Volume 11, Number 4, October 2020
IP Reputation Scoring with Geo-Contextual Feature Augmentation.

Henanksha Sainani Josephine M. Namayanja Guneeti Sharma Vasundhara Misal Vandana P. Janeja

Analysis of Cyber Incident Categories Based on Losses.

Jay P. Kesan Linfeng Zhang

An Ensemble of Ensembles Approach to Author Attribution for Internet Relay Chat Forensics.

Sicong Shao Cihan Tunc Amany Al-Shawi Salim Hariri

PANDA: Partitioned Data Security on Outsourced Sensitive and Non-sensitive Data.

Sharad Mehrotra Shantanu Sharma Jeffrey D. Ullman Dhrubajyoti Ghosh Peeyush Gupta Anurag Mishra

On the Variety and Veracity of Cyber Intrusion Alerts Synthesized by Generative Adversarial Networks.

Christopher Sweet Stephen Moskal Shanchieh Jay Yang

Internet-scale Insecurity of Consumer Internet of Things: An Empirical Measurements Perspective.

Antonio Mangino Morteza Safaei Pour Elias Bou-Harb

Time-based Gap Analysis of Cybersecurity Trends in Academic and Digital Media.

Mahdi R. Alagheband Atefeh Mashatan Morteza Zihayat

Predictive Cyber Situational Awareness and Personalized Blacklisting: A Sequential Rule Mining Approach.

Martin Husák Tomás Bajtos Jaroslav Kaspar Elias Bou-Harb Pavel Celeda

Edge-Based Intrusion Detection for IoT devices.

Anand Mudgerikar Puneet Sharma Elisa Bertino


Volume 11, Number 3, August 2020
Trajectory Outlier Detection: Algorithms, Taxonomies, Evaluation, and Open Challenges.

Asma Belhadi Youcef Djenouri Jerry Chun-Wei Lin Alberto Cano

Cashless Payment Policy and Its Effects on Economic Growth of India: An Exploratory Study.

Nenavath Sreenu

Utility-Driven Mining of Trend Information for Intelligent System.

Wensheng Gan Jerry Chun-Wei Lin Han-Chieh Chao Philippe Fournier-Viger Xuan Wang Philip S. Yu

A Weakly Supervised WordNet-Guided Deep Learning Approach to Extracting Aspect Terms from Online Reviews.

Jie Tao Lina Zhou

Predicting User Posting Activities in Online Health Communities with Deep Learning.

Xiangyu Wang Kang Zhao Xun Zhou W. Nick Street

E-Commerce Product Categorization via Machine Translation.

Liling Tan Maggie Yundi Li Stanley Kok

Real or Not?: Identifying Untrustworthy News Websites Using Third-party Partnerships.

Ram D. Gopal Hooman Hidaji Sule Nur Kutlu Raymond A. Patterson Erik Rolland Dmitry Zhdanov

Introduction to WITS 2018 Special Issue in TMIS.

Kaushik Dutta Xiao Fang Zhengrui (Jeffrey) Jiang


Volume 11, Number 2, July 2020
Context-Aware Recommendations Based on Deep Learning Frameworks.

Moshe Unger Alexander Tuzhilin Amit Livne

Algorithms and Applications to Weighted Rank-one Binary Matrix Factorization.

Haibing Lu Xi Chen Junmin Shi Jaideep Vaidya Vijayalakshmi Atluri Yuan Hong Wei Huang

Security and Privacy Requirements for Cloud Computing in Healthcare: Elicitation and Prioritization from a Patient Perspective.

Tatiana Ermakova Benjamin Fabian Marta Kornacka Scott Thiebes Ali Sunyaev

When Are Cyber Blackouts in Modern Service Networks Likely?: A Network Oblivious Theory on Cyber (Re)Insurance Feasibility.

Ranjan Pal Konstantinos Psounis Jon Crowcroft Frank P. Kelly Pan Hui Sasu Tarkoma Abhishek Kumar John Kelly Aritra Chatterjee Leana Golubchik Nishanth Sastry Bodhibrata Nag


Volume 11, Number 1, April 2020
A Data-driven Characterization of Modern Android Spyware.

Fabio Pierazzi Ghita Mezzour Qian Han Michele Colajanni V. S. Subrahmanian

Mining the Local Dependency Itemset in a Products Network.

Li Ni Wenjian Luo Nannan Lu Wenjie Zhu

A Randomized Reputation System in the Presence of Unfair Ratings.

Mohsen Rezvani Mojtaba Rezvani

Invested or Indebted: Ex-ante and Ex-post Reciprocity in Online Knowledge Sharing Communities.

Hongfei Li Ramesh Shankar Jan Stallaert