As wireless communication advances, research on location-based services using mobile devices has attracted interest, which provides information and services related to user’s phy...
Robustness analysis research has shown that conventional memory-based recommender systems are very susceptible to malicious profile-injection attacks. A number of attack models h...
Recommender systems (RS) are employed to personalize user interaction with (e.g. tourism) web-sites, supporting both navigation through large service assortments and the configura...
The Web is experiencing an exponential growth in the use of weblogs or blogs, websites containing dated journal-style entries. Blog entries are generally organised using informall...
Conor Hayes, Paolo Avesani, Sriharsha Veeramachane...
A widely used defense practice against malicious traffic on the Internet is to maintain blacklists, i.e., lists of prolific attack sources that have generated malicious activity in...