Journal: ACM Trans. Management Inf. Syst.

Volume 11, Issue 4

0 -- 0Christopher Sweet, Stephen Moskal, Shanchieh Jay Yang. On the Variety and Veracity of Cyber Intrusion Alerts Synthesized by Generative Adversarial Networks
0 -- 0Sicong Shao, Cihan Tunc, Amany Al-Shawi, Salim Hariri. An Ensemble of Ensembles Approach to Author Attribution for Internet Relay Chat Forensics
0 -- 0Antonio Mangino, Morteza Safaei Pour, Elias Bou-Harb. Internet-scale Insecurity of Consumer Internet of Things: An Empirical Measurements Perspective
0 -- 0Sharad Mehrotra, Shantanu Sharma 0001, Jeffrey D. Ullman, Dhrubajyoti Ghosh, Peeyush Gupta, Anurag Mishra. PANDA: Partitioned Data Security on Outsourced Sensitive and Non-sensitive Data
0 -- 0Anand Mudgerikar, Puneet Sharma, Elisa Bertino. Edge-Based Intrusion Detection for IoT devices
0 -- 0Henanksha Sainani, Josephine M. Namayanja, Guneeti Sharma, Vasundhara Misal, Vandana P. Janeja. IP Reputation Scoring with Geo-Contextual Feature Augmentation
0 -- 0Mahdi R. Alagheband, Atefeh Mashatan, Morteza ZiHayat. Time-based Gap Analysis of Cybersecurity Trends in Academic and Digital Media
0 -- 0Martin Husák, Tomás Bajtos, Jaroslav Kaspar, Elias Bou-Harb, Pavel Celeda. Predictive Cyber Situational Awareness and Personalized Blacklisting: A Sequential Rule Mining Approach
0 -- 0Jay P. Kesan, Linfeng Zhang. Analysis of Cyber Incident Categories Based on Losses

Volume 11, Issue 3

0 -- 0Xiangyu Wang, Kang Zhao, Xun Zhou, W. Nick Street. Predicting User Posting Activities in Online Health Communities with Deep Learning
0 -- 0Asma Belhadi, Youcef Djenouri, Jerry Chun-Wei Lin, Alberto Cano 0001. Trajectory Outlier Detection: Algorithms, Taxonomies, Evaluation, and Open Challenges
0 -- 0Nenavath Sreenu. Cashless Payment Policy and Its Effects on Economic Growth of India: An Exploratory Study
0 -- 0Kaushik Dutta, Xiao Fang, Zhengrui (Jeffrey) Jiang. Introduction to WITS 2018 Special Issue in TMIS
0 -- 0Jie Tao, Lina Zhou. A Weakly Supervised WordNet-Guided Deep Learning Approach to Extracting Aspect Terms from Online Reviews
0 -- 0Wensheng Gan, Jerry Chun-Wei Lin, Han-Chieh Chao, Philippe Fournier-Viger, Xuan Wang, Philip S. Yu. Utility-Driven Mining of Trend Information for Intelligent System
0 -- 0Ram D. Gopal, Hooman Hidaji, Sule Nur Kutlu, Raymond A. Patterson, Erik Rolland, Dmitry Zhdanov. Real or Not?: Identifying Untrustworthy News Websites Using Third-party Partnerships
0 -- 0Liling Tan, Maggie Yundi Li, Stanley Kok. E-Commerce Product Categorization via Machine Translation

Volume 11, Issue 2

0 -- 0Haibing Lu, Xi Chen, Junmin Shi, Jaideep Vaidya, Vijayalakshmi Atluri, Yuan Hong, Wei Huang. Algorithms and Applications to Weighted Rank-one Binary Matrix Factorization
0 -- 0Tatiana Ermakova, Benjamin Fabian, Marta Kornacka, Scott Thiebes, Ali Sunyaev. Security and Privacy Requirements for Cloud Computing in Healthcare: Elicitation and Prioritization from a Patient Perspective
0 -- 0Ranjan Pal, Konstantinos Psounis, Jon Crowcroft, Frank P. Kelly, Pan Hui, Sasu Tarkoma, Abhishek Kumar, John Kelly, Aritra Chatterjee 0003, Leana Golubchik, Nishanth Sastry, Bodhibrata Nag. When Are Cyber Blackouts in Modern Service Networks Likely?: A Network Oblivious Theory on Cyber (Re)Insurance Feasibility
0 -- 0Moshe Unger, Alexander Tuzhilin, Amit Livne. Context-Aware Recommendations Based on Deep Learning Frameworks

Volume 11, Issue 1

0 -- 0Fabio Pierazzi, Ghita Mezzour, Qian Han, Michele Colajanni, V. S. Subrahmanian. A Data-driven Characterization of Modern Android Spyware
0 -- 0Mohsen Rezvani, Mojtaba Rezvani. A Randomized Reputation System in the Presence of Unfair Ratings
0 -- 0Li Ni, Wenjian Luo, Nannan Lu, Wenjie Zhu. Mining the Local Dependency Itemset in a Products Network
0 -- 0Hongfei Li, Ramesh Shankar, Jan Stallaert. Ex-post Reciprocity in Online Knowledge Sharing Communities