Issue Downloads
Security and Privacy Requirements for Cloud Computing in Healthcare: Elicitation and Prioritization from a Patient Perspective
Cloud computing promises essential improvements in healthcare delivery performance. However, its wide adoption in healthcare is yet to be seen, one main reason being patients’ concerns for security and privacy of their sensitive medical records. These ...
Algorithms and Applications to Weighted Rank-one Binary Matrix Factorization
Many applications use data that are better represented in the binary matrix form, such as click-stream data, market basket data, document-term data, user-permission data in access control, and others. Matrix factorization methods have been widely used ...
When Are Cyber Blackouts in Modern Service Networks Likely?: A Network Oblivious Theory on Cyber (Re)Insurance Feasibility
- Ranjan Pal,
- Konstantinos Psounis,
- Jon Crowcroft,
- Pan Hui,
- Sasu Tarkoma,
- Abhishek Kumar,
- John Kelly,
- Aritra Chatterjee,
- Leana Golubchik,
- Nishanth Sastry,
- Bodhibrata Nag
Service liability interconnections among globally networked IT- and IoT-driven service organizations create potential channels for cascading service disruptions worth billions of dollars, due to modern cyber-crimes such as DDoS, APT, and ransomware ...
Context-Aware Recommendations Based on Deep Learning Frameworks
In this article, we suggest a novel deep learning recommendation framework that incorporates contextual information into neural collaborative filtering recommendation approaches. Since context is often represented by dynamic and high-dimensional feature ...