An Adversarial Risk Analysis Approach to Fraud Detection
|
|
|
- Susanna Williamson
- 10 years ago
- Views:
Transcription
1 An Adversarial Risk Analysis Approach to Fraud Detection J. Cano 1 D. Ríos Insua 2 1 URJC 2 ICMAT-CSIC, Spain 20th IFORS. Barcelona. July 15, 2014
2 Outline A framework for risk analysis A framework for adversarial risk analysis A framework for risk analysis and adversarial risk analysis Case study: fighting fare evasion 2/25
3 General overview Risk analysis methodology to mitigate negative effects of threats that may harm system performance. Adversarial risk analysis expands RA to deal with intelligent intentional adversaries. Application in fraud detection in relation with access to a paid facility. 3/25
4 1. A framework for risk analysis 4/25
5 Risk analysis influence diagrams and expected utility Hazard Mitigation Option Hazard Extra Mitigation Extra Utility Total Utility Total Utility Basic With risk assessment With risk management ψ = n u(c)π(c)dc, ψ r = q j j=0 u(c)π j (c)dc, n ψ m = max q j (m) u(c)π j (c m)dc m M j=0 5/25
6 2. A framework for adversarial risk analysis 6/25
7 Sequential Defend-Attack model Defence Option Hazard Attack Option Defence Option Hazard Attack Option Defence Option Hazard Attack Option u D u A u D u A Coupled Defender s problem Attacker s problem 7/25
8 Solving strategy Defender aims at finding optimal defense d. Consequences evaluated through utility u D (d,s) ψ D (d a) = u D (d,s)p D (s d,a)ds. Suppose Defender able to assess p D (a d). Then, she can compute ψ D (d) = ψ D (d a)p D (a d)ds. and solve d max d D ψ D (d). 8/25
9 Assessment of Attacker s intentions To obtain p D (a d), solve Attacker s problem (E.U. max.) a (d) = arg max a A u A (a,s)p A (s d,a)ds. Defender lacks knowledge ( u A ( ),p A (s ) ) ( U A,P A ). Approximate p D (a d) through Monte Carlo simulation. Assessment of P A ( ) typically based on p D ( ) Dirichlet distribution (process) for discrete (continuous). For U A, information about Attacker s interests Aggregate with weighted measurable value function. Assume risk proneness. Distributions over weights and risk proneness coefficient. 9/25
10 3. A framework for risk analysis and adversarial risk analysis 10/25
11 General influence diagram Mitigation Option Hazard Attack Attacker Mitigation Extra Attack Attacker Total u D u A Incorporate uncertainty from non-adversarial threats. Defender s u D aggregates consequences from both problems. 11/25
12 4. Case study: fighting fare evasion 12/25
13 Influence diagram Countermeasures Customers Prop. of fraudsters Prop. of colluders Colluders decision Fraud cost operator colluders u D u C 13/25
14 Description of problem Metro operator D protecting from: Fare evasion. Two types of evaders: Standard (standard random process). Colluders (ARA; explicitly modeling intentionality). Role Features d 1 Inspector Prev./rec. Inspect customers. Collect fines d 2 Door guard Prev. Control access points d 3 Guard Prev. Patrol along the facility d 4 Door Prev. New secured automatic access doors d 5 Ticket clerk Prev. Current little implication in security 14/25
15 Feasible portfolios Associated unit costs q 1,q 2,q 3,q 4. d 5 {0,1} (d 5 = 1 clerks involved, incurred costs q 5 ). q 1 d 1 + q 2 d 2 + q 3 d 3 + q 4 d 4 B, d 1,d 2,d 3,d 4 0, d 1,d 2,d 3,d 4 integer, d 4 d 4, d 5 {0,1}, ( d 4 maximum # of doors that may be replaced). 15/25
16 Defender s problem Operator invests d = (d 1,d 2,d 3,d 4,d 5 ). (Constraints) Fare evasion costs (partly mitigated by fines). φ (d) evaders proportion. q(d 1 ) inspection proportion ( φ(d) = φ 0 exp 5 k=1 γ k d k ) + φ r. γk s effect of (d 1,d 2,d 3,d 4,d 5 ) on fraud proportion. (φ 0 + φ r ) current fraud proportion. φ r residual proportion even with infinite resources. Each new inspector # inspected tickets (nonlinear increase). 1 φ(d) N 1 civic customers pay ticket. φ(d)[1 q(d 1 )] N 2 not pay, not caught (loss v). φ(d)q(d 1 ) N 3 do not pay but caught (income f ). 16/25
