no code implementations • 27 Oct 2022 • Kevin Hu, Retsef Levi, Raphael Yahalom, El Ghali Zerhouni
The paper leverages outside-in cyber risk scores that aim to capture the quality of the enterprise internal cybersecurity management, but augment these with supply chain features that are inspired by observed third party cyberattack scenarios, as well as concepts from network science research.
2 code implementations • 25 May 2019 • Madelon Hulsebos, Kevin Hu, Michiel Bakker, Emanuel Zgraggen, Arvind Satyanarayan, Tim Kraska, Çağatay Demiralp, César Hidalgo
Correctly detecting the semantic type of data columns is crucial for data science tasks such as automated data cleaning, schema matching, and data discovery.
1 code implementation • 12 May 2019 • Kevin Hu, Neil Gaikwad, Michiel Bakker, Madelon Hulsebos, Emanuel Zgraggen, César Hidalgo, Tim Kraska, Guoliang Li, Arvind Satyanarayan, Çağatay Demiralp
Researchers currently rely on ad hoc datasets to train automated visualization tools and evaluate the effectiveness of visualization designs.