{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T11:04:44Z","timestamp":1776078284685,"version":"3.50.1"},"reference-count":208,"publisher":"Springer Science and Business Media LLC","issue":"12","license":[{"start":{"date-parts":[[2023,6,5]],"date-time":"2023-06-05T00:00:00Z","timestamp":1685923200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2023,6,5]],"date-time":"2023-06-05T00:00:00Z","timestamp":1685923200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/501100006752","name":"Universidade do Porto","doi-asserted-by":"crossref","id":[{"id":"10.13039\/501100006752","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Knowl Inf Syst"],"published-print":{"date-parts":[[2023,12]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>With the growth of CyberTerrorism, enterprises worldwide have been struggling to stop intruders from obtaining private data. Despite the efforts made by Cybersecurity experts, the shortage of skillful security teams and the usage of intelligent attacks have slowed down the enhancement of defense mechanisms. Furthermore, the pandemic in 2020 forced organizations to work in remote environments with poor security, leading to increased cyberattacks. One possible solution for these problems is the implementation of Recommender Systems to assist Cybersecurity human operators. Our goal is to survey the application of Recommender Systems in Cybersecurity architectures. These decision-support tools deal with information overload through filtering and prioritization methods, allowing businesses to increase revenue, achieve better user satisfaction, and make faster and more efficient decisions in various domains (e-commerce, healthcare, finance, and other fields). Several reports demonstrate the potential of using these recommendation structures to enhance the detection and prevention of cyberattacks and aid Cybersecurity experts in treating client incidents. This survey discusses several studies where Recommender Systems are implemented in Cybersecurity with encouraging results. One promising direction explored by the community is using Recommender Systems as attack predictors and navigation assistance tools. As contributions, we show the recent efforts in this area and summarize them in a table. Furthermore, we provide an in-depth analysis of potential research lines. For example, the inclusion of Recommender Systems in security information event management systems and security orchestration, automation, and response applications could decrease their complexity and information overload.<\/jats:p>","DOI":"10.1007\/s10115-023-01906-6","type":"journal-article","created":{"date-parts":[[2023,6,5]],"date-time":"2023-06-05T19:01:44Z","timestamp":1685991704000},"page":"5523-5559","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":18,"title":["Recommender Systems in Cybersecurity"],"prefix":"10.1007","volume":"65","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6741-6578","authenticated-orcid":false,"given":"Leonardo","family":"Ferreira","sequence":"first","affiliation":[]},{"given":"Daniel Castro","family":"Silva","sequence":"additional","affiliation":[]},{"given":"Mikel Uriarte","family":"Itzazelaia","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,6,5]]},"reference":[{"issue":"8","key":"1906_CR1","doi-asserted-by":"publisher","first-page":"719","DOI":"10.1016\/j.cose.2011.08.004","volume":"30","author":"K-KR Choo","year":"2011","unstructured":"Choo K-KR (2011) The cyber threat landscape: challenges and future research directions. Comput Secur 30(8):719\u2013731. https:\/\/doi.org\/10.1016\/j.cose.2011.08.004","journal-title":"Comput Secur"},{"key":"1906_CR2","unstructured":"Moore M (2019) Top cybersecurity threats in 2020. University of San Diego. https:\/\/onlinedegrees.sandiego.edu\/top-cyber-security-threats\/. Accessed 21 Feb 2020"},{"key":"1906_CR3","unstructured":"The New York Times (2018) The mad dash to find a cybersecurity force. https:\/\/www.nytimes.com\/2018\/11\/07\/business\/the-mad-dash-to-find-a-cybersecurity-force.html. Accessed 