{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,3]],"date-time":"2025-07-03T20:40:46Z","timestamp":1751575246314,"version":"3.40.3"},"publisher-location":"Cham","reference-count":41,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319651712"},{"type":"electronic","value":"9783319651729"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-65172-9_43","type":"book-chapter","created":{"date-parts":[[2017,8,1]],"date-time":"2017-08-01T04:38:54Z","timestamp":1501562334000},"page":"508-519","source":"Crossref","is-referenced-by-count":18,"title":["Recommender Systems Meeting Security: From Product Recommendation to Cyber-Attack Prediction"],"prefix":"10.1007","author":[{"given":"Nikolaos","family":"Polatidis","sequence":"first","affiliation":[]},{"given":"Elias","family":"Pimenidis","sequence":"additional","affiliation":[]},{"given":"Michalis","family":"Pavlidis","sequence":"additional","affiliation":[]},{"given":"Haralambos","family":"Mouratidis","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,8,2]]},"reference":[{"key":"43_CR1","doi-asserted-by":"crossref","first-page":"12","DOI":"10.1016\/j.dss.2015.03.008","volume":"74","author":"J Lu","year":"2015","unstructured":"Lu, J., Wu, D., Mao, M., Wang, W., Zhang, G.: Recommender system application developments: a survey. Decis. Support Syst. 74, 12\u201332 (2015)","journal-title":"Decis. Support Syst."},{"key":"43_CR2","doi-asserted-by":"crossref","first-page":"32","DOI":"10.4018\/ijeei.2013100103","volume":"4","author":"N Polatidis","year":"2013","unstructured":"Polatidis, N., Georgiadis, C.K.: Recommender systems: the importance of personalization on e-business environments. Int. J. E-entrepreneursh. Innov. 4, 32\u201346 (2013)","journal-title":"Int. J. E-entrepreneursh. Innov."},{"key":"43_CR3","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1155\/2009\/421425","volume":"2009","author":"X Su","year":"2009","unstructured":"Su, X., Khoshgoftaar, T.M.: A survey of collaborative filtering techniques. Adv. Artif. Intell. 2009, 1\u201319 (2009)","journal-title":"Adv. Artif. Intell."},{"key":"43_CR4","doi-asserted-by":"crossref","first-page":"165","DOI":"10.1007\/s10844-016-0397-4","volume":"48","author":"B Shams","year":"2017","unstructured":"Shams, B., Haratizadeh, S.: TasteMiner: mining partial tastes for neighbor-based collaborative filtering. J. Intell. Inf. Syst. 48, 165\u2013189 (2017)","journal-title":"J. Intell. Inf. Syst."},{"key":"43_CR5","doi-asserted-by":"crossref","first-page":"854","DOI":"10.1002\/int.21735","volume":"30","author":"W Wang","year":"2015","unstructured":"Wang, W., Zhang, G., Lu, J.: Collaborative filtering with entropy-driven user similarity in recommender systems. Int. J. Intell. Syst. 30, 854\u2013870 (2015)","journal-title":"Int. J. Intell. Syst."},{"key":"43_CR6","doi-asserted-by":"crossref","first-page":"156","DOI":"10.1016\/j.knosys.2013.11.006","volume":"56","author":"H Liu","year":"2014","unstructured":"Liu, H., Hu, Z., Mian, A., Tian, H., Zhu, X.: A new user similarity model to improve the accuracy of collaborative filtering. Knowl.-Based Syst. 56, 156\u2013166 (2014)","journal-title":"Knowl.-Based Syst."},{"key":"43_CR7","doi-asserted-by":"crossref","first-page":"6861","DOI":"10.1016\/j.eswa.2014.05.001","volume":"41","author":"LH Son","year":"2014","unstructured":"Son, L.H.: HU-FCF: a hybrid user-based fuzzy collaborative filtering method in recommender systems. Expert Syst. Appl. 41, 6861\u20136870 (2014)","journal-title":"Expert Syst. Appl."},{"key":"43_CR8","doi-asserted-by":"crossref","first-page":"204","DOI":"10.1016\/j.ipm.2011.03.007","volume":"48","author":"J Bobadilla","year":"2012","unstructured":"Bobadilla, J., Ortega, F., Hernando, A.: A collaborative filtering similarity measure based on singularities. Inf. Process. Manag. 