by Anita Mezzetti, Loïc Maréchal, Dimitri Percia David, William Blonay, Sébastien Gillard, Michael Tsesmelis, Thomas Maillart, Alain Mermoud | Sep 20, 2023 | Publications, Scientific Articles
Abstract We introduce a novel recursive algorithm that analyzes and ranks the relative influence that companies and technologies have in a technology landscape. The algorithm also incorporates exogenous variables that reflect investor preferences. The results provide...
by Dimitri Percia David, William Blonay, Sébastien Gillard, Thomas Maillart, Alain Mermoud, Loïc Maréchal, Michael Tsesmelis | Sep 20, 2023 | Publications, Scientific Articles
Abstract We propose a reproducible, automated, scalable, and free method for automated bibliometric analysis that requires little computing power. We explain how firms can use this method with open source data from public repositories to generate unbiased insights...
by Gerrit Holtrup, William Blonay, Martin Strohmeier, Alain Mermoud, Jean-Pascal Chavanne, Vincent Lenders | Jul 19, 2023 | Publications, Scientific Articles
Abstract Fifth-generation cellular networks (5G) are currently being deployed by mobile operators around the globe. 5G is an enabler for many use cases and improves security and privacy over 4G and previous network generations. However, as recent security research has...
by Dimitri Percia David, Loïc Maréchal, William Blonay, Sébastien Gillard, Michael Tsesmelis, Thomas Maillart, Alain Mermoud | Mar 1, 2023 | Publications, Scientific Articles
Abstract We study security-development patterns in computer-science technologies through (i) the security attention among technologies, (ii) the relation between technological change and security development, and (iii) the effect of opinion on security development. We...
by Dimitri Percia David, William Blonay, Sébastien Gillard, Alain Mermoud, Loïc Maréchal, Michael Tsesmelis, Thomas Maillart | Apr 4, 2022 | Podcasts, Scientific Articles
Abstract The quantitative study of security dynamics in computer-science technologies is essential for understanding security-development patterns of information systems. Here, we specify and investigate security dynamics as (i) the relation between technological and...