A survey on threat hunting in enterprise networks

B Nour, M Pourzandi, M Debbabi - … Communications Surveys & …, 2023 - ieeexplore.ieee.org
With the rapidly evolving technological landscape, the huge development of the Internet of
Things, and the embracing of digital transformation, the world is witnessing an explosion in …

Latest trends of security and privacy in recommender systems: a comprehensive review and future perspectives

Y Himeur, SS Sohail, F Bensaali, A Amira… - Computers & Security, 2022 - Elsevier
With the widespread use of Internet of things (IoT), mobile phones, connected devices and
artificial intelligence (AI), recommender systems (RSs) have become a booming technology …

Survey on image encryption techniques using chaotic maps in spatial, transform and spatiotemporal domains

U Zia, M McCartney, B Scotney, J Martinez… - International Journal of …, 2022 - Springer
Chaos-based cryptosystems have been an active area of research in recent years. Although
these algorithms are not standardized like AES, DES, RSA, etc., chaos-based cryptosystems …

Introduction to recommender systems handbook

F Ricci, L Rokach, B Shapira - Recommender systems handbook, 2010 - Springer
Abstract Recommender Systems (RSs) are software tools and techniques providing
suggestions for items to be of use to a user. In this introductory chapter we briefly discuss …

Shilling attacks against recommender systems: a comprehensive survey

I Gunes, C Kaleli, A Bilge, H Polat - Artificial Intelligence Review, 2014 - Springer
Online vendors employ collaborative filtering algorithms to provide recommendations to their
customers so that they can increase their sales and profits. Although recommendation …

Shilling attacks against collaborative recommender systems: a review

M Si, Q Li - Artificial Intelligence Review, 2020 - Springer
Collaborative filtering recommender systems (CFRSs) have already been proved effective to
cope with the information overload problem since they merged in the past two decades …

HySAD: A semi-supervised hybrid shilling attack detector for trustworthy product recommendation

Z Wu, J Wu, J Cao, D Tao - Proceedings of the 18th ACM SIGKDD …, 2012 - dl.acm.org
Shilling attackers apply biased rating profiles to recommender systems for manipulating
online product recommendations. Although many studies have been devoted to shilling …

A survey of attack detection approaches in collaborative filtering recommender systems

F Rezaimehr, C Dadkhah - Artificial Intelligence Review, 2021 - Springer
Nowadays, due to the increasing amount of data, the use of recommender systems has
increased. Therefore, the quality of the recommendations for the users of these systems is …

Robust collaborative recommendation

R Burke, MP O'Mahony, NJ Hurley - Recommender systems handbook, 2015 - Springer
Collaborative recommender systems are vulnerable to malicious users who seek to bias
their output, causing them to recommend (or not recommend) particular items. This problem …

Shilling attack detection utilizing semi-supervised learning method for collaborative recommender system

J Cao, Z Wu, B Mao, Y Zhang - World Wide Web, 2013 - Springer
Collaborative filtering (CF) technique is capable of generating personalized
recommendations. However, the recommender systems utilizing CF as their key algorithms …