17 Attacker s problem Colluders see security investments d (Seq D-A). Fare evasion proportion r r, inspection proportion q A (d 1 ) 1 r M 1 pay, abortion (income v). r (1 q A (d 1 )) M 2 not pay, not caught (loss v). r q A (d 1 ) M 3 not pay, caught (income f ). Operational costs, including preparation costs q c A = v(m 2 M 1 ) fm 3 rqm. Colluders risk prone in benefits u A (c A ) = exp(k A c A ), k A > 0. Target: Assess h(r d), Defender s beliefs over proportion of evasion attempts given d. 17/25
18 Solving the Defender s problem Operator benefit/cost balance c D (N 1,N 2,N 3,M 1,M 2,M 3,d) = v(n 2 + M 2 ) + f (N 3 + M 3 ) Operator risk averse to increase in income, u D (c D ) = exp( k D c D ). Evaluate security plan d maximizing expected utility 5 k=1 q k d k. [ ] 1 ψ D (x) = p M1M2M3d pn 1 d p2 N 2 d p3 N 3 d u D(c D ) N 1,N 2,N 3 M 1,M 2,M 3 h(r d)dr. 18/25
19 Results 0.5 3% 3% 6% 6% 12% 12% Expected utility x * x * x * Portfolio 19/25
20 Results p 0 + p r = 0.03,M = p 0 + p r = 0.06,M = p 0 + p r = 0.12,M = x Invest. ψ(x) Income x Invest. ψ(x) x Invest. ψ(x) (1,0,0,0,0) (1,2,0,0,0) (1,3,0,0,0) (1,0,0,0,0) (1,0,0,0,0) (1,0,0,0,0) (0,3,0,0,0) (0,3,0,0,0) (0,3,0,0,0) (0,0,2,0,0) (0,0,2,0,0) (0,0,2,0,0) (0,0,0,1,0) (0,0,0,1,0) (0,0,0,1,0) (0,0,0,0,1) (0,0,0,0,1) (0,0,0,0,1) (0,3,2,1,1) (0,3,2,1,1) (0,3,2,1,1) (0,3,2,1,0) (0,3,2,1,0) (0,3,2,1,0) Optimal portfolio d = (1,0,0,0,0), with ψ(x) = 1.12, associated investment 50,000 euros, and expected losses 22,826 euros (investment plus expected balance between fraud and collected fines, +27, 174 euros). Results sensitive to variations in evasion proportion φ r + φ 0. Operator needs higher investments for higher proportions. Essential that inspectors really carry out their task. 20/25
21 Conclusions RA+ARA methodology. Sequential Defend-Attack model as basic template. Expand basic template with additional uncertainty nodes. Case study in metro security fare evasion. 21/25
22 Current methodological developments ARA (Ríos Insua et al., 2009) approach for multithreat problem over multiple sites. (Ríos Insua et al., 2014b) Multiple uncoordinated attacks. Outcome of attacks might affect each other. Extension to multiple sites. Sequential Defend-Attack for each site/threat. Models related by resource constraints and value aggregation. No particular spatial structure. Case study: metro network protection against Fare evasion. (Ríos Insua et al., 2014a) Pickpocketing by a team. 22/25
23 Future developments Multiple defenders and eventual coordination. Coordination and rationality type of attacks. More complex interactions between defenders and attackers. Mobility of resources. 23/25
24 Acknowledgments This project has received funding from the European Union s Seventh Framework Programme for Research, Technological Development and Demonstration under grant agreement no Work has been also supported by the Spanish Ministry of Economy and Innovation program MTM C03-01, the Government of Madrid RIESGOS-CM program S2009/ESP-1685 and the AXA-ICMAT Chair on Adversarial Risk Analysis. Grateful to TMB experts and stakeholders for fruitful discussion about modeling issues. 24/25
25 Bibliography Ríos Insua, D., J. Cano, M. Pellot, R. Ortega Current Trends in Bayesian Methodology with Applications, chap. From Risk Analysis to Adversarial Risk Analysis. CRC Press, To appear. Ríos Insua, D., J. Cano, M. Pellot, R. Ortega Multithreat Multisite Protection: A Case Study in Metro Security. Submitted for publication. Ríos Insua, D., J. Ríos, D. Banks Adversarial risk analysis. Journal of the American Statistical Association 104(486) /25
Adversarial Risk Analysis Models for
Adversarial Risk Analysis Models for Urban Security Resource Allocation David Ríos Insua, Royal Academy Cesar Gil, U. Rey Juan Carlos Jesús Ríos, IBM Research YH COST Smart Cities Wshop Paris, September
Adversarial Risk Analysis
Adversarial Risk Analysis Concepts, Applications and Challenges David Ríos Insua Royal Academy of Sciences IE Univ, June 12 Outline From risk analysis to adversarial risk analysis Motivation Sequential
Modelling cyber-threats in the Airport domain: a case study from the SECONOMICS project. Alessandra Tedeschi, Deep Blue S.r.
