no code implementations • 23 Feb 2020 • María Óskarsdóttir, Cristián Bravo, Carlos Sarraute, Jan Vanthienen, Bart Baesens
In terms of profit, the best model is the one built with only calling behavior features.
no code implementations • 3 Dec 2018 • Carlos Sarraute, Martin Minnoni
This is a brief survey of the research performed by Grandata Labs in collaboration with numerous academic groups around the world on the topic of human mobility.
no code implementations • 13 Nov 2018 • Martin Fixman, Martin Minnoni, Carlos Sarraute
Patterns of mobile phone communications, coupled with the information of the social network graph and financial behavior, allow us to make inferences of users' socio-economic attributes such as their income level.
no code implementations • 10 Nov 2018 • Martin Fixman, Ariel Berenstein, Jorge Brea, Martin Minnoni, Matias Travizano, Carlos Sarraute
The explosion of mobile phone communications in the last years occurs at a moment where data processing power increases exponentially.
no code implementations • 9 Aug 2018 • Juan de Monasterio, Alejo Salles, Carolina Lang, Diego Weinberg, Martin Minnoni, Matias Travizano, Carlos Sarraute
We analyze here mobility and calling patterns in order to identify potential risk zones for the disease, by using public health information and mobile phone records.
no code implementations • 1 Aug 2018 • Jorge Brea, Javier Burroni, Carlos Sarraute
Over the past decade, mobile phones have become prevalent in all parts of the world, across all demographic backgrounds.
no code implementations • 30 Jun 2017 • Yongjun Liao, Wei Du, Márton Karsai, Carlos Sarraute, Martin Minnoni, Eric Fleury
Our study reveals that (a) postpaid customers are more active in terms of service usage and (b) there are strong structural correlations in the mobile phone call network as connections between customers of the same subscription type are much more frequent than those between customers of different subscription types.
no code implementations • 31 Jul 2013 • Carlos Sarraute, Olivier Buffet, Joerg Hoffmann
Penetration Testing is a methodology for assessing network security, by generating and executing possible hacking attacks.
no code implementations • 30 Jul 2013 • Carlos Sarraute, Olivier Buffet, Joerg Hoffmann
Penetration Testing is a methodology for assessing network security, by generating and executing possible hacking attacks.
no code implementations • 30 Jul 2013 • Carlos Sarraute
First, we introduce a conceptual model of computer network attacks, based on an analysis of the penetration testing practices.
no code implementations • 19 Jun 2013 • Carlos Sarraute, Olivier Buffet, Joerg Hoffmann
Penetration Testing is a methodology for assessing network security, by generating and executing possible attacks.
no code implementations • 18 Jun 2013 • Jorge Lucangeli Obes, Carlos Sarraute, Gerardo Richarte
In this paper we present a complete PDDL representation of an attack model, and an implementation that integrates a planner into a penetration testing tool.
no code implementations • 17 Jun 2013 • Carlos Sarraute, Gerardo Richarte, Jorge Lucangeli Obes
We herein contribute a planning model that does capture the uncertainty about the results of the actions, which is modeled as a probability of success of each action.