TechRank: A Network-Centrality Approach for Informed
Cybersecurity-Investment
- URL: http://arxiv.org/abs/2112.05548v1
- Date: Fri, 10 Dec 2021 14:01:49 GMT
- Title: TechRank: A Network-Centrality Approach for Informed
Cybersecurity-Investment
- Authors: Anita Mezzetti, Dimitri Percia David, Thomas Maillart, Michael
Tsesmelis, Alain Mermoud
- Abstract summary: We study the mutual influence of companies and technologies from the cybersecurity field.
This endeavor helps to measure the impact of an entity on the cybersecurity market.
- Score: 0.0
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: The cybersecurity technological landscape is a complex ecosystem in which
entities -- such as companies and technologies -- influence each other in a
non-trivial manner. Measuring the influence between entities is a tenet for
informed technological investments in critical infrastructure. To study the
mutual influence of companies and technologies from the cybersecurity field, we
consider a bi-partite graph that links both sets of entities. Each node in this
graph is weighted by applying a recursive algorithm based on the method of
reflection. This endeavor helps to measure the impact of an entity on the
cybersecurity market. Our results help researchers measure more precisely the
magnitude of influence of each entity, and allows decision-makers to devise
more informed investment strategies, according to their portfolio preferences.
Finally, a research agenda is suggested, with the aim of allowing tailor-made
investments by arbitrarily calibrating specific features of both types of
entities.
Related papers
- FSCsec: Collaboration in Financial Sector Cybersecurity -- Exploring the Impact of Resource Sharing on IT Security [0.9374652839580183]
This research aims to provide insights that can help financial institutions make better decisions to protect.
By using simple theories to understand these factors, this research aims to provide insights that can help financial institutions make better decisions to protect.
arXiv Detail & Related papers (2024-10-19T20:03:27Z) - Interpretable Cyber Threat Detection for Enterprise Industrial Networks: A Computational Design Science Approach [1.935143126104097]
We use IS computational design science paradigm to develop a two-stage cyber threat detection system for enterprise-level IS.
The first stage generates synthetic industrial network data using a modified generative adversarial network.
The second stage develops a novel bidirectional gated recurrent unit and a modified attention mechanism for effective threat detection.
arXiv Detail & Related papers (2024-09-04T19:54:28Z) - Measuring Technological Convergence in Encryption Technologies with
Proximity Indices: A Text Mining and Bibliometric Analysis using OpenAlex [46.3643544723237]
This study identifies technological convergence among emerging technologies in cybersecurity.
The proposed method integrates text mining and bibliometric analyses to formulate and predict technological proximity indices.
Our case study findings highlight a significant convergence between blockchain and public-key cryptography, evidenced by the increasing proximity indices.
arXiv Detail & Related papers (2024-03-03T20:03:03Z) - Graph Mining for Cybersecurity: A Survey [61.505995908021525]
The explosive growth of cyber attacks nowadays, such as malware, spam, and intrusions, caused severe consequences on society.
Traditional Machine Learning (ML) based methods are extensively used in detecting cyber threats, but they hardly model the correlations between real-world cyber entities.
With the proliferation of graph mining techniques, many researchers investigated these techniques for capturing correlations between cyber entities and achieving high performance.
arXiv Detail & Related papers (2023-04-02T08:43:03Z) - Semantic Information Marketing in The Metaverse: A Learning-Based
Contract Theory Framework [68.8725783112254]
We address the problem of designing incentive mechanisms by a virtual service provider (VSP) to hire sensing IoT devices to sell their sensing data.
Due to the limited bandwidth, we propose to use semantic extraction algorithms to reduce the delivered data by the sensing IoT devices.
We propose a novel iterative contract design and use a new variant of multi-agent reinforcement learning (MARL) to solve the modelled multi-dimensional contract problem.
arXiv Detail & Related papers (2023-02-22T15:52:37Z) - Crowdsourcing Impacts: Exploring the Utility of Crowds for Anticipating
Societal Impacts of Algorithmic Decision Making [7.068913546756094]
We employ crowdsourcing to uncover different types of impact areas based on a set of governmental algorithmic decision making tools.
Our findings suggest that this method is effective at leveraging the cognitive diversity of the crowd to uncover a range of issues.
arXiv Detail & Related papers (2022-07-19T19:46:53Z) - Privacy-preserving Graph Analytics: Secure Generation and Federated
Learning [72.90158604032194]
We focus on the privacy-preserving analysis of graph data, which provides the crucial capacity to represent rich attributes and relationships.
We discuss two directions, namely privacy-preserving graph generation and federated graph learning, which can jointly enable the collaboration among multiple parties each possessing private graph data.
arXiv Detail & Related papers (2022-06-30T18:26:57Z) - Masked Transformer for Neighhourhood-aware Click-Through Rate Prediction [74.52904110197004]
We propose Neighbor-Interaction based CTR prediction, which put this task into a Heterogeneous Information Network (HIN) setting.
In order to enhance the representation of the local neighbourhood, we consider four types of topological interaction among the nodes.
We conduct comprehensive experiments on two real world datasets and the experimental results show that our proposed method outperforms state-of-the-art CTR models significantly.
arXiv Detail & Related papers (2022-01-25T12:44:23Z) - AI Assurance using Causal Inference: Application to Public Policy [0.0]
Most AI approaches can only be represented as "black boxes" and suffer from the lack of transparency.
It is crucial not only to develop effective and robust AI systems, but to make sure their internal processes are explainable and fair.
arXiv Detail & Related papers (2021-12-01T16:03:06Z) - Deep Technology Tracing for High-tech Companies [67.86308971806322]
We develop a novel data-driven solution, i.e., Deep Technology Forecasting (DTF) framework, to automatically find the most possible technology directions customized to each high-tech company.
DTF consists of three components: Potential Competitor Recognition (PCR), Collaborative Technology Recognition (CTR), and Deep Technology Tracing (DTT) neural network.
arXiv Detail & Related papers (2020-01-02T07:44:12Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.