The survey and meta-analysis of the attacks, transgressions, countermeasures and security aspects common to the Cloud, Edge and IoT

M Pawlicki, A Pawlicka, R Kozik, M Choraś - Neurocomputing, 2023 - Elsevier
Cloud computing, edge computing, and Internet-of-Things-these new Internet concepts have
already irreversibly changed and influenced people's lives. The security of the three patterns …

SoK: applications and challenges of using recommender systems in cybersecurity incident handling and response

M Husák, M Čermák - Proceedings of the 17th International Conference …, 2022 - dl.acm.org
Incident handling, a fundamental activity of a cybersecurity incident response team, is a
complex discipline that consumes a significant amount of personnel's time and costs. There …

CoBERT: A Contextual BERT model for recommending employability profiles of information technology students in unstable developing countries

HN Mpia, LW Mburu, SN Mwendia - Engineering Applications of Artificial …, 2023 - Elsevier
Unemployment constitutes one of the major problems in developing countries, with factors
such as unavailable skills and the proliferation of unskilled workers being cited as main …

High-Performance Artificial Intelligence Recommendation of Quality Research Papers Using Effective Collaborative Approach

VK Venkatesan, MT Ramakrishna, A Batyuk, A Barna… - Systems, 2023 - mdpi.com
The Artificial Intelligence Recommender System has emerged as a significant research
interest. It aims at helping users find things online by offering recommendations that closely …

Deep learning and embedding based latent factor model for collaborative recommender systems

A Tegene, Q Liu, Y Gan, T Dai, H Leka, M Ayenew - Applied Sciences, 2023 - mdpi.com
A collaborative recommender system based on a latent factor model has achieved
significant success in the field of personalized recommender systems. However, the latent …

[HTML][HTML] Automation Bias and Complacency in Security Operation Centers

J Tilbury, S Flowerday - Computers, 2024 - mdpi.com
The volume and complexity of alerts that security operation center (SOC) analysts must
manage necessitate automation. Increased automation in SOCs amplifies the risk of …

Recommender systems in cybersecurity

L Ferreira, DC Silva, MU Itzazelaia - Knowledge and Information Systems, 2023 - Springer
With the growth of CyberTerrorism, enterprises worldwide have been struggling to stop
intruders from obtaining private data. Despite the efforts made by Cybersecurity experts, the …

Development of an influencer-brand congruence and complementarity measurement framework for recommender systems

P Weinlich, T Semerádová - Cogent Business & Management, 2024 - Taylor & Francis
Currently, there is a growing interest in identifying the prerequisites of a successful
influencer brand collaboration and for brands to determine the most appropriate matches …

An automated compliance framework for critical infrastructure security through Artificial Intelligence

SM Ali, A Razzaque, M Yousaf, RU Shan - IEEE Access, 2024 - ieeexplore.ieee.org
Current data on cybercrime shows a rising influence of online threats, leading to significant
financial impacts across vital industries like finance, healthcare, and energy. These impacts …

Accuracy-enhanced E-commerce recommendation based on deep learning and locality-sensitive hashing

D Li, JA Esquivel - Wireless Networks, 2024 - Springer
Recommender systems facilitate the discovery of relevant content in several online
communities by analyzing users' past interactions and preferences. With the expansion of …