Modelling cyber-threats in the Airport domain: a case study from the SECONOMICS project Alessandra Tedeschi, Deep Blue S.r.L, Rome, Italy Project overview SECONOMICS is a 36 months project funded in the
Exam Introduction Mathematical Finance and Insurance
Exam Introduction Mathematical Finance and Insurance Date: January 8, 2013. Duration: 3 hours. This is a closed-book exam. The exam does not use scrap cards. Simple calculators are allowed. The questions
Tutorials: Abstracts and Speakers Bio
Tutorials: Abstracts and Speakers Bio 1. Name of Speaker: Rene van Dorp Affiliation: George Washington University, Washington, DC Email or other contact info:[email protected] Brief bio: J. Rene van Dorp
Computing the Electricity Market Equilibrium: Uses of market equilibrium models
Computing the Electricity Market Equilibrium: Uses of market equilibrium models Ross Baldick Department of Electrical and Computer Engineering The University of Texas at Austin April 2007 Abstract We discuss
Individual security and network design
Individual security and network design Diego Cerdeiro Marcin Dziubiński Sanjeev Goyal FIT 2015 Motivation Networks often face external threats in form of strategic or random attacks The attacks can be
Stackelberg Security Games for Security. Fernando Ordóñez Universidad de Chile
Stackelberg Security Games for Security Fernando Ordóñez Universidad de Chile Stackelberg Games for Security Fernando Ordóñez Universidad de Chile Stackelberg Games for Security Fernando Ordóñez Milind
PROJECT RISK MANAGEMENT
PROJECT RISK MANAGEMENT DEFINITION OF A RISK OR RISK EVENT: A discrete occurrence that may affect the project for good or bad. DEFINITION OF A PROBLEM OR UNCERTAINTY: An uncommon state of nature, characterized
QUANTITATIVE RISK ASSESSMENT FOR ACCIDENTS AT WORK IN THE CHEMICAL INDUSTRY AND THE SEVESO II DIRECTIVE
QUANTITATIVE RISK ASSESSMENT FOR ACCIDENTS AT WORK IN THE CHEMICAL INDUSTRY AND THE SEVESO II DIRECTIVE I. A. PAPAZOGLOU System Reliability and Industrial Safety Laboratory National Center for Scientific
Discussion of Çakmakli and Altug: Contructing Coincident Economic Indicators for Emerging Economies
: Contructing Coincident Economic Indicators for Emerging Economies Peter European Commission, Joint Research Centre (JRC); CEU and IE-CERS, HAS October 16-17, 2014, Istanbul Disclaimer The views expressed
Stochastic programming approach to ALM in Finnish pension insurance companies p.1/36
Stochastic programming approach to ALM in Finnish pension insurance companies Aktuaaritoiminnan kehittämissäätiön syysseminaari 17.11.2004 Teemu Pennanen Helsinki School of Economics Stochastic programming
A Game Theoretical Framework for Adversarial Learning
A Game Theoretical Framework for Adversarial Learning Murat Kantarcioglu University of Texas at Dallas Richardson, TX 75083, USA muratk@utdallas Chris Clifton Purdue University West Lafayette, IN 47907,
The Cost of Phishing. Understanding the True Cost Dynamics Behind Phishing Attacks A CYVEILLANCE WHITE PAPER MAY 2015
The Cost of Phishing Understanding the True Cost Dynamics Behind Phishing Attacks A CYVEILLANCE WHITE PAPER MAY 2015 Executive Summary.... 3 The Costs... 4 How To Estimate the Cost of an Attack.... 5 Table
ERM Learning Objectives
ERM Learning Objectives INTRODUCTION These Learning Objectives are expressed in terms of the knowledge required of an expert * in enterprise risk management (ERM). The Learning Objectives are organized
An Open and Safe Europe What s next?
