Synthetic minority oversampling technique for optimizing classification tasks in botnet and intrusion-detection-system datasets
D Gonzalez-Cuautle, A Hernandez-Suarez… - Applied Sciences, 2020 - mdpi.com
Presently, security is a hot research topic due to the impact in daily information infrastructure.
Machine-learning solutions have been improving classical detection practices, but detection …
Machine-learning solutions have been improving classical detection practices, but detection …
Business process complexity measurement: A systematic literature review
C Zhou, D Zhang, D Chen, C Liu - IEEE Access, 2023 - ieeexplore.ieee.org
Business process complexity is an important factor that affects process quality and has a
significant impact on the maintenance, optimization, and execution efficiency of processes …
significant impact on the maintenance, optimization, and execution efficiency of processes …
Method to address complexity in organizations based on a comprehensive overview
Digitalization increasingly enforces organizations to accommodate changes and gain
resilience. Emerging technologies, changing organizational structures and dynamic work …
resilience. Emerging technologies, changing organizational structures and dynamic work …
Cloud spot instance price prediction using kNN regression
Cloud computing can provide users with basic hardware resources, and there are three
instance types: reserved instances, on-demand instances and spot instances. The price of …
instance types: reserved instances, on-demand instances and spot instances. The price of …
[HTML][HTML] Discovering configuration workflows from existing logs using process mining
Variability models are used to build configurators, for guiding users through the
configuration process to reach the desired setting that fulfils user requirements. The same …
configuration process to reach the desired setting that fulfils user requirements. The same …
Analyzing the impact of various parameters on job scheduling in the Google cluster dataset
D Shahmirzadi, N Khaledian, AM Rahmani - Cluster Computing, 2024 - Springer
Cloud architecture and its operations interest both general consumers and researchers.
Google, as a technology giant, offers cloud services globally. This paper analyzes the …
Google, as a technology giant, offers cloud services globally. This paper analyzes the …
Pricing model for dynamic resource overbooking in edge computing
Edge Computing (EC) with cloud-like Quality of Service (QoS) can find its wide applications
in various resource-constrained smart cities where the resource requirements can be …
in various resource-constrained smart cities where the resource requirements can be …
Improving the performance of process discovery algorithms by instance selection
MF Sani - Computer Science and Information Systems, 2020 - doiserbia.nb.rs
Process discovery algorithms automatically discover process models based on event data
that is captured during the execution of business processes. These algorithms tend to use all …
that is captured during the execution of business processes. These algorithms tend to use all …
CyberSPL: a framework for the verification of cybersecurity policy compliance of system configurations using software product lines
Cybersecurity attacks affect the compliance of cybersecurity policies of the organisations.
Such disadvantages may be due to the absence of security configurations or the use of …
Such disadvantages may be due to the absence of security configurations or the use of …
Extending process discovery with model complexity optimization and cyclic states identification: Application to healthcare processes
LO Elkhovskaya, AD Kshenin, MA Balakhontceva… - Algorithms, 2023 - mdpi.com
Within process mining, discovery techniques make it possible to construct business process
models automatically from event logs. However, results often do not achieve a balance …
models automatically from event logs. However, results often do not achieve a balance …