TMIS - volume 11 - 2020 论文列表 |
点击这里查看 ACM Transactions on Management Information Systems 的JCR分区、影响因子等信息 |
Henanksha Sainani Josephine M. Namayanja Guneeti Sharma Vasundhara Misal Vandana P. Janeja
Analysis of Cyber Incident Categories Based on Losses. An Ensemble of Ensembles Approach to Author Attribution for Internet Relay Chat Forensics.Sicong Shao Cihan Tunc Amany Al-Shawi Salim Hariri
PANDA: Partitioned Data Security on Outsourced Sensitive and Non-sensitive Data.Sharad Mehrotra Shantanu Sharma Jeffrey D. Ullman Dhrubajyoti Ghosh Peeyush Gupta Anurag Mishra
On the Variety and Veracity of Cyber Intrusion Alerts Synthesized by Generative Adversarial Networks.Christopher Sweet Stephen Moskal Shanchieh Jay Yang
Internet-scale Insecurity of Consumer Internet of Things: An Empirical Measurements Perspective.Antonio Mangino Morteza Safaei Pour Elias Bou-Harb
Time-based Gap Analysis of Cybersecurity Trends in Academic and Digital Media.Mahdi R. Alagheband Atefeh Mashatan Morteza Zihayat
Predictive Cyber Situational Awareness and Personalized Blacklisting: A Sequential Rule Mining Approach.Martin Husák Tomás Bajtos Jaroslav Kaspar Elias Bou-Harb Pavel Celeda
Edge-Based Intrusion Detection for IoT devices.Asma Belhadi Youcef Djenouri Jerry Chun-Wei Lin Alberto Cano
Cashless Payment Policy and Its Effects on Economic Growth of India: An Exploratory Study. Utility-Driven Mining of Trend Information for Intelligent System.Wensheng Gan Jerry Chun-Wei Lin Han-Chieh Chao Philippe Fournier-Viger Xuan Wang Philip S. Yu
A Weakly Supervised WordNet-Guided Deep Learning Approach to Extracting Aspect Terms from Online Reviews. Predicting User Posting Activities in Online Health Communities with Deep Learning.Xiangyu Wang Kang Zhao Xun Zhou W. Nick Street
E-Commerce Product Categorization via Machine Translation.Liling Tan Maggie Yundi Li Stanley Kok
Real or Not?: Identifying Untrustworthy News Websites Using Third-party Partnerships.Ram D. Gopal Hooman Hidaji Sule Nur Kutlu Raymond A. Patterson Erik Rolland Dmitry Zhdanov
Introduction to WITS 2018 Special Issue in TMIS.Moshe Unger Alexander Tuzhilin Amit Livne
Algorithms and Applications to Weighted Rank-one Binary Matrix Factorization.Haibing Lu Xi Chen Junmin Shi Jaideep Vaidya Vijayalakshmi Atluri Yuan Hong Wei Huang
Security and Privacy Requirements for Cloud Computing in Healthcare: Elicitation and Prioritization from a Patient Perspective.Tatiana Ermakova Benjamin Fabian Marta Kornacka Scott Thiebes Ali Sunyaev
When Are Cyber Blackouts in Modern Service Networks Likely?: A Network Oblivious Theory on Cyber (Re)Insurance Feasibility.Ranjan Pal Konstantinos Psounis Jon Crowcroft Frank P. Kelly Pan Hui Sasu Tarkoma Abhishek Kumar John Kelly Aritra Chatterjee Leana Golubchik Nishanth Sastry Bodhibrata Nag
Fabio Pierazzi Ghita Mezzour Qian Han Michele Colajanni V. S. Subrahmanian
Mining the Local Dependency Itemset in a Products Network.Li Ni Wenjian Luo Nannan Lu Wenjie Zhu
A Randomized Reputation System in the Presence of Unfair Ratings. Invested or Indebted: Ex-ante and Ex-post Reciprocity in Online Knowledge Sharing Communities.