An Open and Safe Europe What s next? Private Security Services Industry views to the European Commission public consultation on the Future of DG HOME Policies The Confederation of European Security Services
Targetting Audits Using Predictive Analytics
Targetting Audits Using Predictive Analytics Gareth Myles with Nigar Hashimzade, Frank Page, and Matt Rablen Exeter and IFS July 2013 G Myles (Exeter and IFS) Targetting Audits July 2013 1 / 44 Introduction
Machine Learning and Data Analysis overview. Department of Cybernetics, Czech Technical University in Prague. http://ida.felk.cvut.
Machine Learning and Data Analysis overview Jiří Kléma Department of Cybernetics, Czech Technical University in Prague http://ida.felk.cvut.cz psyllabus Lecture Lecturer Content 1. J. Kléma Introduction,
SYSM 6304: Risk and Decision Analysis Lecture 5: Methods of Risk Analysis
SYSM 6304: Risk and Decision Analysis Lecture 5: Methods of Risk Analysis M. Vidyasagar Cecil & Ida Green Chair The University of Texas at Dallas Email: [email protected] October 17, 2015 Outline
Version Date Comments / Changes 1.0 February 2008 Initial Policy Released 2.0 September 2013 Policy Revised
Page 1 of 5 APPROVED (S) REVISED / REVIEWED SUMMARY Version Date Comments / Changes 1.0 Initial Policy Released 2.0 Policy Revised POLICY As part of an overall strategy to continuously improve workplace
RULES FOR THE REIMBURSEMENT OF TRAVEL AND SUBSISTENCE EXPENSES FOR EXCHANGE OF OFFICIALS
EUROPEAN COMMISSION CONSUMERS, HEALTH AND FOOD EXECUTIVE AGENCY Consumers and Food Safety Unit RULES FOR THE REIMBURSEMENT OF TRAVEL AND SUBSISTENCE EXPENSES FOR EXCHANGE OF OFFICIALS CONSUMER PROGRAMME
Sandro Brusco. Education
Sandro Brusco Contact information: e-mail: [email protected] Address: Department of Economics Stony Brook University Stony Brook, NY 11794 Education Sep. 1988 - Jan. 1993 Doctoral program in
Urban Transport Security presented by Patrick Dillenseger RATP
Modular Urban Transport Safety and Security Analysis Final Conference 25 26 June 2012, Cologne Urban Transport Security presented by Patrick Dillenseger RATP 1 Table of Contents Urban Transport Security
Asset Liability Management for Life Insurance: a Dynamic Approach
Risk Consulting CAPITAL MANAGEMENT ADVISORS srl Asset Liability Management for Life Insurance: a Dynamic Approach Dr Gabriele Susinno & Thierry Bochud Quantitative Strategies Capital Management Advisors
How To Write An Article On The European Cyberspace Policy And Security Strategy
EU Cybersecurity Policy & Legislation ENISA s Contribution Steve Purser Head of Core Operations Oslo 26 May 2015 European Union Agency for Network and Information Security Agenda 01 Introduction to ENISA
The Elasticity of Taxable Income: A Non-Technical Summary
The Elasticity of Taxable Income: A Non-Technical Summary John Creedy The University of Melbourne Abstract This paper provides a non-technical summary of the concept of the elasticity of taxable income,
THE CRITICAL ROLE OF EDUCATION IN EVERY CYBER DEFENSE STRATEGY
THE CRITICAL ROLE OF EDUCATION IN EVERY CYBER DEFENSE STRATEGY Juan Cayón Peña, PhD. & Luis Armando García Abstract: The implementation, maintenance, and improvement of a national Cyber defense strategy
2 Gabi Siboni, 1 Senior Research Fellow and Director,
Cyber Security Build-up of India s National Force 2 Gabi Siboni, 1 Senior Research Fellow and Director, Military and Strategic Affairs and Cyber Security Programs, Institute for National Security Studies,
PROJECT RISK MANAGEMENT
11 PROJECT RISK MANAGEMENT Project Risk Management includes the processes concerned with identifying, analyzing, and responding to project risk. It includes maximizing the results of positive events and