21 Feb 2020"},{"key":"1906_CR4","unstructured":"Robb D (2021) Best cybersecurity awareness training for employees in 2021. eSecurity Planet. https:\/\/www.esecurityplanet.com\/products\/cybersecurity-training\/. Accessed 1 Oct 2021"},{"key":"1906_CR5","doi-asserted-by":"publisher","DOI":"10.1145\/3234150","author":"S Pouyanfar","year":"2018","unstructured":"Pouyanfar S, Sadiq S, Yan Y, Tian H, Tao Y, Reyes MP, Shyu M-L, Chen S-C, Iyengar SS (2018) A survey on deep learning: algorithms, techniques, and applications. ACM Comput Surv. https:\/\/doi.org\/10.1145\/3234150","journal-title":"ACM Comput Surv"},{"key":"1906_CR6","doi-asserted-by":"publisher","first-page":"397","DOI":"10.1007\/978-3-030-71017-0_28","volume-title":"Advances in security, networks, and Internet of Things","author":"C Ayala","year":"2021","unstructured":"Ayala C, Jimenez K, Loza-Aguirre E, Andrade RO (2021) A hybrid recommender system for cybersecurity based on a rating approach. In: Daimi K, Arabnia HR, Deligiannidis L, Hwang M-S, Tinetti FG (eds) Advances in security, networks, and Internet of Things. Springer, Cham, pp 397\u2013409. https:\/\/doi.org\/10.1007\/978-3-030-71017-0_28"},{"key":"1906_CR7","doi-asserted-by":"publisher","unstructured":"Rasmussen J, Ehrlich K, Ross S, Kirk S, Gruen D, Patterson J (2010) Nimble cybersecurity incident management through visualization and defensible recommendations. In: Proceedings of the seventh international symposium on visualization for cyber security, VizSec \u201910. Association for Computing Machinery, Ottawa, pp 102\u2013113. https:\/\/doi.org\/10.1145\/1850795.1850807","DOI":"10.1145\/1850795.1850807"},{"key":"1906_CR8","doi-asserted-by":"publisher","unstructured":"Nunnally T, Abdullah K, Uluagac AS, Copeland JA, Beyah R (2013) NAVSEC: a recommender system for 3D network security visualizations. In: Proceedings of the tenth workshop on visualization for Cyber Security, VizSec \u201913. Association for Computing Machinery, Atlanta, pp 41\u201348. https:\/\/doi.org\/10.1145\/2517957.2517963","DOI":"10.1145\/2517957.2517963"},{"key":"1906_CR9","first-page":"586","volume":"34","author":"R Campiolo","year":"2016","unstructured":"Campiolo R, Kon F, Batista D, Esposte A (2016) A collaboration model to recommend network security alerts based on the mixed hybrid approach. Simp\u00f3sio Brasileiro de Redes de Computadores e Sistemas Distribu\u00eddos 34:586\u2013599","journal-title":"Simp\u00f3sio Brasileiro de Redes de Computadores e Sistemas Distribu\u00eddos"},{"issue":"1","key":"1906_CR10","first-page":"74","volume":"22","author":"VN Gadepally","year":"2016","unstructured":"Gadepally VN, Hancock BJ, Greenfield KB, Campbell JP, Campbell WM, Reuther AI (2016) Recommender systems for the department of defense and intelligence community. Lincoln Lab J 22(1):74\u201389","journal-title":"Lincoln Lab J"},{"key":"1906_CR11","doi-asserted-by":"publisher","DOI":"10.3390\/s21155248","author":"A Pawlicka","year":"2021","unstructured":"Pawlicka A, Pawlicki M, Kozik R, Chora\u015b RS (2021) A systematic review of recommender systems and their applications in cybersecurity. Sensors. https:\/\/doi.org\/10.3390\/s21155248","journal-title":"Sensors"},{"key":"1906_CR12","doi-asserted-by":"crossref","unstructured":"Hus\u00e1k M, \u010cerm\u00e1k M (2022) SoK: applications and challenges of using recommender systems in cybersecurity incident handling and response. In: Proceedings of the 17th international conference on availability, reliability and security, ARES \u201922. Association for Computing Machinery, New York. DOIurlhttps:\/\/doi.org\/10.1145\/3538969.3538981","DOI":"10.1145\/3538969.3538981"},{"key":"1906_CR13","unstructured":"Dilmegani C (2021) Recommendation systems: applications, examples & benefits. AI Multiple. https:\/\/research.aimultiple.com\/recommendation-system\/. Accessed 12 Oct 2021"},{"issue":"4","key":"1906_CR14","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1145\/2843948","volume":"6","author":"CA