ACM DL

Computing Surveys (CSUR)

Menu

Search Issue
enter search term and/or author name below:

Archive


ACM Computing Surveys (CSUR), Volume 51 Issue 4, July 2018

Sequence-Aware Recommender Systems
Massimo Quadrana, Paolo Cremonesi, Dietmar Jannach
Article No.: 66
DOI: 10.1145/3190616

Recommender systems are one of the most successful applications of data mining and machine-learning technology in practice. Academic research in the field is historically often based on the matrix completion problem formulation, where for each...

A Survey on Malicious Domains Detection through DNS Data Analysis
Yury Zhauniarovich, Issa Khalil, Ting Yu, Marc Dacier
Article No.: 67
DOI: 10.1145/3191329

Malicious domains are one of the major resources required for adversaries to run attacks over the Internet. Due to the important role of the Domain Name System (DNS), extensive research has been conducted to identify malicious domains based on...

Voice Disguise in Automatic Speaker Recognition
Mireia FarrÚs
Article No.: 68
DOI: 10.1145/3195832

Humans are able to identify other people’s voices even in voice disguise conditions. However, we are not immune to all voice changes when trying to identify people from voice. Likewise, automatic speaker recognition systems can also be...

Who Watches the Watchmen: A Security-focused Review on Current State-of-the-art Techniques, Tools, and Methods for Systems and Binary Analysis on Modern Platforms
Marcus Botacin, Paulo Lício De Geus, André grégio
Article No.: 69
DOI: 10.1145/3199673

Malicious software, a threat users face on a daily basis, have evolved from simple bankers based on social engineering to advanced persistent threats. Recent research and discoveries reveal that malware developers have been using a wide range of...

Systematically Understanding the Cyber Attack Business: A Survey
Keman Huang, Michael Siegel, Stuart Madnick
Article No.: 70
DOI: 10.1145/3199674

Cyber attacks are increasingly menacing businesses. Based on the literature review and publicly available reports, this article conducts an extensive and consistent survey of the services used by the cybercrime business, organized using the value...

Activity Recognition with Evolving Data Streams: A Review
Zahraa S. Abdallah, Mohamed Medhat Gaber, Bala Srinivasan, Shonali Krishnaswamy
Article No.: 71
DOI: 10.1145/3158645

Activity recognition aims to provide accurate and opportune information on people’s activities by leveraging sensory data available in today’s sensory rich environments. Nowadays, activity recognition has become an emerging field...

FPGA Dynamic and Partial Reconfiguration: A Survey of Architectures, Methods, and Applications
Kizheppatt Vipin, Suhaib A. Fahmy
Article No.: 72
DOI: 10.1145/3193827

Dynamic and partial reconfiguration are key differentiating capabilities of field programmable gate arrays (FPGAs). While they have been studied extensively in academic literature, they find limited use in deployed systems. We review FPGA...

Auto-Scaling Web Applications in Clouds: A Taxonomy and Survey
Chenhao Qu, Rodrigo N. Calheiros, Rajkumar Buyya
Article No.: 73
DOI: 10.1145/3148149

Web application providers have been migrating their applications to cloud data centers, attracted by the emerging cloud computing paradigm. One of the appealing features of the cloud is elasticity. It allows cloud users to acquire or release...

Analytics for the Internet of Things: A Survey
Eugene Siow, Thanassis Tiropanis, Wendy Hall
Article No.: 74
DOI: 10.1145/3204947

The Internet of Things (IoT) envisions a world-wide, interconnected network of smart physical entities. These physical entities generate a large amount of data in operation, and as the IoT gains momentum in terms of deployment, the combined scale...

Large-Scale Ontology Matching: State-of-the-Art Analysis
Peter Ochieng, Swaib Kyanda
Article No.: 75
DOI: 10.1145/3211871

Ontologies have become a popular means of knowledge sharing and reuse. This has motivated the development of large-sized independent ontologies within the same or different domains with some overlapping information among them. To integrate such...

A Survey of Physics-Based Attack Detection in Cyber-Physical Systems
Jairo Giraldo, David Urbina, Alvaro Cardenas, Junia Valente, Mustafa Faisal, Justin Ruths, Nils Ole Tippenhauer, Henrik Sandberg, Richard Candell
Article No.: 76
DOI: 10.1145/3203245

Monitoring the “physics” of cyber-physical systems to detect attacks is a growing area of research. In its basic form, a security monitor creates time-series models of sensor readings for an industrial control system and identifies...

Group Deviation Detection Methods: A Survey
Edward Toth, Sanjay Chawla
Article No.: 77
DOI: 10.1145/3203246

Pointwise anomaly detection and change detection focus on the study of individual data instances; however, an emerging area of research involves groups or collections of observations. From applications of high-energy particle physics to health...

Evaluation in Contextual Information Retrieval: Foundations and Recent Advances within the Challenges of Context Dynamicity and Data Privacy
Lynda Tamine, Mariam Daoud
Article No.: 78
DOI: 10.1145/3204940

Context such as the user’s search history, demographics, devices, and surroundings, has become prevalent in various domains of information seeking and retrieval such as mobile search, task-based search, and social search. While evaluation...

A Survey on Homomorphic Encryption Schemes: Theory and Implementation
Abbas Acar, Hidayet Aksu, A. Selcuk Uluagac, Mauro Conti
Article No.: 79
DOI: 10.1145/3214303

Legacy encryption systems depend on sharing a key (public or private) among the peers involved in exchanging an encrypted message. However, this approach poses privacy concerns. The users or service providers with the key have exclusive rights on...

Deception Techniques in Computer Security: A Research Perspective
Xiao Han, Nizar Kheir, Davide Balzarotti
Article No.: 80
DOI: 10.1145/3214305

A recent trend both in academia and industry is to explore the use of deception techniques to achieve proactive attack detection and defense—to the point of marketing intrusion deception solutions as zero-false-positive intrusion...

A Survey of Machine Learning for Big Code and Naturalness
Miltiadis Allamanis, Earl T. Barr, Premkumar Devanbu, Charles Sutton
Article No.: 81
DOI: 10.1145/3212695

Research at the intersection of machine learning, programming languages, and software engineering has recently taken important steps in proposing learnable probabilistic models of source code that exploit the abundance of patterns of code. In this...

Scalable Metadata Management Techniques for Ultra-Large Distributed Storage Systems -- A Systematic Review
Harcharan Jit Singh, Seema Bawa
Article No.: 82
DOI: 10.1145/3212686

The provisioning of an efficient ultra-large scalable distributed storage system for expanding cloud applications has been a challenging job for researchers in academia and industry. In such an ultra-large-scale storage system, data are...

A Survey on Automatic Detection of Hate Speech in Text
Paula Fortuna, Sérgio Nunes
Article No.: 85
DOI: 10.1145/3232676

The scientific study of hate speech, from a computer science point of view, is recent. This survey organizes and describes the current state of the field, providing a structured overview of previous approaches, including core algorithms, methods,...

Presentation Attack Detection for Iris Recognition: An Assessment of the State-of-the-Art
Adam Czajka, Kevin W. Bowyer
Article No.: 86
DOI: 10.1145/3232849

Iris recognition is increasingly used in large-scale applications. As a result, presentation attack detection for iris recognition takes on fundamental importance. This survey covers the diverse research literature on this topic. Different...