Designing public private crop insurance in Finland
Designing public private crop insurance in Finland Liesivaara 1, P., Meuwissen 2, M.P.M. and Myyrä 1, S 1 MTT Agrifood Research Finland 2 Business Economics, Wageningen University, the Netherlands Abstract
ISO 31000:2009 - ISO/IEC 31010 & ISO Guide 73:2009 - New Standards for the Management of Risk
Kevin W Knight AM CPRM; Hon FRMIA; FIRM (UK); LMRMIA: ANZIIF (Mem) ISO 31000:2009 - ISO/IEC 31010 & ISO Guide 73:2009 - New Standards for the Management of Risk History of the ISO and Risk Management Over
Security risk analysis approach for on-board vehicle networks
1 Security risk analysis approach for on-board vehicle networks Alastair Ruddle Consultant, MIRA Limited Motivation 2 o o Future vehicles will become mobile nodes in a dynamic transport network vehicle
On the Efficiency of Competitive Stock Markets Where Traders Have Diverse Information
Finance 400 A. Penati - G. Pennacchi Notes on On the Efficiency of Competitive Stock Markets Where Traders Have Diverse Information by Sanford Grossman This model shows how the heterogeneous information
ECO 317 Economics of Uncertainty Fall Term 2009 Week 5 Precepts October 21 Insurance, Portfolio Choice - Questions
ECO 37 Economics of Uncertainty Fall Term 2009 Week 5 Precepts October 2 Insurance, Portfolio Choice - Questions Important Note: To get the best value out of this precept, come with your calculator or
Advanced Threat Protection with Dell SecureWorks Security Services
Advanced Threat Protection with Dell SecureWorks Security Services Table of Contents Summary... 2 What are Advanced Threats?... 3 How do advanced threat actors operate?... 3 Addressing the Threat... 5
Game Theory for Security: A Real-World Challenge Problem for Multiagent Systems and Beyond
AAAI Technical Report SS-12-03 Game Theory for Security, Sustainability and Health Game Theory for Security: A Real-World Challenge Problem for Multiagent Systems and Beyond Milind Tambe, Bo An Computer
Monte Carlo Simulation
Monte Carlo Simulation Palisade User Conference 2007 Real Options Analysis Dr. Colin Beardsley, Managing Director Risk-Return Solutions Pty Limited www.riskreturnsolutions.com The Plot Today We will review
Project Cost Risk Analysis: The Risk Driver Approach Prioritizing Project Risks and Evaluating Risk Responses
Project Cost Risk Analysis: The Risk Driver Approach Prioritizing Project Risks and Evaluating Risk Responses David T. Hulett, Ph.D. Keith Hornbacher, MBA Waylon T. Whitehead Hulett & Associates, LLC Los
Table 1: Field Experiment Dependent Variable Probability of Donation (0 to 100)
Appendix Table 1: Field Experiment Dependent Variable Probability of Donation (0 to 100) In Text Logit Warm1 Warm2 Warm3 Warm5 Warm4 1 2 3 4 5 6 Match (M) 0.731 0.446 0.965 1.117 0.822 0.591 (0.829) (0.486)
Insurance as Operational Risk Management Tool
DOI: 10.7763/IPEDR. 2012. V54. 7 Insurance as Operational Risk Management Tool Milan Rippel 1, Lucie Suchankova 2 1 Charles University in Prague, Czech Republic 2 Charles University in Prague, Czech Republic
ENISA s Study on the Evolving Threat Landscape. European Network and Information Security Agency
ENISA s Study on the Evolving Threat Landscape European Network and Information Security Agency Agenda Introduction to ENISA Preliminary remarks The ENISA report Major findings Conclusions 2 ENISA The
National Infrastructure Protection Center
National Infrastructure Protection Center Risk Management: An Essential Guide to Protecting Critical Assets November 2002 Summary As organizations increase security measures and attempt to identify vulnerabilities
