Search results for "SOFTWARE"

showing 10 items of 7396 documents

A Novel Model for Cybersecurity Economics and Analysis

2017

In recent times, major cybersecurity breaches and cyber fraud had huge negative impact on victim organisations. The biggest impact made on major areas of business activities. Majority of organisations facing cybersecurity adversity and advanced threats suffers from huge financial and reputation loss. The current security technologies, policies and processes are providing necessary capabilities and cybersecurity mechanism to solve cyber threats and risks. However, current solutions are not providing required mechanism for decision making on impact of cybersecurity breaches and fraud. In this paper, we are reporting initial findings and proposing conceptual solution. The paper is aiming to pr…

ta113Value (ethics)Computer sciencemedia_common.quotation_subjectComputingMilieux_LEGALASPECTSOFCOMPUTING020207 software engineering02 engineering and technologyBusiness activitiesComputer securitycomputer.software_genrecybersecurity economicscyber fraudadvanced cyber threatstaloudelliset vaikutuksetcost-benefit model020204 information systemsCyber-security regulation0202 electrical engineering electronic engineering information engineeringResearch developmentkyberturvallisuuscomputercybersecurity impactReputationmedia_common2017 IEEE International Conference on Computer and Information Technology (CIT)
researchProduct

Online anomaly detection using dimensionality reduction techniques for HTTP log analysis

2015

Modern web services face an increasing number of new threats. Logs are collected from almost all web servers, and for this reason analyzing them is beneficial when trying to prevent intrusions. Intrusive behavior often differs from the normal web traffic. This paper proposes a framework to find abnormal behavior from these logs. We compare random projection, principal component analysis and diffusion map for anomaly detection. In addition, the framework has online capabilities. The first two methods have intuitive extensions while diffusion map uses the Nyström extension. This fast out-of-sample extension enables real-time analysis of web server traffic. The framework is demonstrated using …

ta113Web serverComputer Networks and Communicationsbusiness.industryComputer scienceRandom projectionDimensionality reductionRandom projectionPrincipal component analysisIntrusion detection systemAnomaly detectionMachine learningcomputer.software_genreCyber securityWeb trafficPrincipal component analysisDiffusion mapAnomaly detectionIntrusion detectionArtificial intelligenceData miningWeb servicebusinesskyberturvallisuuscomputer
researchProduct

Listwise Collaborative Filtering

2015

Recently, ranking-oriented collaborative filtering (CF) algorithms have achieved great success in recommender systems. They obtained state-of-the-art performances by estimating a preference ranking of items for each user rather than estimating the absolute ratings on unrated items (as conventional rating-oriented CF algorithms do). In this paper, we propose a new ranking-oriented CF algorithm, called ListCF. Following the memory-based CF framework, ListCF directly predicts a total order of items for each user based on similar users' probability distributions over permutations of the items, and thus differs from previous ranking-oriented memory-based CF algorithms that focus on predicting th…

ta113business.industryComputer scienceRecommender systemMachine learningcomputer.software_genreRankingcollaborative filteringBenchmark (computing)Collaborative filteringProbability distributionPairwise comparisonData miningArtificial intelligencerecommender systemsbusinessFocus (optics)computerranking-oriented collaborative filtering
researchProduct

SaaS architecture and pricing models

2014

In the new era of computing, SaaS software with different architectural characteristics might be priced in different ways. Even though both pricing and architectural characteristics are responsible for the success of the offering; the relationship between architectural and pricing characteristics has not been studied before. The present study fills this gap by employing a multi-case research. The findings accentuate that flexible and well-designed architecture enables different pricing models; however, poorly designed architecture limits also the pricing. Scalability and high level of modularity are the major enablers of a great variety of pricing models. Using public cloud services may lea…

ta113business.industryComputer scienceSoftware as a servicemedia_common.quotation_subjectArchitectural designCloud computingSaaS architecturehinnoitteluModularityVariety (cybernetics)SaaSNegotiationRisk analysis (engineering)ScalabilitycloudArchitecturebusinessSimulationmedia_common
researchProduct

Use of a Semantic Language to Reduce the Indeterminacy in Agents Communication

2014

In the field of agent communications uncertainty and vagueness in the message content and in the achievable results play a primordial role when two agents (human or artificial) communicate. Even though the importance of vagueness and uncertainty has been recognized long ago, only recently mechanisms related to the communications’ semantics that allow a practical approach have been designed; more specifically, the development of tools such as agent programming languages and frameworks, which is a field of intensive research. On the other hand, recent theoretical ideas, drawn from situation semantics theory and the works of Sutton on semantic information, support this work. This paper applies…

ta113business.industryComputer scienceVaguenessSemanticsOperational semanticscommunications semanticsSoftware agentWell-founded semanticsHuman–computer interactionmulti-agent systems programming languageFourth-generation programming languageArtificial intelligenceFifth-generation programming languageta518businessProgramming language theory
researchProduct

