Skip to main content

Showing 1–9 of 9 results for author: Franco, F

Searching in archive cs. Search in all archives.
.
  1. arXiv:2407.05467  [pdf, other

    cs.DC cs.AI

    The infrastructure powering IBM's Gen AI model development

    Authors: Talia Gershon, Seetharami Seelam, Brian Belgodere, Milton Bonilla, Lan Hoang, Danny Barnett, I-Hsin Chung, Apoorve Mohan, Ming-Hung Chen, Lixiang Luo, Robert Walkup, Constantinos Evangelinos, Shweta Salaria, Marc Dombrowa, Yoonho Park, Apo Kayi, Liran Schour, Alim Alim, Ali Sydney, Pavlos Maniotis, Laurent Schares, Bernard Metzler, Bengi Karacali-Akyamac, Sophia Wen, Tatsuhiro Chiba , et al. (121 additional authors not shown)

    Abstract: AI Infrastructure plays a key role in the speed and cost-competitiveness of develo** and deploying advanced AI models. The current demand for powerful AI infrastructure for model training is driven by the emergence of generative AI and foundational models, where on occasion thousands of GPUs must cooperate on a single training job for the model to be trained in a reasonable time. Delivering effi… ▽ More

    Submitted 7 July, 2024; originally announced July 2024.

    Comments: Corresponding Authors: Talia Gershon, Seetharami Seelam,Brian Belgodere, Milton Bonilla

  2. arXiv:2405.03513  [pdf, other

    cs.CR cs.CE

    QBER: Quantifying Cyber Risks for Strategic Decisions

    Authors: Muriel Figueredo Franco, Aiatur Rahaman Mullick, Santosh Jha

    Abstract: Quantifying cyber risks is essential for organizations to grasp their vulnerability to threats and make informed decisions. However, current approaches still need to work on blending economic viewpoints to provide insightful analysis. To bridge this gap, we introduce QBER approach to offer decision-makers measurable risk metrics. The QBER evaluates losses from cyberattacks, performs detailed risk… ▽ More

    Submitted 6 May, 2024; originally announced May 2024.

    Comments: 10 pages, 9 equations, 3 tables, 2 figures

  3. arXiv:2402.14140  [pdf, other

    cs.CR

    QuantTM: Business-Centric Threat Quantification for Risk Management and Cyber Resilience

    Authors: Jan von der Assen, Muriel F. Franco, Muyao Dong, Burkhard Stiller

    Abstract: Threat modeling has emerged as a key process for understanding relevant threats within businesses. However, understanding the importance of threat events is rarely driven by the business incorporating the system. Furthermore, prioritization of threat events often occurs based on abstract and qualitative scoring. While such scores enable prioritization, they do not allow the results to be easily in… ▽ More

    Submitted 21 February, 2024; originally announced February 2024.

  4. arXiv:2307.11140  [pdf, other

    cs.CR cs.CY cs.IR

    RCVaR: an Economic Approach to Estimate Cyberattacks Costs using Data from Industry Reports

    Authors: Muriel Figueredo Franco, Fabian Künzler, Jan von der Assen, Chao Feng, Burkhard Stiller

    Abstract: Digitization increases business opportunities and the risk of companies being victims of devastating cyberattacks. Therefore, managing risk exposure and cybersecurity strategies is essential for digitized companies that want to survive in competitive markets. However, understanding company-specific risks and quantifying their associated costs is not trivial. Current approaches fail to provide indi… ▽ More

    Submitted 20 July, 2023; originally announced July 2023.

  5. arXiv:2307.01300  [pdf, other

    cs.NI

    Traffic Centralization and Digital Sovereignty: An Analysis Under the Lens of DNS Servers

    Authors: Demétrio F. Boeira, Eder J. Scheid, Muriel F. Franco, Luciano Zembruzki, Lisandro Z. Granville

    Abstract: The Domain Name System (DNS) service is one of the pillars of the Internet. This service allows users to access websites on the Internet through easy-to-remember domain names rather than complex numeric IP addresses. DNS acts as a directory that translates the domain names into a corresponding IP address, allowing communication between computers on different networks. However, the concentration of… ▽ More

    Submitted 3 July, 2023; originally announced July 2023.

    Comments: 8 pages, 7 figures

  6. arXiv:2304.07909  [pdf, other

    cs.CR cs.CY

    SECAdvisor: a Tool for Cybersecurity Planning using Economic Models

    Authors: Muriel Figueredo Franco, Christian Omlin, Oliver Kamer, Eder John Scheid, Burkhard Stiller

    Abstract: Cybersecurity planning is challenging for digitized companies that want adequate protection without overspending money. Currently, the lack of investments and perverse economic incentives are the root cause of cyberattacks, which results in several economic impacts on companies worldwide. Therefore, cybersecurity planning has to consider technical and economic dimensions to help companies achieve… ▽ More

    Submitted 16 April, 2023; originally announced April 2023.

    Comments: 12 pages, 7 figures, 2 tables, 9 equations

  7. arXiv:2206.09707  [pdf, other

    cs.CR cs.LG

    The Role of Machine Learning in Cybersecurity

    Authors: Giovanni Apruzzese, Pavel Laskov, Edgardo Montes de Oca, Wissam Mallouli, Luis Burdalo Rapa, Athanasios Vasileios Grammatopoulos, Fabio Di Franco

    Abstract: Machine Learning (ML) represents a pivotal technology for current and future information systems, and many domains already leverage the capabilities of ML. However, deployment of ML in cybersecurity is still at an early stage, revealing a significant discrepancy between research and practice. Such discrepancy has its root cause in the current state-of-the-art, which does not allow to identify the… ▽ More

    Submitted 20 June, 2022; originally announced June 2022.

  8. arXiv:1809.07784  [pdf

    cs.CY

    IASIS and BigMedilytics: Towards personalized medicine in Europe

    Authors: Ernestina Menasalvas Ruiz, Alejandro Rodríguez-González, Consuelo Gonzalo Martín, Massimiliano Zanin, Juan Manuel Tuñas, Mariano Provencio, Maria Torrente, Fabio Franco, Virginia Calvo, Beatriz Nuñez

    Abstract: One field of application of Big Data and Artificial Intelligence that is receiving increasing attention is the biomedical domain. The huge volume of data that is customary generated by hospitals and pharmaceutical companies all over the world could potentially enable a plethora of new applications. Yet, due to the complexity of such data, this comes at a high cost. We here review the activities of… ▽ More

    Submitted 20 September, 2018; originally announced September 2018.

    Journal ref: XVIII Conference of the Spanish Association for Artificial Intelligence (CAEPIA). 2019

  9. arXiv:1609.06868  [pdf

    cs.SE

    An Analysis of Technical Debt Management Through Resources Allocation Policies in Software Maintenance Process

    Authors: Eduardo Ferreira Franco, Joaquim Rocha, Hamilton Carvalho, Martins Marcelo, Kechi Hirama

    Abstract: This paper presents an analysis of technical debt management through resources allocation policies in software maintenance process during its operation to demonstrate how different strategies leads to the emergence of different behaviors along the evolution path. To achieve this objective, this work used the System Dynamic approach for building a computational simulation model based on extensive l… ▽ More

    Submitted 22 September, 2016; originally announced September 2016.

    Comments: in Proceedings of the 34th International Conference of the System Dynamics Society, Jul 2016, Delft, Netherlands. 2016