Gomez-Uribe","year":"2015","unstructured":"Gomez-Uribe CA, Hunt N (2015) The Netflix recommender system: algorithms, business value, and innovation. ACM Trans Manag Inf Syst (TMIS) 6(4):13\u201311319. https:\/\/doi.org\/10.1145\/2843948","journal-title":"ACM Trans Manag Inf Syst (TMIS)"},{"issue":"3","key":"1906_CR15","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1109\/MIC.2017.72","volume":"21","author":"B Smith","year":"2017","unstructured":"Smith B, Linden G (2017) Two decades of recommender systems at Amazon.com. IEEE Internet Comput 21(3):12\u201318. https:\/\/doi.org\/10.1109\/MIC.2017.72","journal-title":"IEEE Internet Comput"},{"key":"1906_CR16","doi-asserted-by":"publisher","unstructured":"Covington P, Adams J, Sargin E (2016) Deep neural networks for YouTube recommendations. In: Proceedings of the 10th ACM conference on recommender systems, RecSys \u201916. ACM, Boston, pp 191\u2013198. https:\/\/doi.org\/10.1145\/2959100.2959190","DOI":"10.1145\/2959100.2959190"},{"key":"1906_CR17","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1016\/j.dss.2015.03.008","volume":"74","author":"J Lu","year":"2015","unstructured":"Lu J, Wu D, Mao M, Wang W, Zhang G (2015) Recommender system application developments: a survey. Decis Support Syst 74:12\u201332. https:\/\/doi.org\/10.1016\/j.dss.2015.03.008","journal-title":"Decis Support Syst"},{"key":"1906_CR18","unstructured":"Ian\u00a0MacKenzie CM, Noble S (2013) How retailers can keep up with consumers. McKinsey & Company. https:\/\/www.mckinsey.com\/industries\/retail\/our-insights\/how-retailers-can-keep-up-with-consumers. Accessed 8 Jan 2020"},{"key":"1906_CR19","doi-asserted-by":"publisher","first-page":"377","DOI":"10.1007\/978-3-540-72079-9_12","volume-title":"Hybrid web recommender systems","author":"R Burke","year":"2007","unstructured":"Burke R (2007) The adaptive web: methods and strategies of web personalization. In: Burke R (ed) Hybrid web recommender systems, vol 4321. Springer, Berlin, pp 377\u2013408. https:\/\/doi.org\/10.1007\/978-3-540-72079-9_12"},{"key":"1906_CR20","doi-asserted-by":"publisher","unstructured":"Golbeck J (2006) Generating predictive movie recommendations from trust in social networks. In: Proceedings of the 4th international conference on trust management, iTrust\u201906. Springer, Pisa, pp 93\u2013104. https:\/\/doi.org\/10.1007\/11755593_8","DOI":"10.1007\/11755593_8"},{"key":"1906_CR21","doi-asserted-by":"publisher","unstructured":"Sharma R, Gopalani D, Meena Y (2017) Collaborative filtering-based recommender system: approaches and research challenges. In: 2017 3rd international conference on computational intelligence communication technology (CICT), pp 1\u20136. https:\/\/doi.org\/10.1109\/CIACT.2017.7977363","DOI":"10.1109\/CIACT.2017.7977363"},{"issue":"4","key":"1906_CR22","first-page":"300","volume":"1","author":"S-H Cha","year":"2007","unstructured":"Cha S-H (2007) Comprehensive survey on distance\/similarity measures between probability density functions. Int J Math Models Methods Appl Sci 1(4):300\u2013307","journal-title":"Int J Math Models Methods Appl Sci"},{"issue":"3","key":"1906_CR23","doi-asserted-by":"publisher","first-page":"261","DOI":"10.1016\/j.eij.2015.06.005","volume":"16","author":"FO Isinkaye","year":"2015","unstructured":"Isinkaye FO, Folajimi YO, Ojokoh BA (2015) Recommendation systems: principles, methods and evaluation. Egypt Inform J 16(3):261\u2013273. https:\/\/doi.org\/10.1016\/j.eij.2015.06.005","journal-title":"Egypt Inform J"},{"key":"1906_CR24","doi-asserted-by":"publisher","first-page":"325","DOI":"10.1007\/978-3-540-72079-9_10","volume-title":"The adaptive web: methods and strategies of web personalization","author":"MJ Pazzani","year":"2007","unstructured":"Pazzani MJ, Billsus D (2007) Content-based Recommendation Systems. In: Brusilovsky P, Kobsa A, Nejdl W (eds) The adaptive web: methods and strategies of web personalization, vol 4321. Springer, Berlin, pp 325\u2013341. https:\/\/doi.org\/10.1007\/978-3-540-72079-9_10"},{"issue":"5","key":"1906_CR25","doi-asserted-by":"publisher","first-page":"393","DOI":"10.1023\/A:1006544522159","volume":"13","author":"MJ Pazzani","year":"1999","unstructured":"Pazzani MJ (1999) A framework for collaborative, content-based and demographic filtering. Artif Intell Rev 13(5):393\u2013408. https:\/\/doi.org\/10.1023\/A:1006544522159","journal-title":"Artif Intell Rev"},{"key":"1906_CR26","doi-asserted-by":"publisher","unstructured":"Aggarwal CC (2016) Knowledge-based recommender systems. In: Recommender systems: the textbook. Springer, Cham, pp 167\u2013197. https:\/\/doi.org\/10.1007\/978-3-319-29659-3_5","DOI":"10.1007\/978-3-319-29659-3_5"},{"key":"1906_CR27","unstructured":"Sinha R, Medhurst K (2001) Comparing recommendations made by online systems and friends. In: Proceedings of the DELOS-NSF workshop on personalization and recommender systems in digital libraries"},{"key":"1906_CR28","doi-asserted-by":"publisher","unstructured":"Guy I, Zwerdling N, Carmel D, Ronen I, Uziel E, Yogev S, Ofek-Koifman S (2009) Personalized recommendation of social software items based on social relations. In: Proceedings of the third ACM conference on recommender systems, RecSys \u201909. ACM, New York, pp 53\u201360. https:\/\/doi.org\/10.1145\/1639714.1639725","DOI":"10.1145\/1639714.1639725"},{"key":"1906_CR29","doi-asserted-by":"publisher","first-page":"291","DOI":"10.1007\/978-3-540-72079-9_9","volume-title":"The adaptive web","author":"JB Schafer","year":"2007","unstructured":"Schafer JB, Frankowski D, Herlocker J, Sen S (2007) Collaborative filtering recommender systems. In: Brusilovsky P, Kobsa A, Nejdl W (eds) The adaptive web. Springer, Berlin, pp 291\u2013324. https:\/\/doi.org\/10.1007\/978-3-540-72079-9_9"},{"key":"1906_CR30","doi-asserted-by":"publisher","unstructured":"Mohamed MH, Khafagy MH, Ibrahim MH (2019) Recommender systems challenges and solutions survey. In: 2019 international conference on innovative trends in computer engineering (ITCE). IEEE, Aswan, Egypt, pp 149\u2013155. https:\/\/doi.org\/10.1109\/ITCE.2019.8646645","DOI":"10.1109\/ITCE.2019.8646645"},{"key":"1906_CR31","doi-asserted-by":"publisher","DOI":"10.3390\/app10217748","author":"Z Fayyaz","year":"2020","unstructured":"Fayyaz Z, Ebrahimian M, Nawara D, Ibrahim A, Kashef R (2020) Recommendation systems: algorithms, challenges, metrics, and business opportunities. Appl Sci. https:\/\/doi.org\/10.3390\/app10217748","journal-title":"Appl Sci"},{"key":"1906_CR32","doi-asserted-by":"publisher","DOI":"10.1145\/1921591.1921593","author":"F Cacheda","year":"2011","unstructured":"Cacheda F, Carneiro V, Fern\u00e1ndez D, Formoso V (2011) Comparison of collaborative filtering algorithms: limitations of current techniques and proposals for scalable, high-performance recommender systems. ACM Trans Web. https:\/\/doi.org\/10.1145\/1921591.1921593","journal-title":"ACM Trans Web"},{"key":"1906_CR33","doi-asserted-by":"publisher","first-page":"103","DOI":"10.1007\/978-3-642-35314-7_13","volume-title":"Proceedings of the international conference on frontiers of intelligent computing: theory and applications (FICTA)","author":"A Kumar","year":"2013","unstructured":"Kumar A, Sharma A (2013) Alleviating sparsity and scalability issues in collaborative filtering based recommender systems. In: Satapathy SC, Udgata SK, Biswal BN (eds) Proceedings of the international conference on frontiers of intelligent computing: theory and applications (FICTA). Springer, Berlin, pp 103\u2013112. https:\/\/doi.org\/10.1007\/978-3-642-35314-7_13"},{"key":"1906_CR34","unstructured":"Yu X (2015) Challenges in recommender systems: scalability, privacy, and structured recommendations. PhD thesis, Massachusetts Institute of Technology, Massachusetts, US"},{"key":"1906_CR35","doi-asserted-by":"publisher","first-page":"442","DOI":"10.1007\/978-3-642-15819-3_60","volume-title":"Artificial neural networks\u2014ICANN 2010","author":"O Georgiou","year":"2010","unstructured":"Georgiou O, Tsapatsoulis N (2010) Improving the scalability of recommender systems by clustering using