


default search action
ACM Transactions on Management Information Systems, Volume 11
Volume 11, Number 1, April 2020
- Hongfei Li, Ramesh Shankar, Jan Stallaert:
Invested or Indebted: Ex-ante and Ex-post Reciprocity in Online Knowledge Sharing Communities. 1:1-1:26 - Mohsen Rezvani
, Mojtaba Rezvani:
A Randomized Reputation System in the Presence of Unfair Ratings. 2:1-2:16 - Li Ni, Wenjian Luo
, Nannan Lu, Wenjie Zhu:
Mining the Local Dependency Itemset in a Products Network. 3:1-3:31 - Fabio Pierazzi
, Ghita Mezzour, Qian Han
, Michele Colajanni, V. S. Subrahmanian:
A Data-driven Characterization of Modern Android Spyware. 4:1-4:38
Volume 11, Number 2, July 2020
Regular Articles
- Ranjan Pal, Konstantinos Psounis, Jon Crowcroft, Frank P. Kelly, Pan Hui, Sasu Tarkoma, Abhishek Kumar
, John Kelly, Aritra Chatterjee, Leana Golubchik, Nishanth Sastry
, Bodhibrata Nag
:
When Are Cyber Blackouts in Modern Service Networks Likely?: A Network Oblivious Theory on Cyber (Re)Insurance Feasibility. 5:1-5:38 - Tatiana Ermakova, Benjamin Fabian, Marta Kornacka, Scott Thiebes, Ali Sunyaev:
Security and Privacy Requirements for Cloud Computing in Healthcare: Elicitation and Prioritization from a Patient Perspective. 6:1-6:29 - Haibing Lu
, Xi Chen
, Junmin Shi
, Jaideep Vaidya
, Vijayalakshmi Atluri
, Yuan Hong, Wei Huang:
Algorithms and Applications to Weighted Rank-one Binary Matrix Factorization. 7:1-7:33
- Moshe Unger
, Alexander Tuzhilin, Amit Livne:
Context-Aware Recommendations Based on Deep Learning Frameworks. 8:1-8:15
Volume 11, Number 3, August 2020
Special Section on WITS 2018
- Kaushik Dutta, Xiao Fang, Zhengrui (Jeffrey) Jiang:
Introduction to WITS 2018 Special Issue in TMIS. 9:1-9:2 - Ram D. Gopal, Hooman Hidaji
, Sule Nur Kutlu
, Raymond A. Patterson
, Erik Rolland, Dmitry Zhdanov
:
Real or Not?: Identifying Untrustworthy News Websites Using Third-party Partnerships. 10:1-10:20 - Liling Tan
, Maggie Yundi Li, Stanley Kok:
E-Commerce Product Categorization via Machine Translation. 11:1-11:14 - Xiangyu Wang, Kang Zhao
, Xun Zhou, W. Nick Street:
Predicting User Posting Activities in Online Health Communities with Deep Learning. 12:1-12:15 - Jie Tao, Lina Zhou:
A Weakly Supervised WordNet-Guided Deep Learning Approach to Extracting Aspect Terms from Online Reviews. 13:1-13:22
- Wensheng Gan, Jerry Chun-Wei Lin
, Han-Chieh Chao, Philippe Fournier-Viger, Xuan Wang, Philip S. Yu:
Utility-Driven Mining of Trend Information for Intelligent System. 14:1-14:28 - Nenavath Sreenu
:
Cashless Payment Policy and Its Effects on Economic Growth of India: An Exploratory Study. 15:1-15:10 - Asma Belhadi, Youcef Djenouri
, Jerry Chun-Wei Lin
, Alberto Cano:
Trajectory Outlier Detection: Algorithms, Taxonomies, Evaluation, and Open Challenges. 16:1-16:29
Volume 11, Number 4, October 2020
- Anand Mudgerikar
, Puneet Sharma, Elisa Bertino:
Edge-Based Intrusion Detection for IoT devices. 18:1-18:21 - Martin Husák
, Tomás Bajtos, Jaroslav Kaspar, Elias Bou-Harb, Pavel Celeda
:
Predictive Cyber Situational Awareness and Personalized Blacklisting: A Sequential Rule Mining Approach. 19:1-19:16 - Mahdi R. Alagheband, Atefeh Mashatan, Morteza Zihayat:
Time-based Gap Analysis of Cybersecurity Trends in Academic and Digital Media. 20:1-20:20 - Antonio Mangino, Morteza Safaei Pour
, Elias Bou-Harb:
Internet-scale Insecurity of Consumer Internet of Things: An Empirical Measurements Perspective. 21:1-21:24 - Christopher Sweet, Stephen Moskal, Shanchieh Jay Yang:
On the Variety and Veracity of Cyber Intrusion Alerts Synthesized by Generative Adversarial Networks. 22:1-22:21 - Sharad Mehrotra, Shantanu Sharma
, Jeffrey D. Ullman, Dhrubajyoti Ghosh, Peeyush Gupta, Anurag Mishra:
PANDA: Partitioned Data Security on Outsourced Sensitive and Non-sensitive Data. 23:1-23:41 - Sicong Shao
, Cihan Tunc
, Amany Al-Shawi, Salim Hariri:
An Ensemble of Ensembles Approach to Author Attribution for Internet Relay Chat Forensics. 24:1-24:25 - Jay P. Kesan, Linfeng Zhang
:
Analysis of Cyber Incident Categories Based on Losses. 25:1-25:28 - Henanksha Sainani, Josephine M. Namayanja
, Guneeti Sharma, Vasundhara Misal, Vandana P. Janeja:
IP Reputation Scoring with Geo-Contextual Feature Augmentation. 26:1-26:29

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.