Percorrer por autor "Emmerich, Michael"
A mostrar 1 - 5 de 5
Resultados por página
Opções de ordenação
- An automatic generation of textual pattern rules for digital content filters proposal, using grammatical evolution genetic programmingPublication . Basto-Fernandes, Vitor; Yevseyeva, Iryna; Frantz, Rafael Z.; Grilo, Carlos Fernando Almeida; Díaz, Noemí Pérez; Emmerich, Michael
- Building and Using an Ontology of Preference-Based Multiobjective Evolutionary AlgorithmsPublication . Li, Longmei; Yevseyeva, Iryna; Basto-Fernandes, Vitor; Trautmann, Heike; Jing, Ning; Emmerich, MichaelIntegrating user preferences in Evolutionary Multiobjective Optimization (EMO) is currently a prevalent research topic. There is a large variety of preference handling methods (originated from Multicriteria decision making, MCDM) and EMO methods, which have been combined in various ways. This paper proposes a Web Ontology Language (OWL) ontology to model and systematize the knowledge of preferencebased multiobjective evolutionary algorithms (PMOEAs). Detailed procedure is given on how to build and use the ontology with the help of Prot´eg´e. Different use-cases, including training new learners, querying and reasoning are exemplified and show remarkable benefit for both EMO and MCDM communities.
- Selecting Optimal Subset of Security ControlsPublication . Yevseyeva, Iryna; Basto-Fernandes, Vitor; Emmerich, Michael; Van Moorsel, AadChoosing an optimal investment in information security is an issue most companies face these days. Which security controls to buy to protect the IT system of a company in the best way? Selecting a subset of security controls among many available ones can be seen as a resource allocation problem that should take into account conflicting objectives and constraints of the problem. In particular, the security of the system should be improved without hindering productivity, under a limited budget for buying controls. In this work, we provide several possible formulations of security controls subset selection problem as a portfolio optimization, which is well known in financial management. We propose approaches to solve them using existing single and multiobjective optimization algorithms.
- A survey of diversity-oriented optimizationPublication . Basto-Fernandes, Vitor; Yevseyeva, Iryna; Emmerich, Michael
- Two-stage Security Controls SelectionPublication . Yevseyeva, Iryna; Basto-Fernandes, Vitor; van Moorsel, Aad; Janicke, Helge; Emmerich, Michaelo protect a system from potential cyber security breaches and attacks, one needs to select efficient security controls, taking into account technical and institutional goals and constraints, such as available budget, enterprise activity, internal and external environment. Here we model the security controls selection problem as a two-stage decision making: First, managers and information security officers define the size of security budget. Second, the budget is distributed between various types of security controls. By viewing loss prevention with security controls measured as gains relative to a baseline (losses without applying security controls), we formulate the decision making process as a classical portfolio selection problem. The model assumes security budget allocation as a two objective problem, balancing risk and return, given a budget constraint. The Sharpe ratio is used to identify an optimal point on the Pareto front to spend the budget. At the management level the budget size is chosen by computing the trade-offs between Sharpe ratios and budget sizes. It is shown that the proposed two-stage decision making model can be solved by quadratic programming techniques, which is shown for a test case scenario with realistic data.
