Synthetic minority oversampling technique for optimizing classification tasks in botnet and intrusion-detection-system datasets

D Gonzalez-Cuautle, A Hernandez-Suarez… - Applied Sciences, 2020 - mdpi.com
Presently, security is a hot research topic due to the impact in daily information infrastructure.
Machine-learning solutions have been improving classical detection practices, but detection …

Business process complexity measurement: A systematic literature review

C Zhou, D Zhang, D Chen, C Liu - IEEE Access, 2023 - ieeexplore.ieee.org
Business process complexity is an important factor that affects process quality and has a
significant impact on the maintenance, optimization, and execution efficiency of processes …

Method to address complexity in organizations based on a comprehensive overview

A Revina, Ü Aksu, VG Meister - Information, 2021 - mdpi.com
Digitalization increasingly enforces organizations to accommodate changes and gain
resilience. Emerging technologies, changing organizational structures and dynamic work …

Cloud spot instance price prediction using kNN regression

W Liu, P Wang, Y Meng, C Zhao, Z Zhang - Human-centric Computing and …, 2020 - Springer
Cloud computing can provide users with basic hardware resources, and there are three
instance types: reserved instances, on-demand instances and spot instances. The price of …

[HTML][HTML] Discovering configuration workflows from existing logs using process mining

B Ramos-Gutiérrez, ÁJ Varela-Vaca, JA Galindo… - Empirical Software …, 2021 - Springer
Variability models are used to build configurators, for guiding users through the
configuration process to reach the desired setting that fulfils user requirements. The same …

Analyzing the impact of various parameters on job scheduling in the Google cluster dataset

D Shahmirzadi, N Khaledian, AM Rahmani - Cluster Computing, 2024 - Springer
Cloud architecture and its operations interest both general consumers and researchers.
Google, as a technology giant, offers cloud services globally. This paper analyzes the …

Pricing model for dynamic resource overbooking in edge computing

Z Tang, F Zhang, X Zhou, W Jia… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Edge Computing (EC) with cloud-like Quality of Service (QoS) can find its wide applications
in various resource-constrained smart cities where the resource requirements can be …

Improving the performance of process discovery algorithms by instance selection

MF Sani - Computer Science and Information Systems, 2020 - doiserbia.nb.rs
Process discovery algorithms automatically discover process models based on event data
that is captured during the execution of business processes. These algorithms tend to use all …

CyberSPL: a framework for the verification of cybersecurity policy compliance of system configurations using software product lines

ÁJ Varela-Vaca, R M. Gasca, R Ceballos… - Applied Sciences, 2019 - mdpi.com
Cybersecurity attacks affect the compliance of cybersecurity policies of the organisations.
Such disadvantages may be due to the absence of security configurations or the use of …

Extending process discovery with model complexity optimization and cyclic states identification: Application to healthcare processes

LO Elkhovskaya, AD Kshenin, MA Balakhontceva… - Algorithms, 2023 - mdpi.com
Within process mining, discovery techniques make it possible to construct business process
models automatically from event logs. However, results often do not achieve a balance …