Carlos Sarraute
Carlos Sarraute
Director of Research, Grandata
Email verificata su - Home page
TitoloCitata daAnno
System and method for simulating computer network attacks
A Futoransky, FC Miranda, JI Orlicki, CES Yamada
US Patent 8,356,353, 2013
POMDPs Make Better Hackers: Accounting for Uncertainty in Penetration Testing.
C Sarraute, O Buffet, J Hoffmann
Proceedings of the Twenty-Sixth AAAI Conference on Artificial Intelligence …, 2012
A study of age and gender seen through mobile phone usage patterns in Mexico
C Sarraute, P Blanc, J Burroni
Advances in Social Networks Analysis and Mining (ASONAM), 2014 IEEE/ACM …, 2014
Security framework for protecting rights in computer software
A Futoransky, CES Yamada, DA Bendersky, L Notarfrancesco, ...
US Patent 7,549,147, 2009
System and method for probabilistic attack planning
CES Yamada, A Futoransky, GG Richarte, JL Obes
US Patent 8,490,193, 2013
An algorithm to find optimal attack paths in nondeterministic scenarios
C Sarraute, G Richarte, J Lucángeli Obes
Proceedings of the 4th ACM Workshop on Security and Artificial Intelligence …, 2011
Attack planning in the real world
J Lucangeli Obes, C Sarraute, G Richarte
SecArt'2010 at Twenty-Fourth AAAI Conference on Artificial Intelligence …, 2010
Inferring personal economic status from social network location
S Luo, F Morone, C Sarraute, M Travizano, HA Makse
Nature communications 8, 15227, 2017
System and method for extending automated penetration testing to develop an intelligent and cost efficient security strategy
JL Obes, CES Yamada, GG Richarte
US Patent 8,490,196, 2013
Social network analytics for churn prediction in telco: Model building, evaluation and network architecture
M Óskarsdóttir, C Bravo, W Verbeke, C Sarraute, B Baesens, ...
Expert Systems with Applications 85, 204-220, 2017
On the regularity of human mobility
EMR Oliveira, AC Viana, C Sarraute, J Brea, I Alvarez-Hamelin
Pervasive and Mobile Computing 33, 73-90, 2016
Measurement-driven mobile data traffic modeling in a large metropolitan area
EMR Oliveira, AC Viana, KP Naveen, C Sarraute
2015 IEEE International Conference on Pervasive Computing and Communications …, 2015
Building computer network attacks
A Futoransky, L Notarfrancesco, G Richarte, C Sarraute
arXiv preprint arXiv:1006.1916, 2010
Harnessing mobile phone social network topology to infer users demographic attributes
J Brea, J Burroni, M Minnoni, C Sarraute
Proceedings of the 8th Workshop on Social Network Mining and Analysis, 1, 2014
Socioeconomic correlations and stratification in social-communication networks
Y Leo, E Fleury, JI Alvarez-Hamelin, C Sarraute, M Karsai
Journal of The Royal Society Interface 13 (125), 20160598, 2016
Attack planning in the real world
J Lucangeli, C Sarraute, G Richarte
Workshop on Intelligent Security (SecArt 2010), 2010
Mobhet: Predicting human mobility using heterogeneous data sources
LM Silveira, JM de Almeida, HT Marques-Neto, C Sarraute, A Ziviani
Computer Communications 95, 54-68, 2016
Using neural networks to improve classical operating system fingerprinting techniques
C Sarraute, J Burroni
arXiv preprint arXiv:1006.1918, 2010
Simulating cyber-attacks for fun and profit
A Futoransky, F Miranda, J Orlicki, C Sarraute
Proceedings of the 2nd International Conference on Simulation Tools and …, 2009
Human mobility and predictability enriched by social phenomena information
NB Ponieman, A Salles, C Sarraute
Proceedings of the 2013 IEEE/ACM International Conference on Advances in …, 2013
Il sistema al momento non può eseguire l'operazione. Riprova più tardi.
Articoli 1–20