19 research outputs found

    A framework for group decision-making: Including cognitive and affective aspects in a MCDA method for alternatives rejection

    Get PDF
    © Springer International Publishing AG, part of Springer Nature 2019. With the evolution of the organizations and technology, Group Decision Support Systems have changed to support decision-makers that cannot be together at the same place and time to make a decision. However, these systems must now be able to support the interaction between decision-makers and provide all the relevant information at the most adequate times. Failing to do so may compromise the success and the acceptance of the system. In this work it is proposed a framework for group decision using a Multiple Criteria Decision Analysis method capable of identify inconsistent assessments done by the decision-maker and identify alternatives that should be rejected by the group of decision-makers. The proposed framework allows to present more relevant information throughout the decision-making process and this way guide decision-makers in the achievement of more consensual and satisfactory decisions.INCT-EN - Instituto Nacional de Ciência e Tecnologia para Excitotoxicidade e Neuroproteção(ANI|P2020 21958

    Proposing to use artificial neural Networks for NoSQL attack detection

    Get PDF
    [EN] Relationships databases have enjoyed a certain boom in software worlds until now. These days, with the rise of modern applications, unstructured data production, traditional databases do not completely meet the needs of all systems. Regarding these issues, NOSQL databases have been developed and are a good alternative. But security aspects stay behind. Injection attacks are the most serious class of web attacks that are not taken seriously in NoSQL. This paper presents a Neural Network model approach for NoSQL injection. This method attempts to use the best and most effective features to identify an injection. The features used are divided into two categories, the first one based on the content of the request, and the second one independent of the request meta parameters. In order to detect attack payloads features, we work on character level analysis to obtain malicious rate of user inputs. The results demonstrate that our model has detected more attack payloads compare with models that work black list approach in keyword level
    corecore