2026
-
Cascading Risk Modeling, Nonlinear Wave Decomposition, Cybersecurity, Risk Propagation, Adaptive Controls, Mitigation Strategies, IoT Ecosystems, Real-Time Risk Management, Cyberattack Simulation, Dynamic Risk Assessment -
Abstract
This paper presents a novel approach to cybersecurity risk management through the development of a cascading risk model that simulates the propagation of risks across interconnected systems and evaluates mitigation strategies. Unlike traditional linear risk models, the proposed model integrates nonlinear wave decomposition and adaptive control mechanisms to capture the dynamic and evolving nature of cybersecurity threats. The model was validated using data from both the Kaggle Cyberattack Dataset and the National Vulnerability Database (NVD), demonstrating its ability to accurately model cascading risks and assess the effectiveness of mitigation measures. The simulation results show significant reductions in risk propagation, with mitigation strategies reducing the overall risk by up to 42% for certain attack types. The findings underscore the model’s ability to address gaps in existing cybersecurity frameworks by providing real-time adaptive risk management in complex, interdependent environments. This work offers a scalable solution for improving cybersecurity resilience in modern infrastructure and IoT ecosystems.
-
References
- K. C. Chaganti, “A Scalable, Lightweight AI-Driven Security Framework for IoT Ecosystems: Optimization and Game Theory Approaches,” IEEE Access, vol. 99, pp. 1–1, 2025. [Online]. Available: https://doi.org/10.1109/ACCESS.2025.3558623
- A. Yaseen, ”Enhancing Cybersecurity through Automated Infrastructure Management: A Comprehensive Study on Optimizing Security Measures,” Quarterly Journal of Emerging Technologies, 2024. Available: Available: https://www.researchgate.net/.../ Enhancing-Cybersecurity-through-Automated-Infrastructure-Management-A-Comprehensive-Study-on-Optimizing-Security-Measures.pdf
- ¨ O. Aslan, S. S. Aktu˘g, M. Ozkan-Okay, A. A. Yilmaz, and E. Akin, “A Comprehensive Review of Cybersecurity Vulnerabilities, Threats, Attacks, and Solutions,” Electronics, vol. 12, no. 6, p. 1333, 2023. Available: https://www.mdpi.com/2079-9292/12/6/1333
- S. Abraham and S. Nair, “Comparative analysis and patch optimization using the cybersecurity analytics framework,” The Journal of Defense Modeling and Simulation, vol. 15, no. 3, pp. 281–292, 2018. Available: https://journals.sagepub.com/doi/abs/10.1177/1548512917705743
- N. Doukas, “Reliability-Based Design Optimization for Cyber Survivability,” in Reliability Assessment and Optimization of Complex Systems, Elsevier, 2025, pp. 615–639. Available: https://www.sciencedirect.com/science/article/pii/B9780443291128000293 International Journal of Applied Mathematical Research 11
- T. Kure, S. Islam, M. Ghazanfar, and A. Raza, “Asset criticality and risk prediction for an effective cybersecurity risk management of cyber-physical system,” Neural Computing and Applications, vol. 34, pp. 2259–2275, 2022. Available: https://link.springer.com/article/10.1007/s00521-022-06959-2
- H. M. Elavarasan, R. Manoharan, S. Murlidharan, and J. Karnati, “Battery Management System: Threat Modeling, Vulnerability Analysis, and Cybersecurity Strategy,” IEEE Access, vol. 9, pp. 5176–5184, 2021. Available: https://ieeexplore.ieee.org/document/9447569
- L. Judijanto and D. Hindarto, “Edge of enterprise architecture in addressing cyber security threats and business risks,” International Journal of Security and Computer Science, vol. 12, no. 6, pp. 118–132, 2023. Available: http://www.journal.lembagakita.org/index.php/ijsecs/article/view/1816
- M. Ficco, M. Chora´s, and R. Kozik, “Simulation Platform for Cyber-Security and Vulnerability Analysis of Critical Infrastructures,” Procedia Computer Science, vol. 108, pp. 1948–1957, 2017. Available: https://doi.org/10.1016/j.procs.2017.05.142
- H. I. Kure, S. Islam, and M. Ghazanfar, “Cybersecurity risk assessment in smart city infrastructures,” Journal of Computational Science, vol. 17, pp. 163–175, 2022. Available: https://www.sciencedirect.com/science/article/pii/S187775032100147X
- N. Doukas and T. Poleto, “Reliability-Based Design Optimization for Cyber-Physical Systems in the Context of Cyber Survivability,” in Reliabil ity Assessment and Optimization of Complex Systems, Elsevier, 2025, pp. 122–135. Available: https://www.sciencedirect.com/science/article/pii/ B9780443291128000165
- S. Abraham, “Optimization Models for Cyber Infrastructure Security and Their Impact on Mitigating Risks,” IEEE Access, vol. 11, pp. 1239–1249, 2023. Available: https://ieeexplore.ieee.org/document/9867201
- Z. Zhou et al., “Modeling Cascading Failures in Interdependent Critical Infrastructures,” Complexity, vol. 2023, Article ID 1371526, 2023. Available: https://www.hindawi.com/journals/complexity/2023/1371526
- Y. Guo, J. Wang, and M. Li, “Dynamic Risk Modeling in Cloud Computing with Adaptive Feedback,” IEEE Transactions on Cloud Computing, vol. 10, no. 2, pp. 125–136, 2022. Available: https://ieeexplore.ieee.org/document/9520112
- M.Hossain and A. El Saddik, “Time-Series Decomposition-Based Cyber Risk Estimation,” IEEE Internet of Things Journal, vol. 8, no. 3, pp. 1874–1883, 2021. Available: https://ieeexplore.ieee.org/document/9247164
- X. Zhang, L. He, and H. Wang, “Cascading Risks and Mitigation Strategies in Large-Scale Systems,” International Journal of Critical Infrastructure Protection, vol. 36, p. 100459, 2021. Available: https://doi.org/10.1016/j.ijcip.2021.100459
- F. Li and R. Buyya, “Resource-Aware and Risk-Sensitive Workload Orchestration in GRC Cloud Environments,” Future Generation Computer Systems, vol. 135, pp. 67–80, 2022. Available: https://doi.org/10.1016/j.future.2022.04.008
- R. Yang and L. He, “A Control-Theoretic Approach to GRC-Based Cyber Risk Adaptation,” Journal of Systems and Software, vol. 182, p. 111073, 2022. Available: https://doi.org/10.1016/j.jss.2021.111073
- J. Kim and Y. Park, “Profile Decomposition of Nonlinear Systems for Cyber Risk Forecasting,” Journal of Network and Computer Applications, vol. 2023, p. 103619, 2023. Available: https://www.sciencedirect.com/science/article/pii/S1084804523000410
- A. Yaseen, “Enhancing Cybersecurity Through Automated Infrastructure Optimization,” ResearchGate, Preprint, 2024. Available: https://www. researchgate.net/publication/378594258
- L. Xu et al., “Nonlinear Wave-Based Risk Propagation Analysis in Complex Systems,” Chaos, Solitons & Fractals, vol. 165, p. 112905, 2023. Available: https://doi.org/10.1016/j.chaos.2022.112905
-
Downloads
-
How to Cite
Paidy, P. (2026). Modeling Cascading Risk Dynamics in Governance, Risk, and Compliance Systems through Nonlinear Wave Profile Decomposition and Adaptive Control Optimization. International Journal of Applied Mathematical Research, 15(1), 18-30. https://doi.org/10.14419/8aed0265
