Zum Hauptinhalt springen

Showing 1–13 of 13 results for author: Franco, M

Searching in archive cs. Search in all archives.
.
  1. arXiv:2407.14538  [pdf, other

    cs.DC

    Alea-BFT: Practical Asynchronous Byzantine Fault Tolerance

    Authors: Diogo S. Antunes, Afonso N. Oliveira, André Breda, Matheus Guilherme Franco, Henrique Moniz, Rodrigo Rodrigues

    Abstract: Traditional Byzantine Fault Tolerance (BFT) state machine replication protocols assume a partial synchrony model, leading to a design where a leader replica drives the protocol and is replaced after a timeout. Recently, we witnessed a surge of asynchronous BFT protocols, which use randomization to remove the need for bounds on message delivery times, making them more resilient to adverse network c… ▽ More

    Submitted 14 July, 2024; originally announced July 2024.

    Comments: arXiv admin note: substantial text overlap with arXiv:2202.02071

    ACM Class: C.2.4; D.4.5

    Journal ref: In21st USENIX Symposium on Networked Systems Design and Implementation (NSDI 24) 2024 (pp. 313-328)

  2. arXiv:2405.03513  [pdf, other

    cs.CR cs.CE

    QBER: Quantifying Cyber Risks for Strategic Decisions

    Authors: Muriel Figueredo Franco, Aiatur Rahaman Mullick, Santosh Jha

    Abstract: Quantifying cyber risks is essential for organizations to grasp their vulnerability to threats and make informed decisions. However, current approaches still need to work on blending economic viewpoints to provide insightful analysis. To bridge this gap, we introduce QBER approach to offer decision-makers measurable risk metrics. The QBER evaluates losses from cyberattacks, performs detailed risk… ▽ More

    Submitted 6 May, 2024; originally announced May 2024.

    Comments: 10 pages, 9 equations, 3 tables, 2 figures

  3. arXiv:2402.14140  [pdf, other

    cs.CR

    QuantTM: Business-Centric Threat Quantification for Risk Management and Cyber Resilience

    Authors: Jan von der Assen, Muriel F. Franco, Muyao Dong, Burkhard Stiller

    Abstract: Threat modeling has emerged as a key process for understanding relevant threats within businesses. However, understanding the importance of threat events is rarely driven by the business incorporating the system. Furthermore, prioritization of threat events often occurs based on abstract and qualitative scoring. While such scores enable prioritization, they do not allow the results to be easily in… ▽ More

    Submitted 21 February, 2024; originally announced February 2024.

  4. arXiv:2307.11140  [pdf, other

    cs.CR cs.CY cs.IR

    RCVaR: an Economic Approach to Estimate Cyberattacks Costs using Data from Industry Reports

    Authors: Muriel Figueredo Franco, Fabian Künzler, Jan von der Assen, Chao Feng, Burkhard Stiller

    Abstract: Digitization increases business opportunities and the risk of companies being victims of devastating cyberattacks. Therefore, managing risk exposure and cybersecurity strategies is essential for digitized companies that want to survive in competitive markets. However, understanding company-specific risks and quantifying their associated costs is not trivial. Current approaches fail to provide indi… ▽ More

    Submitted 20 July, 2023; originally announced July 2023.

  5. arXiv:2307.01300  [pdf, other

    cs.NI

    Traffic Centralization and Digital Sovereignty: An Analysis Under the Lens of DNS Servers

    Authors: Demétrio F. Boeira, Eder J. Scheid, Muriel F. Franco, Luciano Zembruzki, Lisandro Z. Granville

    Abstract: The Domain Name System (DNS) service is one of the pillars of the Internet. This service allows users to access websites on the Internet through easy-to-remember domain names rather than complex numeric IP addresses. DNS acts as a directory that translates the domain names into a corresponding IP address, allowing communication between computers on different networks. However, the concentration of… ▽ More

    Submitted 3 July, 2023; originally announced July 2023.

    Comments: 8 pages, 7 figures

  6. arXiv:2304.07909  [pdf, other

    cs.CR cs.CY

    SECAdvisor: a Tool for Cybersecurity Planning using Economic Models

    Authors: Muriel Figueredo Franco, Christian Omlin, Oliver Kamer, Eder John Scheid, Burkhard Stiller

    Abstract: Cybersecurity planning is challenging for digitized companies that want adequate protection without overspending money. Currently, the lack of investments and perverse economic incentives are the root cause of cyberattacks, which results in several economic impacts on companies worldwide. Therefore, cybersecurity planning has to consider technical and economic dimensions to help companies achieve… ▽ More

    Submitted 16 April, 2023; originally announced April 2023.

    Comments: 12 pages, 7 figures, 2 tables, 9 equations

  7. arXiv:2304.01405  [pdf

    cs.HC cs.CY

    The Work Avatar Face-Off: Knowledge Worker Preferences for Realism in Meetings

    Authors: Vrushank Phadnis, Kristin Moore, Mar Gonzalez Franco

    Abstract: While avatars have grown in popularity in social settings, their use in the workplace is still debatable. We conducted a large-scale survey to evaluate knowledge worker sentiment towards avatars, particularly the effects of realism on their acceptability for work meetings. Our survey of 2509 knowledge workers from multiple countries rated five avatar styles for use by managers, known colleagues an… ▽ More

    Submitted 8 October, 2023; v1 submitted 3 April, 2023; originally announced April 2023.

