Personalised information retrieval: survey and classification
Abstract Information Retrieval (IR) systems assist users in finding information from the
myriad of information resources available on the Web. A traditional characteristic of IR …
myriad of information resources available on the Web. A traditional characteristic of IR …
Survey on access control for community-centered collaborative systems
The last decades have seen a growing interest and demand for community-centered
collaborative systems and platforms. These systems and platforms aim to provide an …
collaborative systems and platforms. These systems and platforms aim to provide an …
[HTML][HTML] A survey of emerging threats in cybersecurity
The exponential growth of the Internet interconnections has led to a significant growth of
cyber attack incidents often with disastrous and grievous consequences. Malware is the …
cyber attack incidents often with disastrous and grievous consequences. Malware is the …
A decision-support framework for data anonymization with application to machine learning processes
The application of machine learning techniques to large and distributed data archives might
result in the disclosure of sensitive information about the data subjects. Data often contain …
result in the disclosure of sensitive information about the data subjects. Data often contain …
Privacy-aware cloud service composition based on QoS optimization in Internet of Things
With the advent of Internet of Things (IoT), cloud service composition problem has gotten
more complex along with the composition of large number of cloud services and numerous …
more complex along with the composition of large number of cloud services and numerous …
A machine learning solution to assess privacy policy completeness: (short paper)
A privacy policy is a legal document, used by websites to communicate how the personal
data that they collect will be managed. By accepting it, the user agrees to release his data …
data that they collect will be managed. By accepting it, the user agrees to release his data …
Linking data and process perspectives for conformance analysis
The detection of data breaches has become a major challenge for most organizations. The
problem lies in the fact that organizations often lack proper mechanisms to control and …
problem lies in the fact that organizations often lack proper mechanisms to control and …
[HTML][HTML] An analysis of the strategies for overcoming digital supply chain implementation barriers
This study aims to identify and prioritize the strategies for overcoming digital supply chain
(DSC) implementation barriers. Twenty-five DSC barriers and seventeen DSC strategies are …
(DSC) implementation barriers. Twenty-five DSC barriers and seventeen DSC strategies are …
A Review on the Mechanism Mitigating and Eliminating Internet Crimes using Modern Technologies: Mitigating Internet crimes using modern technologies
There is no doubting that contemporary technology creates new hazards, and these threats
are many and significant, directly harming people's lives and threatening their stability …
are many and significant, directly harming people's lives and threatening their stability …
[PDF][PDF] A critical review of 10 years of privacy technology
This paper is still being revised. It will eventually appear in the proceedings of the 2010
surveillance studies conference. It can then be cited as follows: George Danezis and Seda …
surveillance studies conference. It can then be cited as follows: George Danezis and Seda …