The promise and pitfalls of cyber insurance January 2016
www.pwc.com/us/insurance The promise and pitfalls of cyber insurance January 2016 2 top issues The promise and pitfalls of cyber insurance Cyber insurance is a potentially huge but still largely untapped
idata Improving Defences Against Targeted Attack
idata Improving Defences Against Targeted Attack Summary JULY 2014 Disclaimer: Reference to any specific commercial product, process or service by trade name, trademark, manufacturer, or otherwise, does
Safety Risk Impact Analysis of an ATC Runway Incursion Alert System. Sybert Stroeve, Henk Blom, Bert Bakker
Safety Risk Impact Analysis of an ATC Runway Incursion Alert System Sybert Stroeve, Henk Blom, Bert Bakker EUROCONTROL Safety R&D Seminar, Barcelona, Spain, 25-27 October 2006 Contents Motivation Example
COMPARATIVE RESEARCH ON PROJECT MANAGEMENT APPROACH IN THE EUROPEAN EDUCATIONAL INSTITUTIONS
COMPARATIVE RESEARCH ON PROJECT MANAGEMENT APPROACH IN THE EUROPEAN EDUCATIONAL Armenia ANDRONICEANU The Bucharest University of Economic Studies, Bucharest, Romania [email protected] Bianca
Pricing Barrier Option Using Finite Difference Method and MonteCarlo Simulation
Pricing Barrier Option Using Finite Difference Method and MonteCarlo Simulation Yoon W. Kwon CIMS 1, Math. Finance Suzanne A. Lewis CIMS, Math. Finance May 9, 000 1 Courant Institue of Mathematical Science,
On the European experience in critical infrastructure protection
DCAF a centre for security, development and the rule of law On the European experience in critical infrastructure protection Valeri R. RATCHEV [email protected] @ratchevv DCAF/CSDM 1 This presentation
Chapter 13: Binary and Mixed-Integer Programming
Chapter 3: Binary and Mixed-Integer Programming The general branch and bound approach described in the previous chapter can be customized for special situations. This chapter addresses two special situations:
www.cgi-group.co.uk Experience the Commitment IHP360 Insurer Hosted Pricing IHP 360 1
Experience the Commitment IHP360 Insurer Hosted Pricing IHP 360 1 The MIB is committed to managing data for the insurance industry to support accurate pricing, a better customer experience and combatting
A MODEL TO SOLVE EN ROUTE AIR TRAFFIC FLOW MANAGEMENT PROBLEM:
A MODEL TO SOLVE EN ROUTE AIR TRAFFIC FLOW MANAGEMENT PROBLEM: A TEMPORAL AND SPATIAL CASE V. Tosic, O. Babic, M. Cangalovic and Dj. Hohlacov Faculty of Transport and Traffic Engineering, University of
Moral Hazard. Itay Goldstein. Wharton School, University of Pennsylvania
Moral Hazard Itay Goldstein Wharton School, University of Pennsylvania 1 Principal-Agent Problem Basic problem in corporate finance: separation of ownership and control: o The owners of the firm are typically
Chapter 14 Managing Operational Risks with Bayesian Networks
Chapter 14 Managing Operational Risks with Bayesian Networks Carol Alexander This chapter introduces Bayesian belief and decision networks as quantitative management tools for operational risks. Bayesian
How To Defend Yourself Against Cyber Attacks
Overview of Cyber Security: Our daily life, economic vitality, and national security depend on a stable, safe, and resilient cyberspace. We rely on this vast array of networks to communicate and travel,
Schedule Risk Analysis Simulator using Beta Distribution
Schedule Risk Analysis Simulator using Beta Distribution Isha Sharma Department of Computer Science and Applications, Kurukshetra University, Kurukshetra, Haryana (INDIA) [email protected] Dr. P.K.
