


default search action
ACM Transactions on Management Information Systems, Volume 11
Volume 11, Number 1, April 2020
- Hongfei Li, Ramesh Shankar, Jan Stallaert:

Invested or Indebted: Ex-ante and Ex-post Reciprocity in Online Knowledge Sharing Communities. 1:1-1:26 - Mohsen Rezvani

, Mojtaba Rezvani:
A Randomized Reputation System in the Presence of Unfair Ratings. 2:1-2:16 - Li Ni, Wenjian Luo

, Nannan Lu, Wenjie Zhu:
Mining the Local Dependency Itemset in a Products Network. 3:1-3:31 - Fabio Pierazzi

, Ghita Mezzour, Qian Han
, Michele Colajanni, V. S. Subrahmanian:
A Data-driven Characterization of Modern Android Spyware. 4:1-4:38
Volume 11, Number 2, July 2020
Regular Articles
- Ranjan Pal, Konstantinos Psounis, Jon Crowcroft, Frank P. Kelly, Pan Hui, Sasu Tarkoma, Abhishek Kumar

, John Kelly, Aritra Chatterjee, Leana Golubchik, Nishanth Sastry
, Bodhibrata Nag
:
When Are Cyber Blackouts in Modern Service Networks Likely?: A Network Oblivious Theory on Cyber (Re)Insurance Feasibility. 5:1-5:38 - Tatiana Ermakova, Benjamin Fabian, Marta Kornacka, Scott Thiebes, Ali Sunyaev:

Security and Privacy Requirements for Cloud Computing in Healthcare: Elicitation and Prioritization from a Patient Perspective. 6:1-6:29 - Haibing Lu

, Xi Chen
, Junmin Shi
, Jaideep Vaidya
, Vijayalakshmi Atluri
, Yuan Hong
, Wei Huang:
Algorithms and Applications to Weighted Rank-one Binary Matrix Factorization. 7:1-7:33
- Moshe Unger

, Alexander Tuzhilin
, Amit Livne:
Context-Aware Recommendations Based on Deep Learning Frameworks. 8:1-8:15
Volume 11, Number 3, August 2020
Special Section on WITS 2018
- Kaushik Dutta, Xiao Fang, Zhengrui (Jeffrey) Jiang:

Introduction to WITS 2018 Special Issue in TMIS. 9:1-9:2 - Ram D. Gopal, Hooman Hidaji

, Sule Nur Kutlu
, Raymond A. Patterson
, Erik Rolland, Dmitry Zhdanov
:
Real or Not?: Identifying Untrustworthy News Websites Using Third-party Partnerships. 10:1-10:20 - Liling Tan

, Maggie Yundi Li, Stanley Kok:
E-Commerce Product Categorization via Machine Translation. 11:1-11:14 - Xiangyu Wang, Kang Zhao

, Xun Zhou, W. Nick Street:
Predicting User Posting Activities in Online Health Communities with Deep Learning. 12:1-12:15 - Jie Tao, Lina Zhou:

A Weakly Supervised WordNet-Guided Deep Learning Approach to Extracting Aspect Terms from Online Reviews. 13:1-13:22
- Wensheng Gan, Jerry Chun-Wei Lin

, Han-Chieh Chao
, Philippe Fournier-Viger, Xuan Wang, Philip S. Yu:
Utility-Driven Mining of Trend Information for Intelligent System. 14:1-14:28 - Nenavath Sreenu

:
Cashless Payment Policy and Its Effects on Economic Growth of India: An Exploratory Study. 15:1-15:10 - Asma Belhadi, Youcef Djenouri

, Jerry Chun-Wei Lin
, Alberto Cano:
Trajectory Outlier Detection: Algorithms, Taxonomies, Evaluation, and Open Challenges. 16:1-16:29
Volume 11, Number 4, October 2020
- Anand Mudgerikar

, Puneet Sharma, Elisa Bertino:
Edge-Based Intrusion Detection for IoT devices. 18:1-18:21 - Martin Husák

, Tomás Bajtos, Jaroslav Kaspar, Elias Bou-Harb, Pavel Celeda
:
Predictive Cyber Situational Awareness and Personalized Blacklisting: A Sequential Rule Mining Approach. 19:1-19:16 - Mahdi R. Alagheband, Atefeh Mashatan, Morteza Zihayat:

Time-based Gap Analysis of Cybersecurity Trends in Academic and Digital Media. 20:1-20:20 - Antonio Mangino, Morteza Safaei Pour

, Elias Bou-Harb:
Internet-scale Insecurity of Consumer Internet of Things: An Empirical Measurements Perspective. 21:1-21:24 - Christopher Sweet, Stephen Moskal, Shanchieh Jay Yang:

On the Variety and Veracity of Cyber Intrusion Alerts Synthesized by Generative Adversarial Networks. 22:1-22:21 - Sharad Mehrotra, Shantanu Sharma

, Jeffrey D. Ullman, Dhrubajyoti Ghosh, Peeyush Gupta, Anurag Mishra:
PANDA: Partitioned Data Security on Outsourced Sensitive and Non-sensitive Data. 23:1-23:41 - Sicong Shao

, Cihan Tunc
, Amany Al-Shawi, Salim Hariri:
An Ensemble of Ensembles Approach to Author Attribution for Internet Relay Chat Forensics. 24:1-24:25 - Jay P. Kesan, Linfeng Zhang

:
Analysis of Cyber Incident Categories Based on Losses. 25:1-25:28 - Henanksha Sainani, Josephine M. Namayanja

, Guneeti Sharma, Vasundhara Misal, Vandana P. Janeja:
IP Reputation Scoring with Geo-Contextual Feature Augmentation. 26:1-26:29

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














