Toward Handling Uncertainty-At-Source in AI—A Review and Next Steps for Interval Regression
Most of statistics and AI draw insights through modeling discord or variance between
sources (ie, intersource) of information. Increasingly however, research is focusing on …
sources (ie, intersource) of information. Increasingly however, research is focusing on …
Risk assessment uncertainties in cybersecurity investments
When undertaking cybersecurity risk assessments, it is important to be able to assign
numeric values to metrics to compute the final expected loss that represents the risk that an …
numeric values to metrics to compute the final expected loss that represents the risk that an …
Multicriteria group decision-making under uncertainty using interval data and cloud models
In this study, we propose a multicriteria group decision-making (MCGDM) algorithm under
uncertainty where data is collected as intervals. The proposed MCGDM algorithm …
uncertainty where data is collected as intervals. The proposed MCGDM algorithm …
Timely decision analysis enabled by efficient social media modeling
Many decision problems are set in changing environments. For example, determining the
optimal investment in cyber maintenance depends on whether there is evidence of an …
optimal investment in cyber maintenance depends on whether there is evidence of an …
Global virus lockdown and cybercrime rate trends: A routine activity approach
I Govender, BWW Watson, J Amra - Journal of Physics …, 2021 - iopscience.iop.org
Cybercrime perpetuates as a major threat to the reputation and economy of a nation. There
is consensus in the media and academic journals alike, that cybercrimes have incremented …
is consensus in the media and academic journals alike, that cybercrimes have incremented …
Determinants of cybercrime originating within a nation: a cross-country study
ABSTRACT8 Cybercrimes have an adverse impact on the reputation and economy of a
nation. This paper investigates the factors that affect the frequency of cybercrime originating …
nation. This paper investigates the factors that affect the frequency of cybercrime originating …
On inter-rater reliability of information security experts
Abstract The Confidentiality-Availability-Integrity (CIA) triad is a time-honored warhorse of
security analysis. Qualitative assessment of security requirements based on the CIA triad is …
security analysis. Qualitative assessment of security requirements based on the CIA triad is …
Automatic generation of cyber architectures optimized for security, cost, and mission performance: A nature-inspired approach
Network segmentation refers to the practice of partitioning a computer network into multiple
segments and restricting communications between segments to inhibit a cyberattacker's …
segments and restricting communications between segments to inhibit a cyberattacker's …
What data should i protect? Recommender and planning support for data security analysts
Major breaches of sensitive company data, as for Facebook's 50 million user accounts in
2018 or Equifax's 143 million user accounts in 2017, are showing the limitations of reactive …
2018 or Equifax's 143 million user accounts in 2017, are showing the limitations of reactive …
Hierarchical text topic modeling with applications in social media-enabled cyber maintenance decision analysis and quality hypothesis generation
Z Sui - 2017 - rave.ohiolink.edu
Many decision problems are set in changing environments. For example, determining the
optimal investment in cyber maintenance depends on whether there is evidence of an …
optimal investment in cyber maintenance depends on whether there is evidence of an …