Picture for Carlos Sarraute

Carlos Sarraute

Core Security Technologies, ITBA

The Value of Big Data for Credit Scoring: Enhancing Financial Inclusion using Mobile Phone Data and Social Network Analytics

Add code
Feb 23, 2020
Figure 1 for The Value of Big Data for Credit Scoring: Enhancing Financial Inclusion using Mobile Phone Data and Social Network Analytics
Figure 2 for The Value of Big Data for Credit Scoring: Enhancing Financial Inclusion using Mobile Phone Data and Social Network Analytics
Figure 3 for The Value of Big Data for Credit Scoring: Enhancing Financial Inclusion using Mobile Phone Data and Social Network Analytics
Figure 4 for The Value of Big Data for Credit Scoring: Enhancing Financial Inclusion using Mobile Phone Data and Social Network Analytics
Viaarxiv icon

Brief survey of Mobility Analyses based on Mobile Phone Datasets

Add code
Dec 03, 2018
Figure 1 for Brief survey of Mobility Analyses based on Mobile Phone Datasets
Figure 2 for Brief survey of Mobility Analyses based on Mobile Phone Datasets
Figure 3 for Brief survey of Mobility Analyses based on Mobile Phone Datasets
Figure 4 for Brief survey of Mobility Analyses based on Mobile Phone Datasets
Viaarxiv icon

Comparison of Feature Extraction Methods and Predictors for Income Inference

Add code
Nov 13, 2018
Figure 1 for Comparison of Feature Extraction Methods and Predictors for Income Inference
Figure 2 for Comparison of Feature Extraction Methods and Predictors for Income Inference
Figure 3 for Comparison of Feature Extraction Methods and Predictors for Income Inference
Viaarxiv icon

A Bayesian Approach to Income Inference in a Communication Network

Add code
Nov 10, 2018
Figure 1 for A Bayesian Approach to Income Inference in a Communication Network
Figure 2 for A Bayesian Approach to Income Inference in a Communication Network
Figure 3 for A Bayesian Approach to Income Inference in a Communication Network
Figure 4 for A Bayesian Approach to Income Inference in a Communication Network
Viaarxiv icon

Uncovering the Spread of Chagas Disease in Argentina and Mexico

Add code
Aug 09, 2018
Figure 1 for Uncovering the Spread of Chagas Disease in Argentina and Mexico
Figure 2 for Uncovering the Spread of Chagas Disease in Argentina and Mexico
Viaarxiv icon

Inference of Users Demographic Attributes based on Homophily in Communication Networks

Add code
Aug 01, 2018
Figure 1 for Inference of Users Demographic Attributes based on Homophily in Communication Networks
Figure 2 for Inference of Users Demographic Attributes based on Homophily in Communication Networks
Figure 3 for Inference of Users Demographic Attributes based on Homophily in Communication Networks
Figure 4 for Inference of Users Demographic Attributes based on Homophily in Communication Networks
Viaarxiv icon

Prepaid or Postpaid? That is the question. Novel Methods of Subscription Type Prediction in Mobile Phone Services

Add code
Jun 30, 2017
Figure 1 for Prepaid or Postpaid? That is the question. Novel Methods of Subscription Type Prediction in Mobile Phone Services
Figure 2 for Prepaid or Postpaid? That is the question. Novel Methods of Subscription Type Prediction in Mobile Phone Services
Figure 3 for Prepaid or Postpaid? That is the question. Novel Methods of Subscription Type Prediction in Mobile Phone Services
Figure 4 for Prepaid or Postpaid? That is the question. Novel Methods of Subscription Type Prediction in Mobile Phone Services
Viaarxiv icon

POMDPs Make Better Hackers: Accounting for Uncertainty in Penetration Testing

Add code
Jul 31, 2013
Figure 1 for POMDPs Make Better Hackers: Accounting for Uncertainty in Penetration Testing
Figure 2 for POMDPs Make Better Hackers: Accounting for Uncertainty in Penetration Testing
Figure 3 for POMDPs Make Better Hackers: Accounting for Uncertainty in Penetration Testing
Figure 4 for POMDPs Make Better Hackers: Accounting for Uncertainty in Penetration Testing
Viaarxiv icon

Les POMDP font de meilleurs hackers: Tenir compte de l'incertitude dans les tests de penetration

Add code
Jul 30, 2013
Figure 1 for Les POMDP font de meilleurs hackers: Tenir compte de l'incertitude dans les tests de penetration
Figure 2 for Les POMDP font de meilleurs hackers: Tenir compte de l'incertitude dans les tests de penetration
Figure 3 for Les POMDP font de meilleurs hackers: Tenir compte de l'incertitude dans les tests de penetration
Figure 4 for Les POMDP font de meilleurs hackers: Tenir compte de l'incertitude dans les tests de penetration
Viaarxiv icon

Automated Attack Planning

Add code
Jul 30, 2013
Figure 1 for Automated Attack Planning
Figure 2 for Automated Attack Planning
Figure 3 for Automated Attack Planning
Figure 4 for Automated Attack Planning
Viaarxiv icon