enter search term and/or author name below:
Recommender systems are one of the most successful applications of data mining and machine-learning technology in practice. Academic research in the field is historically often based on the matrix completion problem formulation, where for each...
A Survey on Malicious Domains Detection through DNS Data Analysis
Yury Zhauniarovich, Issa Khalil, Ting Yu, Marc Dacier
Article No.: 67
Malicious domains are one of the major resources required for adversaries to run attacks over the Internet. Due to the important role of the Domain Name System (DNS), extensive research has been conducted to identify malicious domains based on...
Humans are able to identify other people’s voices even in voice disguise conditions. However, we are not immune to all voice changes when trying to identify people from voice. Likewise, automatic speaker recognition systems can also be...
Who Watches the Watchmen: A Security-focused Review on Current State-of-the-art Techniques, Tools, and Methods for Systems and Binary Analysis on Modern Platforms
Marcus Botacin, Paulo Lício De Geus, André grégio
Article No.: 69
Malicious software, a threat users face on a daily basis, have evolved from simple bankers based on social engineering to advanced persistent threats. Recent research and discoveries reveal that malware developers have been using a wide range of...
Systematically Understanding the Cyber Attack Business: A Survey
Keman Huang, Michael Siegel, Stuart Madnick
Article No.: 70
Cyber attacks are increasingly menacing businesses. Based on the literature review and publicly available reports, this article conducts an extensive and consistent survey of the services used by the cybercrime business, organized using the value...
Activity Recognition with Evolving Data Streams: A Review
Zahraa S. Abdallah, Mohamed Medhat Gaber, Bala Srinivasan, Shonali Krishnaswamy
Article No.: 71
Activity recognition aims to provide accurate and opportune information on people’s activities by leveraging sensory data available in today’s sensory rich environments. Nowadays, activity recognition has become an emerging field...
FPGA Dynamic and Partial Reconfiguration: A Survey of Architectures, Methods, and Applications
Kizheppatt Vipin, Suhaib A. Fahmy
Article No.: 72
Dynamic and partial reconfiguration are key differentiating capabilities of field programmable gate arrays (FPGAs). While they have been studied extensively in academic literature, they find limited use in deployed systems. We review FPGA...
Auto-Scaling Web Applications in Clouds: A Taxonomy and Survey
Chenhao Qu, Rodrigo N. Calheiros, Rajkumar Buyya
Article No.: 73
Web application providers have been migrating their applications to cloud data centers, attracted by the emerging cloud computing paradigm. One of the appealing features of the cloud is elasticity. It allows cloud users to acquire or release...
The Internet of Things (IoT) envisions a world-wide, interconnected network of smart physical entities. These physical entities generate a large amount of data in operation, and as the IoT gains momentum in terms of deployment, the combined scale...
Large-Scale Ontology Matching: State-of-the-Art Analysis
Peter Ochieng, Swaib Kyanda
Article No.: 75
Ontologies have become a popular means of knowledge sharing and reuse. This has motivated the development of large-sized independent ontologies within the same or different domains with some overlapping information among them. To integrate such...
A Survey of Physics-Based Attack Detection in Cyber-Physical Systems
Jairo Giraldo, David Urbina, Alvaro Cardenas, Junia Valente, Mustafa Faisal, Justin Ruths, Nils Ole Tippenhauer, Henrik Sandberg, Richard Candell
Article No.: 76
Monitoring the “physics” of cyber-physical systems to detect attacks is a growing area of research. In its basic form, a security monitor creates time-series models of sensor readings for an industrial control system and identifies...
Pointwise anomaly detection and change detection focus on the study of individual data instances; however, an emerging area of research involves groups or collections of observations. From applications of high-energy particle physics to health...
Evaluation in Contextual Information Retrieval: Foundations and Recent Advances within the Challenges of Context Dynamicity and Data Privacy
Lynda Tamine, Mariam Daoud
Article No.: 78
Context such as the user’s search history, demographics, devices, and surroundings, has become prevalent in various domains of information seeking and retrieval such as mobile search, task-based search, and social search. While evaluation...
A Survey on Homomorphic Encryption Schemes: Theory and Implementation
Abbas Acar, Hidayet Aksu, A. Selcuk Uluagac, Mauro Conti
Article No.: 79
Legacy encryption systems depend on sharing a key (public or private) among the peers involved in exchanging an encrypted message. However, this approach poses privacy concerns. The users or service providers with the key have exclusive rights on...
Deception Techniques in Computer Security: A Research Perspective
Xiao Han, Nizar Kheir, Davide Balzarotti
Article No.: 80
A recent trend both in academia and industry is to explore the use of deception techniques to achieve proactive attack detection and defense—to the point of marketing intrusion deception solutions as zero-false-positive intrusion...
A Survey of Machine Learning for Big Code and Naturalness
Miltiadis Allamanis, Earl T. Barr, Premkumar Devanbu, Charles Sutton
Article No.: 81
Research at the intersection of machine learning, programming languages, and software engineering has recently taken important steps in proposing learnable probabilistic models of source code that exploit the abundance of patterns of code. In this...
Scalable Metadata Management Techniques for Ultra-Large Distributed Storage Systems -- A Systematic Review
Harcharan Jit Singh, Seema Bawa
Article No.: 82
The provisioning of an efficient ultra-large scalable distributed storage system for expanding cloud applications has been a challenging job for researchers in academia and industry. In such an ultra-large-scale storage system, data are...
A Survey on Automatic Detection of Hate Speech in Text
Paula Fortuna, Sérgio Nunes
Article No.: 85
The scientific study of hate speech, from a computer science point of view, is recent. This survey organizes and describes the current state of the field, providing a structured overview of previous approaches, including core algorithms, methods,...
Presentation Attack Detection for Iris Recognition: An Assessment of the State-of-the-Art
Adam Czajka, Kevin W. Bowyer
Article No.: 86
Iris recognition is increasingly used in large-scale applications. As a result, presentation attack detection for iris recognition takes on fundamental importance. This survey covers the diverse research literature on this topic. Different...