48, 204\u2013217 (2012)","journal-title":"Inf. Process. Manag."},{"key":"43_CR9","doi-asserted-by":"crossref","first-page":"811","DOI":"10.1016\/j.dss.2013.03.006","volume":"55","author":"M Gan","year":"2013","unstructured":"Gan, M., Jiang, R.: Improving accuracy and diversity of personalized recommendation through power law adjustments of user similarities. Decis. Support Syst. 55, 811\u2013821 (2013)","journal-title":"Decis. Support Syst."},{"key":"43_CR10","doi-asserted-by":"crossref","first-page":"50","DOI":"10.1016\/j.ins.2013.03.011","volume":"239","author":"F Ortega","year":"2013","unstructured":"Ortega, F., S\u00e1nchez, J.L., Bobadilla, J., Guti\u00e9rrez, A.: Improving collaborative filtering-based recommender systems results using Pareto dominance. Inf. Sci. (N.Y.) 239, 50\u201361 (2013)","journal-title":"Inf. Sci. (N. Y.)"},{"key":"43_CR11","doi-asserted-by":"crossref","first-page":"100","DOI":"10.1016\/j.eswa.2015.11.023","volume":"48","author":"N Polatidis","year":"2016","unstructured":"Polatidis, N., Georgiadis, C.K.: A multi-level collaborative filtering method that improves recommendations. Expert Syst. Appl. 48, 100\u2013110 (2016)","journal-title":"Expert Syst. Appl."},{"key":"43_CR12","doi-asserted-by":"crossref","first-page":"14","DOI":"10.1016\/j.csi.2016.10.014","volume":"51","author":"N Polatidis","year":"2017","unstructured":"Polatidis, N., Georgiadis, C.K.: A dynamic multi-level collaborative filtering method for improved recommendations. Comput. Stand. Interfaces 51, 14\u201321 (2017)","journal-title":"Comput. Stand. Interfaces"},{"key":"43_CR13","doi-asserted-by":"crossref","first-page":"96","DOI":"10.1016\/j.knosys.2014.12.011","volume":"76","author":"RY Toledo","year":"2015","unstructured":"Toledo, R.Y., Mota, Y.C., Mart\u00ednez, L.: Correcting noisy ratings in collaborative recommender systems. Knowl.-Based Syst. 76, 96\u2013108 (2015)","journal-title":"Knowl.-Based Syst."},{"key":"43_CR14","unstructured":"Melville, P., Mooney, R.J., Nagarajan, R.: Content-boosted collaborative filtering for improved recommendations. In: Proceedings 18th National Conference on Artificial Intelligence (AAAI), pp. 187\u2013192 (2002)"},{"key":"43_CR15","doi-asserted-by":"crossref","first-page":"5101","DOI":"10.1016\/j.eswa.2010.09.141","volume":"38","author":"D Anand","year":"2011","unstructured":"Anand, D., Bharadwaj, K.K.: Utilizing various sparsity measures for enhancing accuracy of collaborative recommender systems based on local and global similarities. Expert Syst. Appl. 38, 5101\u20135109 (2011)","journal-title":"Expert Syst. Appl."},{"key":"43_CR16","doi-asserted-by":"crossref","first-page":"58","DOI":"10.1016\/j.dss.2015.12.001","volume":"82","author":"M Gan","year":"2016","unstructured":"Gan, M.: COUSIN: a network-based regression model for personalized recommendations. Decis. Support Syst. 82, 58\u201368 (2016)","journal-title":"Decis. Support Syst."},{"key":"43_CR17","doi-asserted-by":"crossref","first-page":"577","DOI":"10.1007\/s11390-016-1648-0","volume":"31","author":"M-X Gan","year":"2016","unstructured":"Gan, M.-X., Sun, L., Jiang, R.: Trinity: walking on a user-object-tag heterogeneous network for personalised recommendations. J. Comput. Sci. Technol. 31, 577\u2013594 (2016)","journal-title":"J. Comput. Sci. Technol."