Skip to main content

Showing 1–3 of 3 results for author: Ferragut, E M

Searching in archive cs. Search in all archives.
.
  1. arXiv:1511.04389  [pdf, other

    cs.CR cs.GT

    HackAttack: Game-Theoretic Analysis of Realistic Cyber Conflicts

    Authors: Erik M. Ferragut, Andrew C. Brady, Ethan J. Brady, Jacob M. Ferragut, Nathan M. Ferragut, Max C. Wildgruber

    Abstract: Game theory is appropriate for studying cyber conflict because it allows for an intelligent and goal-driven adversary. Applications of game theory have led to a number of results regarding optimal attack and defense strategies. However, the overwhelming majority of applications explore overly simplistic games, often ones in which each participant's actions are visible to every other participant. T… ▽ More

    Submitted 13 November, 2015; originally announced November 2015.

    Comments: 8 pages

  2. arXiv:1507.01443  [pdf, other

    cs.IR cs.DB

    Nonparametric Bayesian Modeling for Automated Database Schema Matching

    Authors: Erik M. Ferragut, Jason Laska

    Abstract: The problem of merging databases arises in many government and commercial applications. Schema matching, a common first step, identifies equivalent fields between databases. We introduce a schema matching framework that builds nonparametric Bayesian models for each field and compares them by computing the probability that a single model could have generated both fields. Our experiments show that o… ▽ More

    Submitted 6 July, 2015; originally announced July 2015.

  3. arXiv:1410.4355  [pdf, other

    cs.SI cs.LG stat.ML

    Multi-Level Anomaly Detection on Time-Varying Graph Data

    Authors: Robert A. Bridges, John Collins, Erik M. Ferragut, Jason Laska, Blair D. Sullivan

    Abstract: This work presents a novel modeling and analysis framework for graph sequences which addresses the challenge of detecting and contextualizing anomalies in labelled, streaming graph data. We introduce a generalization of the BTER model of Seshadhri et al. by adding flexibility to community structure, and use this model to perform multi-scale graph anomaly detection. Specifically, probability models… ▽ More

    Submitted 20 April, 2015; v1 submitted 16 October, 2014; originally announced October 2014.

    Comments: 8 pages. Updated paper to address reviewer comments