    Comments: 10 pages, accepted at ISMAR 2023 conference

  8. arXiv:2207.07338  [pdf, other

    cs.NE cs.AI cs.LG

    Context-sensitive neocortical neurons transform the effectiveness and efficiency of neural information processing

    Authors: Ahsan Adeel, Mario Franco, Mohsin Raza, Khubaib Ahmed

    Abstract: Deep learning (DL) has big-data processing capabilities that are as good, or even better, than those of humans in many real-world domains, but at the cost of high energy requirements that may be unsustainable in some applications and of errors, that, though infrequent, can be large. We hypothesise that a fundamental weakness of DL lies in its intrinsic dependence on integrate-and-fire point neuron… ▽ More

    Submitted 4 April, 2023; v1 submitted 15 July, 2022; originally announced July 2022.

  9. arXiv:2104.04547  [pdf, other

    cs.LG q-bio.BM

    High-Throughput Virtual Screening of Small Molecule Inhibitors for SARS-CoV-2 Protein Targets with Deep Fusion Models

    Authors: Garrett A. Stevenson, Derek Jones, Hyojin Kim, W. F. Drew Bennett, Brian J. Bennion, Monica Borucki, Feliza Bourguet, Aidan Epstein, Magdalena Franco, Brooke Harmon, Stewart He, Max P. Katz, Daniel Kirshner, Victoria Lao, Edmond Y. Lau, Jacky Lo, Kevin McLoughlin, Richard Mosesso, Deepa K. Murugesh, Oscar A. Negrete, Edwin A. Saada, Brent Segelke, Maxwell Stefan, Marisa W. Torres, Dina Weilhammer , et al. (7 additional authors not shown)

    Abstract: Structure-based Deep Fusion models were recently shown to outperform several physics- and machine learning-based protein-ligand binding affinity prediction methods. As part of a multi-institutional COVID-19 pandemic response, over 500 million small molecules were computationally screened against four protein structures from the novel coronavirus (SARS-CoV-2), which causes COVID-19. Three enhanceme… ▽ More

    Submitted 31 May, 2021; v1 submitted 9 April, 2021; originally announced April 2021.

  10. arXiv:2008.09841  [pdf, other

    cs.CR cs.NI

    Proverum: A Hybrid Public Verifiability and Decentralized Identity Management

    Authors: Christian Killer, Lucas Thorbecke, Bruno Rodrigues, Eder Scheid, Muriel Franco, Burkhard Stiller

    Abstract: Trust in electoral processes is fundamental for democracies. Further, the identity management of citizen data is crucial, because final tallies cannot be guaranteed without the assurance that every final vote was cast by an eligible voter. In order to establish a basis for a hybrid public verifiability of voting, this work (1) introduces Proverum, an approach combining a private environment based… ▽ More

    Submitted 22 August, 2020; originally announced August 2020.

  11. arXiv:2004.08812  [pdf, other

    cs.CR

    WeTrace -- A Privacy-preserving Mobile COVID-19 Tracing Approach and Application

    Authors: A. De Carli, M. Franco, A. Gassmann, C. Killer, B. Rodrigues, E. Scheid, D. Schoenbaechler, B. Stiller

    Abstract: For the protection of people and society against harm and health threats -- especially for the COVID-19 pandemic -- a variety of different disciplines needs to be involved. The data collection of very basic and health-related data of individuals in today's highly mobile society does help to plan, protect, and identify next steps health authorities and governments can, shall, or need to plan for or… ▽ More

    Submitted 19 April, 2020; originally announced April 2020.

  12. arXiv:1907.05527  [pdf, other

    cs.CR

    A Federated Lightweight Authentication Protocol for the Internet of Things

    Authors: Maria L. B. A. Santos, Jessica C. Carneiro, Antonio M. R. Franco, Fernando A. Teixeira, Marco A. Henriques, Leonardo B. Oliveira

    Abstract: Considering the world's IoT development and market, it is necessary to guarantee the security of the developed IoT applications as well as the privacy of their end users. In this sense, Federated Identity Management (FIdM) systems can be of great help as they improve user authentication and privacy. In this paper, we claim that traditional FIdM are mostly cumbersome and then ill-suited for IoT. As… ▽ More

    Submitted 11 July, 2019; originally announced July 2019.

  13. arXiv:1404.5929  [pdf

    cs.AR

    FPGA design of a cdma2000 turbo decoder

    Authors: Maribell Sacanamboy Franco, Fabio G. Guerrero

    Abstract: This paper presents the FPGA hardware design of a turbo decoder for the cdma2000 standard. The work includes a study and mathematical analysis of the turbo decoding process, based on the MAX-Log-MAP algorithm. Results of decoding for a packet size of two hundred fifty bits are presented, as well as an analysis of area versus performance, and the key variables for hardware design in turbo decoding.

    Submitted 23 April, 2014; originally announced April 2014.

    Comments: In Spanish, 14 pages, 13 figures