Automatic dynamic texture segmentation using local descriptors and optical flow

2012

A dynamic texture (DT) is an extension of the texture to the temporal domain. How to segment a DT is a challenging problem. In this paper, we address the problem of segmenting a DT into disjoint regions. A DT might be different from its spatial mode (i.e., appearance) and/or temporal mode (i.e., motion field). To this end, we develop a framework based on the appearance and motion modes. For the appearance mode, we use a new local spatial texture descriptor to describe the spatial mode of the DT; for the motion mode, we use the optical flow and the local temporal texture descriptor to represent the temporal variations of the DT. In addition, for the optical flow, we use the histogram of orie…

ta113business.industrySegmentation-based object categorizationComputer scienceTexture DescriptorComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISIONOptical flowScale-space segmentationPattern recognitionImage segmentationComputer Graphics and Computer-Aided DesignImage textureMotion fieldRegion growingComputer Science::Computer Vision and Pattern RecognitionHistogramComputer visionSegmentationArtificial intelligencebusinessSoftwareIEEE Transactions on Image Processing
researchProduct

Innovation as a driver of internationalization in the software industry

2013

Innovation and internationalization are two important factors for growth. This study analyzes whether innovativeness has an effect on the internationalization of software firms, and if so, how strong this effect is. Innovation and internationalization have rarely been studied together, with research tending to focus more on the relationship between innovations and growth. However, internationalization is a key prerequisite for growth for companies operating in small domestic markets. This paper analyzes the innovativeness and internationalization of firms, using data from the Software Industry Survey conducted in Finland. Since the speed of firm growth and internationalization are dependent…

ta113business.industrysoftware firmsInnovation managementkasvuDomestic marketInternationalizationSoftwareRevenue growthMarketinginternationalizationbusinessIndustrial organizationinnovatiivisuus2013 International Conference on Research and Innovation in Information Systems (ICRIIS)
researchProduct

An Approach for Network Outage Detection from Drive-Testing Databases

2012

A data-mining framework for analyzing a cellular network drive testing database is described in this paper. The presented method is designed to detect sleeping base stations, network outage, and change of the dominance areas in a cognitive and self-organizing manner. The essence of the method is to find similarities between periodical network measurements and previously known outage data. For this purpose, diffusion maps dimensionality reduction and nearest neighbor data classification methods are utilized. The method is cognitive because it requires training data for the outage detection. In addition, the method is autonomous because it uses minimization of drive testing (MDT) functionalit…

ta113cellular network drive testing databaseDowntimeArticle SubjectDatabaseComputer Networks and CommunicationsComputer scienceDimensionality reductionData classificationDiffusion mapcomputer.software_genrelcsh:QA75.5-76.95Base stationHandoverCellular networklcsh:Electronic computers. Computer scienceData miningtiedonlouhintacomputerInformation SystemsTest dataJournal of Computer Networks and Communications
researchProduct

Cognitive self-healing system for future mobile networks

2015

This paper introduces a framework and implementation of a cognitive self-healing system for fault detection and compensation in future mobile networks. Performance monitoring for failure identification is based on anomaly analysis, which is a combination of the nearest neighbor anomaly scoring and statistical profiling. Case-based reasoning algorithm is used for cognitive self-healing of the detected faulty cells. Validation environment is Long Term Evolution (LTE) mobile system simulated with Network Simulator 3 (ns-3) [1, 2]. Results demonstrate that cognitive approach is efficient for compensation of cell outages and is capable to improve network coverage. Anomaly analysis can be used fo…

ta113cognitionta213Performance managementComputer sciencebusiness.industryDistributed computingCognitiondata miningcomputer.software_genreAutomationanomaly detectionFault detection and isolation5G networksNetwork simulationcompensationcell outageRobustness (computer science)self-healingAnomaly detectionData miningbusinesscomputer5G2015 International Wireless Communications and Mobile Computing Conference (IWCMC)
researchProduct

Towards the cyber security paradigm of ehealth: Resilience and design aspects

2017

Digital technologies have significantly changed the role of healthcare clients in seeking and receiving medical help, as well as brought up more cooperative policy issues in healthcare cross-border services. Citizens continue to take a more co-creative role in decisions about their own healthcare, and new technologies can enable and facilitate this emergent trend. In this study, healthcare services have been intended as a critical societal sector and therefore healthcare systems are focused on as critical infrastructures that ought to be protected from all types of fears, including cyber security threats and attacks. Despite continual progress in the systemic risk management of cyber domain…

ta113e-healthcareEmerging technologiesbusiness.industrycyber securityComputer securitycomputer.software_genreAnticipation (artificial intelligence)Critical information infrastructureHealth careSystemic riskeHealthBusinessteleterveydenhuoltoResilience (network)kyberturvallisuuscomputerHealthcare system
researchProduct