Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
Volume 18, Issue 3August 2018Special Issue on Artificial Intelligence for Secruity and Privacy and Regular Papers
Reflects downloads up to 30 Aug 2024Bibliometrics
Skip Table Of Content Section
SECTION: Special Issue on Artificial Intelligence for Security and Privacy
editorial
Free
Guest Editors’ Introduction
Article No.: 26, Pages 1–4https://doi.org/10.1145/3177884
research-article
Genetic Algorithms for Solving Problems of Access Control Design and Reconfiguration in Computer Networks
Article No.: 27, Pages 1–21https://doi.org/10.1145/3093898

To create solutions for providing the required access control in computer networks it is not sufficient to have only tools and protocols in the network that are needed for it. It is necessary to create corresponding configuration, or scheme, of such ...

research-article
Quantifying Privacy Leakage in Multi-Agent Planning
Article No.: 28, Pages 1–21https://doi.org/10.1145/3133326

Multi-agent planning using MA-STRIPS–related models is often motivated by the preservation of private information. Such a motivation is not only natural for multi-agent systems but also is one of the main reasons multi-agent planning problems cannot be ...

research-article
Decision Networks for Security Risk Assessment of Critical Infrastructures
Article No.: 29, Pages 1–22https://doi.org/10.1145/3137570

We exploit Decision Networks (DN) for the analysis of attack/defense scenarios in critical infrastructures. DN extend Bayesian Networks (BN) with decision and value nodes. DN inherit from BN the possibility to naturally address uncertainty at every ...

research-article
Public Access
SHARE: A Stackelberg Honey-Based Adversarial Reasoning Engine
Article No.: 30, Pages 1–41https://doi.org/10.1145/3137571

A “noisy-rich” (NR) cyber-attacker (Lippmann et al. 2012) is one who tries all available vulnerabilities until he or she successfully compromises the targeted network. We develop an adversarial foundation, based on Stackelberg games, for how NR-...

research-article
Fine-Grained Access Control via Policy-Carrying Data
Article No.: 31, Pages 1–24https://doi.org/10.1145/3133324

We address the problem of associating access policies with datasets and how to monitor compliance via policy-carrying data. Our contributions are a formal model in first-order logic inspired by normative multi-agent systems to regulate data access, and ...

SECTION: Regular Papers
research-article
Collaborative Location Recommendation by Integrating Multi-dimensional Contextual Information
Article No.: 32, Pages 1–24https://doi.org/10.1145/3134438

Point-of-Interest (POI) recommendation is a new type of recommendation task that comes along with the prevalence of location-based social networks and services in recent years. Compared with traditional recommendation tasks, POI recommendation focuses ...

research-article
Toward Efficient Short-Video Sharing in the YouTube Social Network
Article No.: 33, Pages 1–25https://doi.org/10.1145/3137569

The past few years have seen an explosion in the popularity of online short-video sharing in YouTube. As the number of users continue to grow, the bandwidth required to maintain acceptable quality of service (QoS) has greatly increased. Peer-to-peer (...

research-article
Cross-Browser Differences Detection Based on an Empirical Metric for Web Page Visual Similarity
Article No.: 34, Pages 1–23https://doi.org/10.1145/3140544

This article aims to develop a method to detect visual differences introduced into web pages when they are rendered in different browsers. To achieve this goal, we propose an empirical visual similarity metric by mimicking human mechanisms of ...

research-article
A Learning-Based Framework for Improving Querying on Web Interfaces of Curated Knowledge Bases
Article No.: 35, Pages 1–20https://doi.org/10.1145/3155806

Knowledge Bases (KBs) are widely used as one of the fundamental components in Semantic Web applications as they provide facts and relationships that can be automatically understood by machines. Curated knowledge bases usually use Resource Description ...

research-article
Open Access
Are We There Yet? IPv6 in Australia and China
Article No.: 36, Pages 1–20https://doi.org/10.1145/3158374

IP (Internet Protocol) version 6 (IPv6) was standardised in 1998 to address the expected runout of IP version 4 (IPv4) addresses. However, the transition from IPv4 to IPv6 has been very slow in many countries. We investigate the state of IPv6 deployment ...

research-article
Duplicate Detection in Programming Question Answering Communities
Article No.: 37, Pages 1–21https://doi.org/10.1145/3169795

Community-based Question Answering (CQA) websites are attracting increasing numbers of users and contributors in recent years. However, duplicate questions frequently occur in CQA websites and are currently manually identified by the moderators. ...

research-article
Public Access
Providing Geo-Elasticity in Geographically Distributed Clouds
Article No.: 38, Pages 1–27https://doi.org/10.1145/3169794

Geographically distributed cloud platforms are well suited for serving a geographically diverse user base. However, traditional cloud provisioning mechanisms that make local scaling decisions are not adequate for delivering the best possible performance ...

research-article
Interest-Aware Content Discovery in Peer-to-Peer Social Networks
Article No.: 39, Pages 1–21https://doi.org/10.1145/3176247

With the increasing popularity and rapid development of Online Social Networks (OSNs), OSNs not only bring fundamental changes to information and communication technologies, but also make an extensive and profound impact on all aspects of our social ...

Subjects

Comments