π A mathematical and ethical investigation into decryption complexity, password entropy, and the proactive defense of vulnerable populations through the lens of Calculus II.
This project represents both an academic paper and supporting code designed to simulate and model attacker behavior using infinite series, recurrence relations, and entropy decay.
-
Diverging_the_Partial_Sums(JRivas).pdf
π Final research paper submitted for MATH 2414 β Calculus II
Instructor: Dr. Mehran Hassanpour
Term: Spring 2025, Texas Tech University -
recursive.cpp
π Sample brute-force recursion model simulating password traversal -
detection_script.cpp
π‘οΈ Conceptual loop-based detection algorithm for series convergence-based intrusion analysis
This repository is intended for:
- Students seeking applied mathematical models in cybersecurity
- Educators exploring real-world applications of Calculus II
- Researchers modeling brute-force, entropy decay, and network resilience
- Advocates and analysts working to protect vulnerable users in digital spaces
- Infinite geometric series and divergence
- Maclaurin series for entropy modeling
- Recurrence relations and brute-force loop simulation
- Piecewise defense modeling
- Parametric phase space analysis
- Ethics in digital design for marginalized communities
π License
- The PDF paper is licensed under CC0 1.0 Universal (JRivas12). Attribution is appreciated.
- The C++ code files, will be licensed under the Apache License 2.0 in a future update. They are currently shared for academic review.
See the included LICENSE.txt and Appendix for more details.
βοΈ Contact & Social Links
Feel free to reach out or connect professionally:
- π§ jrivas12@stu.southtexascollege.edu
- π§ riv42599@ttu.edu
- π₯ YouTube: joerivas1404
- π¬ TikTok: @fiascoDev
- πΌ LinkedIn: Joe Lee Rivas
βThe limits we once feared became the very boundary conditions that made our function solvable.β
β Diverging the Partial Sums of Two Men of Calculus