},{"key":"43_CR18","doi-asserted-by":"crossref","unstructured":"Xu, B., Bu, J., Chen, C., Cai, D.: An exploration of improving collaborative recommender systems via user-item subgroups. In: Proceedings of 21st International Conference on World Wide Web - WWW 2012, p. 21 (2012)","DOI":"10.1145\/2187836.2187840"},{"key":"43_CR19","series-title":"SpringerBriefs in Computer Science","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1007\/978-1-4614-1860-3_2","volume-title":"Quantitative Security Risk Assessment of Enterprise Networks","author":"X Ou","year":"2011","unstructured":"Ou, X., Singhal, A.: Attack graph techniques. In: Ou, X., Singhal, A. (eds.) Quantitative Security Risk Assessment of Enterprise Networks. SpringerBriefs in Computer Science, pp. 13\u201323. Springer, New York (2011). doi: 10.1007\/978-1-4614-1860-3_2"},{"key":"43_CR20","doi-asserted-by":"crossref","unstructured":"Templeton, S.J., Levitt, K.: A requires\/provides model for computer attacks. In: Proceedings of 2000 Workshop on New Security Paradigms - NSPW 2000, pp. 31\u201338 (2000)","DOI":"10.1145\/366173.366187"},{"key":"43_CR21","doi-asserted-by":"crossref","unstructured":"Ning, P., Xu, D.: Learning attack strategies from intrusion alerts. In: Proceedings of the 10th ACM Conference on Computer and Communication Security - CCS 2003, p. 200 (2003)","DOI":"10.1145\/948109.948137"},{"key":"43_CR22","doi-asserted-by":"crossref","unstructured":"Ritchey, R.W., Ammann, P.: Using model checking to analyze network vulnerabilities. In: Proceedings 2000 IEEE Symposium on Security and Privacy, S&P 2000, pp. 156\u2013165 (2000)","DOI":"10.1109\/SECPRI.2000.848453"},{"key":"43_CR23","doi-asserted-by":"crossref","unstructured":"Sheyner, O., Haines, J., Jha, S., Lippmann, R., Wing, J.M.: Automated generation and analysis of attack graphs. In: Proceedings of IEEE Symposium on Security and Privacy, pp. 273\u2013284 (2002)","DOI":"10.1109\/SECPRI.2002.1004377"},{"key":"43_CR24","doi-asserted-by":"crossref","unstructured":"Ou, X., Boyer, W.F., McQueen, M.A.: A scalable approach to attack graph generation. In: 13th ACM Conference on Computer and Communications Security, pp. 336\u2013345 (2006)","DOI":"10.1145\/1180405.1180446"},{"key":"43_CR25","doi-asserted-by":"crossref","unstructured":"Ammann, P., Wijesekera, D., Kaushik, S.: Scalable, graph-based network vulnerability analysis. In: Proceedings of 9th ACM Conference on Computer and Communication Security - CCS 2002, p. 217 (2002)","DOI":"10.1145\/586110.586140"},{"key":"43_CR26","doi-asserted-by":"crossref","unstructured":"Ammann, P., Pamula, J., Ritchey, R., Street, J.: A host-based approach to network attack chaining analysis. In: Proceedings of Annual Computer Security Applications Conference, ACSAC, pp. 72\u201381 (2005)","DOI":"10.1109\/CSAC.2005.6"},{"key":"43_CR27","doi-asserted-by":"crossref","unstructured":"Ingols, K., Lippmann, R., Piwowarski, K.: Practical attack graph generation for network defense. In: Proceedings of Annual Computer Security Applications Conference, ACSAC, pp. 121\u2013130 (2006)","DOI":"10.1109\/ACSAC.2006.39"},{"key":"43_CR28","doi-asserted-by":"crossref","unstructured":"Ingols, K., Chu, M., Lippmann, R., Webster, S., Boyer, S.: Modeling modern network attacks and countermeasures using attack graphs. In: Proceedings of Annual Computer Security Applications Conference, ACSAC, pp. 117\u2013126 (2009)","DOI":"10.1109\/ACSAC.2009.21"},{"key":"43_CR29","doi-asserted-by":"crossref","first-page":"519","DOI":"10.1109\/TDSC.2015.2423682","volume":"13","author":"K Kaynar","year":"2016","unstructured":"Kaynar, K., Sivrikaya, F.: Distributed attack graph generation. IEEE Trans. Dependable Secur. Comput. 13, 519\u2013532 (2016)","journal-title":"IEEE Trans. Dependable Secur. Comput."},{"key":"43_CR30","doi-asserted-by":"crossref","unstructured":"Xie, A., Zhang, L., Hu, J., Chen, Z.: A probability-based approach to attack graphs generation. In: 2nd International Symposium on Electronic Commerce and Security, ISECS 2009, pp. 343\u2013347 (2009)","DOI":"10.1109\/ISECS.2009.113"},{"key":"43_CR31","doi-asserted-by":"crossref","first-page":"369","DOI":"10.1007\/s10489-010-0266-8","volume":"36","author":"N Ghosh","year":"2012","unstructured":"Ghosh, N., Ghosh, S.K.: A planner-based approach to generate and analyze minimal attack graph. Appl. Intell. 