On Compulsory Per-Claim Deductibles in Automobile Insurance
The Geneva Papers on Risk and Insurance Theory, 28: 25 32, 2003 c 2003 The Geneva Association On Compulsory Per-Claim Deductibles in Automobile Insurance CHU-SHIU LI Department of Economics, Feng Chia
Lecture Note 1 Set and Probability Theory. MIT 14.30 Spring 2006 Herman Bennett
Lecture Note 1 Set and Probability Theory MIT 14.30 Spring 2006 Herman Bennett 1 Set Theory 1.1 Definitions and Theorems 1. Experiment: any action or process whose outcome is subject to uncertainty. 2.
Master in International Business
Master in International Business Offered jointly with Introduction Welcome to Barcelona Welcome to UPF Barcelona, located in the Northeastern coast of Spain, is one of Europe s most cosmopolitan cities
The F Word - Why Facilities Matter
The F Word - Why Facilities Matter By Martin Pickard Leaders of businesses and organisations don't want to talk about Facilities. It's a dirty word associated with cleaning, maintenance and other non-core
Retirement Financial Planning: A State/Preference Approach. William F. Sharpe 1 February, 2006
Retirement Financial Planning: A State/Preference Approach William F. Sharpe 1 February, 2006 Introduction This paper provides a framework for analyzing a prototypical set of decisions concerning spending,
Multi-Jurisdictional Study: Cloud Computing Legal Requirements. Julien Debussche Associate January 2015
Multi-Jurisdictional Study: Cloud Computing Legal Requirements Julien Debussche Associate January 2015 Content 1. General Legal Framework 2. Data Protection Legal Framework 3. Security Requirements 4.
Internet Governance and Cybersecurity Patrick Curry MACCSA [email protected]
Internet Governance and Cybersecurity Patrick Curry MACCSA [email protected] This project has received funding from the European Union s Seventh Framework Programme for research, technological development
Revenue management based hospital appointment scheduling
ISSN 1 746-7233, England, UK World Journal of Modelling and Simulation Vol. 11 (2015 No. 3, pp. 199-207 Revenue management based hospital appointment scheduling Xiaoyang Zhou, Canhui Zhao International
Asset Management Contracts and Equilibrium Prices
Asset Management Contracts and Equilibrium Prices ANDREA M. BUFFA DIMITRI VAYANOS PAUL WOOLLEY Boston University London School of Economics London School of Economics September, 2013 Abstract We study
Total deliverability gas storage analysis methodology and case study
Risk, Reliability and Societal Safety Aven & Vinnem (eds) 2007 Taylor & Francis Group, London, ISBN 978-0-415-44786-7 Total deliverability gas storage analysis methodology and case study B. Haukelidsæter
Knowledge. Practical guide to competition damages claims in the UK
Knowledge Practical guide to competition damages claims in the UK Practical guide to competition damages claims in the UK Contents Reforms to damages litigation in the UK for infringements of competition
How To Find Out What Search Strategy Is Used In The U.S. Auto Insurance Industry
Simultaneous or Sequential? Search Strategies in the U.S. Auto Insurance Industry Current version: April 2014 Elisabeth Honka Pradeep Chintagunta Abstract We show that the search method consumers use when
READING 14: LIFETIME FINANCIAL ADVICE: HUMAN CAPITAL, ASSET ALLOCATION, AND INSURANCE
READING 14: LIFETIME FINANCIAL ADVICE: HUMAN CAPITAL, ASSET ALLOCATION, AND INSURANCE Introduction (optional) The education and skills that we build over this first stage of our lives not only determine
INT 3 Schedule Risk Analysis
INT 3 Schedule Risk Analysis David T. Hulett, Ph.D. Hulett & Associates, LLC ICEAA Professional Development and Training Workshop San Diego, CA June 9-12, 2015 1 Agenda Add uncertainty to the schedule,
A HYBRID GENETIC ALGORITHM FOR THE MAXIMUM LIKELIHOOD ESTIMATION OF MODELS WITH MULTIPLE EQUILIBRIA: A FIRST REPORT
New Mathematics and Natural Computation Vol. 1, No. 2 (2005) 295 303 c World Scientific Publishing Company A HYBRID GENETIC ALGORITHM FOR THE MAXIMUM LIKELIHOOD ESTIMATION OF MODELS WITH MULTIPLE EQUILIBRIA:
