Toward Handling Uncertainty-At-Source in AI—A Review and Next Steps for Interval Regression

S Kabir, C Wagner, Z Ellerby - IEEE Transactions on Artificial …, 2023 - ieeexplore.ieee.org
Most of statistics and AI draw insights through modeling discord or variance between
sources (ie, intersource) of information. Increasingly however, research is focusing on …

Risk assessment uncertainties in cybersecurity investments

A Fielder, S König, E Panaousis, S Schauer, S Rass - Games, 2018 - mdpi.com
When undertaking cybersecurity risk assessments, it is important to be able to assign
numeric values to metrics to compute the final expected loss that represents the risk that an …

Multicriteria group decision-making under uncertainty using interval data and cloud models

HA Khorshidi, U Aickelin - Journal of the Operational Research …, 2021 - Taylor & Francis
In this study, we propose a multicriteria group decision-making (MCGDM) algorithm under
uncertainty where data is collected as intervals. The proposed MCGDM algorithm …

Timely decision analysis enabled by efficient social media modeling

TT Allen, Z Sui, NL Parker - Decision Analysis, 2017 - pubsonline.informs.org
Many decision problems are set in changing environments. For example, determining the
optimal investment in cyber maintenance depends on whether there is evidence of an …

Global virus lockdown and cybercrime rate trends: A routine activity approach

I Govender, BWW Watson, J Amra - Journal of Physics …, 2021 - iopscience.iop.org
Cybercrime perpetuates as a major threat to the reputation and economy of a nation. There
is consensus in the media and academic journals alike, that cybercrimes have incremented …

Determinants of cybercrime originating within a nation: a cross-country study

SK Srivastava, S Das, GJ Udo… - Journal of Global …, 2020 - Taylor & Francis
ABSTRACT8 Cybercrimes have an adverse impact on the reputation and economy of a
nation. This paper investigates the factors that affect the frequency of cybercrime originating …

On inter-rater reliability of information security experts

A Shoufan, E Damiani - Journal of information security and applications, 2017 - Elsevier
Abstract The Confidentiality-Availability-Integrity (CIA) triad is a time-honored warhorse of
security analysis. Qualitative assessment of security requirements based on the CIA triad is …

Automatic generation of cyber architectures optimized for security, cost, and mission performance: A nature-inspired approach

N Wagner, CŞ Şahin, J Pena, WW Streilein - Advances in Nature-Inspired …, 2019 - Springer
Network segmentation refers to the practice of partitioning a computer network into multiple
segments and restricting communications between segments to inhibit a cyberattacker's …

What data should i protect? Recommender and planning support for data security analysts

T Li, G Convertino, RK Tayi, S Kazerooni - Proceedings of the 24th …, 2019 - dl.acm.org
Major breaches of sensitive company data, as for Facebook's 50 million user accounts in
2018 or Equifax's 143 million user accounts in 2017, are showing the limitations of reactive …

Hierarchical text topic modeling with applications in social media-enabled cyber maintenance decision analysis and quality hypothesis generation

Z Sui - 2017 - rave.ohiolink.edu
Many decision problems are set in changing environments. For example, determining the
optimal investment in cyber maintenance depends on whether there is evidence of an …