Who's Driving My Car? A Machine Learning based Approach to Driver Identification

Despite the development of new technologies, in order to prevent the stealing of cars, the number of car thefts is sharply increasing. With the advent of electronics, new ways to steal cars were found. To avoid auto-theft attacks, in this paper we propose a machine leaning based method to silently e continuously profile the driver by analyzing built-in vehicle sensors. We evaluate the efficiency of the proposed method in driver identification using 10 different drivers.

Model checking based approach for compliance checking

Process mining is the set of techniques to retrieve a process model starting from available logging data. The discovered process model has to be analyzed to verify whether it respects the defined properties, i.e., the so-called compliance checking. Our aim is to use a model checking based approach to verify compliance. First, we propose an integrated-tool approach using existing tools as ProM (a framework supporting process mining techniques) and CADP (a formal verification environment). More precisely, the execution traces from a software system are extracted.

Cyber Risk management: an actuarial point of view

In the last decades companies worldwide are facing a new kind of risk, namely cyber risk, that has emerged as one of the top challenges in risk management. Insurance was only recently applied to cyber world and it is increasingly becoming part of the risk management process, posing many challenges to actuaries. One of the main issues is the lack of data, in particular nancial ones.

Quantile based risk measures in cyber security

Measures and methods used in financial sector to quantify risk, have been recently applied to cyber world. The aim is to help organizations to improve risk management strategies and to wisely plan investments in cyber security. On the other hand, they are useful instruments for insurance companies in pricing cyber insurance contracts and setting the minimum capital requirements defined by the regulators. In this paper we propose an estimation of Value at Risk (VaR), referred to as Cyber Value at Risk in cyber security domain, and Tail Value at risk (TVaR).

Assessment of cumulative discriminant analysis for cloud detection in the ESA PROBA-V Round Robin exercise

Cloud detection is a critical issue for satellite optical remote sensing, since potential errors in cloud masking can be translated directly into significant uncertainty in the retrieved downstream geophysical products. The problem is particularly challenging when only of a limited number of spectral bands is available, and thermal infrared bands are lacking.

Hybridization of the imperialist competitive algorithm and local search with application to ship design optimization

In the wide scenario of the optimization techniques, a large number of algorithms are inspired by natural processes, in many different ways. One of the latest is the Imperialist Competitive Algorithm (ICA) Atashpaz-Gargari and Lucas (2007), judged by their authors as very efficient and competitive with other popular optimization algorithms. However, its diffusion is still limited, so that it has not yet been adequately studied.

Effect of parameter selection on different topological structures for Particle Swarm Optimization algorithm

Particle Swarm Optimization is an evolutionary optimization algorithm, largely studied during the years: analysis of convergence, determination of the optimal coefficients, hybridization of the original algorithm and also the determination of the best relationship structure between the swarm elements (topology) have been investigated largely. Unfortunately, all these studies have been produced separately, and the same coefficients, derived for the original topology of the algorithm, have been always applied.