Update On Smart Grid Cyber Security
Update On Smart Grid Cyber Security Kshamit Dixit Manager IT Security, Toronto Hydro, Ontario, Canada 1 Agenda Cyber Security Overview Security Framework Securing Smart Grid 2 Smart Grid Attack Threats
Improving proposal evaluation process with the help of vendor performance feedback and stochastic optimal control
Improving proposal evaluation process with the help of vendor performance feedback and stochastic optimal control Sam Adhikari ABSTRACT Proposal evaluation process involves determining the best value in
Cyber Security Research and Development: A Homeland Security Perspective
Cyber Security Research and Development: A Homeland Security Perspective Simon Szykman, Ph.D. Director, Cyber Security R&D 202-772-9867 Outline! DHS Organizational Overview Cyber Security Stakeholders
PASTA Abstract. Process for Attack S imulation & Threat Assessment Abstract. VerSprite, LLC Copyright 2013
2013 PASTA Abstract Process for Attack S imulation & Threat Assessment Abstract VerSprite, LLC Copyright 2013 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Improving pre-operational production efficiency estimates
Improving pre-operational production efficiency estimates ESRA seminar 28 th January 2015 Classification: Internal Production efficiency (PE) 100% Estimated production loss PE Production efficiency (PE)
Fighting Advanced Threats
Fighting Advanced Threats With FortiOS 5 Introduction In recent years, cybercriminals have repeatedly demonstrated the ability to circumvent network security and cause significant damages to enterprises.
OPTIMAL CHOICE UNDER SHORT SELL LIMIT WITH SHARPE RATIO AS CRITERION AMONG MULTIPLE ASSETS
OPTIMAL CHOICE UNDER SHORT SELL LIMIT WITH SHARPE RATIO AS CRITERION AMONG MULTIPLE ASSETS Ruoun HUANG *, Yiran SHENG ** Abstract: This article is the term paper of the course Investments. We mainly focus
Operations and Supply Chain Management Prof. G. Srinivasan Department of Management Studies Indian Institute of Technology, Madras
Operations and Supply Chain Management Prof. G. Srinivasan Department of Management Studies Indian Institute of Technology, Madras Lecture - 36 Location Problems In this lecture, we continue the discussion
WHITE PAPER. The Cost of Phishing: Understanding the True Cost Dynamics Behind Phishing Attacks
WHITE PAPER The Cost of Phishing: Understanding the True Cost Dynamics Behind Phishing Attacks A Cyveillance Report October 2008 EXECUTIVE SUMMARY How much do phishing attacks really cost organizations?
Abstract. 1 Introduction
Amir Tomer Amir Tomer is the Director of Systems and Software Engineering Processes at RAFAEL Ltd., Israel,with whom he has been since 1982,holding a variety of systems and software engineering positions,both
Statistical Analysis of Life Insurance Policy Termination and Survivorship
Statistical Analysis of Life Insurance Policy Termination and Survivorship Emiliano A. Valdez, PhD, FSA Michigan State University joint work with J. Vadiveloo and U. Dias Session ES82 (Statistics in Actuarial
Simulation and Risk Analysis
Simulation and Risk Analysis Using Analytic Solver Platform REVIEW BASED ON MANAGEMENT SCIENCE What We ll Cover Today Introduction Frontline Systems Session Ι Beta Training Program Goals Overview of Analytic
Discrete Optimization
Discrete Optimization [Chen, Batson, Dang: Applied integer Programming] Chapter 3 and 4.1-4.3 by Johan Högdahl and Victoria Svedberg Seminar 2, 2015-03-31 Todays presentation Chapter 3 Transforms using
An effective approach to preventing application fraud. Experian Fraud Analytics
An effective approach to preventing application fraud Experian Fraud Analytics The growing threat of application fraud Fraud attacks are increasing across the world Application fraud is a rapidly growing
3. Are employees set as Administrator level on their workstations? a. Yes, if it is necessary for their work. b. Yes. c. No.
As your trusted financial partner, Maps Credit Union is committed to helping you assess and manage risks associated with your business online banking. We recommend that you do a periodic risk assessment
