Journal: IEEE Intelligent Systems

Volume 31, Issue 5

3 -- 7Jose M. Such, Natalia Criado, Laurent Vercouter, Martin Rehák. Intelligent Cybersecurity Agents [Guest editors' introduction]
8 -- 15Ozgur Kafaly, Nirav Ajmeri, Munindar P. Singh. Revani: Revising and Verifying Normative Specifications for Privacy
16 -- 22Jan Jusko, Martin Rehák, Jan Stiborek, Jan Kohout, Tomás Pevný. Using Behavioral Similarity for Botnet Command-and-Control Discovery
24 -- 30Karel Durkota, Viliam Lisý, Christopher Kiekintveld, Branislav Bosanský, Michal Pechoucek. Case Studies of Network Defense with Attack Graph Games
32 -- 39Lei Gao, Lin Qi, Ling Guan. Online Behavioral Analysis with Application to Emotion State Identification
40 -- 48Junpeng Guo, Yanlin Zhu, Aiai Li, Qipeng Wang, Weiguo Han. A Social Influence Approach for Group User Modeling in Group Recommendation Systems
50 -- 56Sungil Kim, Heeyoung Kim, Younghwan Namkoong. Ordinal Classification of Imbalanced Data with Application in Emergency and Disaster Information Services
58 -- 64Stefano Cresci, Roberto Di Pietro, Marinella Petrocchi, Angelo Spognardi, Maurizio Tesconi. DNA-Inspired Online Behavioral Modeling and Its Application to Spambot Detection
66 -- 75Longbing Cao. Data Science: Nature and Pitfalls
76 -- 82Neil McBride, Robert R. Hoffman. Bridging the Ethical Gap: From Human Principles to Robot Instructions
83 -- 88Amelie Gyrard, Pankesh Patel, Amit P. Sheth, Martin Serrano. Building the Web of Knowledge with Smart IoT Applications
89 -- 92Evangelos Kalampokis, Efthimios Tambouris, Konstantinos A. Tarabanis. Linked Open Cube Analytics Systems: Potential and Challenges
93 -- 96Douglas H. Fisher, Zimei Bian, Selina Chen. Incorporating Sustainability into Computing Education