36, 369\u2013390 (2012)","journal-title":"Appl. Intell."},{"key":"43_CR32","doi-asserted-by":"crossref","unstructured":"Phillips, C., Swiler, L.P.: A graph-based system for network-vulnerability analysis. In: Proceedings of 1998 Workshop on New Security Paradigms, pp. 71\u201379 (1998)","DOI":"10.1145\/310889.310919"},{"key":"43_CR33","doi-asserted-by":"crossref","first-page":"474","DOI":"10.1109\/TDSC.2015.2411264","volume":"13","author":"HMJ Almohri","year":"2016","unstructured":"Almohri, H.M.J., Watson, L.T., Yao, D., Ou, X.: Security optimization of dynamic networks with probabilistic graph modeling and linear programming. IEEE Trans. Dependable Secur. Comput. 13, 474\u2013487 (2016)","journal-title":"IEEE Trans. Dependable Secur. Comput."},{"key":"43_CR34","doi-asserted-by":"crossref","first-page":"677","DOI":"10.2298\/CSIS160227022B","volume":"13","author":"K Bi","year":"2016","unstructured":"Bi, K., Han, D., Wang, J.: K maximum probability attack paths dynamic generation algorithm. Comput. Sci. Inf. Syst. 13, 677\u2013689 (2016)","journal-title":"Comput. Sci. Inf. Syst."},{"key":"43_CR35","doi-asserted-by":"crossref","unstructured":"Artz, M.L.: NetSPA\u202f: a network security planning architecture, pp. 1\u201397 (2002)","DOI":"10.1016\/S1353-4858(02)12001-0"},{"key":"43_CR36","doi-asserted-by":"crossref","first-page":"61","DOI":"10.1109\/TDSC.2011.34","volume":"9","author":"N Poolsappasit","year":"2012","unstructured":"Poolsappasit, N., Dewri, R., Ray, I.: Dynamic security risk management using Bayesian attack graphs. IEEE Trans. Dependable Secur. Comput. 9, 61\u201374 (2012)","journal-title":"IEEE Trans. Dependable Secur. Comput."},{"key":"43_CR37","doi-asserted-by":"crossref","unstructured":"Ou, X., Govindavajhala, S., Appel, A.W.: MulVAL: a logic-based network security analyzer. In: Proceedings of the 14th Conference on USENIX Security Symposium, vol. 14, p. 8 (2005)","DOI":"10.1016\/S1353-4858(05)70237-3"},{"key":"43_CR38","doi-asserted-by":"publisher","first-page":"247","DOI":"10.1007\/0-387-24230-9_9","volume-title":"Managing Cyber Threats","author":"S Jajodia","year":"2005","unstructured":"Jajodia, S., Noel, S., O\u2019Berry, B.: Topological analysis of network attack vulnerability. In: Kumar, V., Srivastava, J., Lazarevic, A. (eds.) Managing Cyber Threats, pp. 247\u2013266. Springer, Heidelberg (2005). doi: 10.1007\/0-387-24230-9_9"},{"key":"43_CR39","series-title":"Communications in Computer and Information Science","doi-asserted-by":"publisher","first-page":"239","DOI":"10.1007\/978-3-642-54525-2_22","volume-title":"Recent Trends in Computer Networks and Distributed Systems Security","author":"MS Barik","year":"2014","unstructured":"Barik, M.S., Mazumdar, C.: A graph data model for attack graph generation and analysis. In: Mart\u00ednez P\u00e9rez, G., Thampi, S.M., Ko, R., Shu, L. (eds.) SNDS 2014. CCIS, vol. 420, pp. 239\u2013250. Springer, Heidelberg (2014). doi: 10.1007\/978-3-642-54525-2_22"},{"key":"43_CR40","unstructured":"Common Weakness Enumeration, CWE. http:\/\/cwe.mitre.org\/ . Accessed 20 Apr 2017"},{"key":"43_CR41","unstructured":"Common Vulnerabilities and Exposures, CVE. https:\/\/cve.mitre.org\/ . Accessed 20 Apr 2017"}],"container-title":["Communications in Computer and Information Science","Engineering Applications of Neural Networks"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-65172-9_43","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,10,13]],"date-time":"2020-10-13T23:12:30Z","timestamp":1602630750000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-65172-9_43"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319651712","9783319651729"],"references-count":41,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-65172-9_43","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2017]]}}}