genetic algorithms. In: Diamantaras K, Duch W, Iliadis LS (eds) Artificial neural networks\u2014ICANN 2010. Springer, Berlin, pp 442\u2013449. https:\/\/doi.org\/10.1007\/978-3-642-15819-3_60"},{"issue":"1","key":"1906_CR36","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1145\/3285029","volume":"52","author":"S Zhang","year":"2019","unstructured":"Zhang S, Yao L, Sun A, Tay Y (2019) Deep learning based recommender system: a survey and new perspectives. ACM Comput Surv 52(1):5\u20131538. https:\/\/doi.org\/10.1145\/3285029","journal-title":"ACM Comput Surv"},{"key":"1906_CR37","doi-asserted-by":"publisher","DOI":"10.1007\/s13278-020-0626-2","author":"N Idrissi","year":"2020","unstructured":"Idrissi N, Ahmed Z (2020) A systematic literature review of sparsity issues in recommender systems. Soc Netw Anal Min. https:\/\/doi.org\/10.1007\/s13278-020-0626-2","journal-title":"Soc Netw Anal Min"},{"issue":"1","key":"1906_CR38","first-page":"230","volume":"24","author":"W Pan","year":"2010","unstructured":"Pan W, Xiang E, Liu N, Yang Q (2010) Transfer learning in collaborative filtering for sparsity reduction. Proc AAAI Conf Artif Intell 24(1):230\u2013235","journal-title":"Proc AAAI Conf Artif Intell"},{"key":"1906_CR39","doi-asserted-by":"publisher","unstructured":"Devi MKK, Samy RT, Kumar SV, Venkatesh P (2010) Probabilistic neural network approach to alleviate sparsity and cold start problems in collaborative recommender systems. In: 2010 IEEE international conference on computational intelligence and computing research, pp 1\u20134. https:\/\/doi.org\/10.1109\/ICCIC.2010.5705777","DOI":"10.1109\/ICCIC.2010.5705777"},{"issue":"5","key":"1906_CR40","doi-asserted-by":"publisher","first-page":"5101","DOI":"10.1016\/j.eswa.2010.09.141","volume":"38","author":"D Anand","year":"2011","unstructured":"Anand D, Bharadwaj KK (2011) Utilizing various sparsity measures for enhancing accuracy of collaborative recommender systems based on local and global similarities. Expert Syst Appl 38(5):5101\u20135109. https:\/\/doi.org\/10.1016\/j.eswa.2010.09.141","journal-title":"Expert Syst Appl"},{"key":"1906_CR41","doi-asserted-by":"publisher","first-page":"202","DOI":"10.1016\/j.knosys.2017.10.005","volume":"138","author":"G Guo","year":"2017","unstructured":"Guo G, Qiu H, Tan Z, Liu Y, Ma J, Wang X (2017) Resolving data sparsity by multi-type auxiliary implicit feedback for recommender systems. Knowl-Based Syst 138:202\u2013207. https:\/\/doi.org\/10.1016\/j.knosys.2017.10.005","journal-title":"Knowl-Based Syst"},{"key":"1906_CR42","doi-asserted-by":"publisher","first-page":"324","DOI":"10.1016\/j.future.2019.02.016","volume":"96","author":"S Meng","year":"2019","unstructured":"Meng S, Qi L, Li Q, Lin W, Xu X, Wan S (2019) Privacy-preserving and sparsity-aware location-based prediction method for collaborative recommender systems. Futur Gener Comput Syst 96:324\u2013335. https:\/\/doi.org\/10.1016\/j.future.2019.02.016","journal-title":"Futur Gener Comput Syst"},{"key":"1906_CR43","doi-asserted-by":"publisher","first-page":"263","DOI":"10.1007\/978-1-4471-4555-4_12","volume-title":"Social media retrieval","author":"M Jeckmans","year":"2013","unstructured":"Jeckmans M, Arjan JP, Beye Erkin Z, Hartel P, Lagendijk RL, Tang Q (2013) Privacy in recommender systems. In: Ramzan N, van Zwol R, Lee J-S, Cl\u00fcver K, Hua X-S (eds) Social media retrieval. Springer, London, pp 263\u2013281. https:\/\/doi.org\/10.1007\/978-1-4471-4555-4_12"},{"key":"1906_CR44","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1007\/978-1-4899-7637-6_8","volume-title":"Evaluating recommender systems","author":"A Gunawardana","year":"2015","unstructured":"Gunawardana A, Shani G (2015) Evaluating recommender systems. Springer, Boston, pp 265\u2013308. https:\/\/doi.org\/10.1007\/978-1-4899-7637-6_8"},{"key":"1906_CR45","doi-asserted-by":"publisher","DOI":"10.1007\/s00146-020-00950-y","author":"S Milano","year":"2020","unstructured":"Milano S, Taddeo M, Floridi L (2020) Recommender systems and their ethical challenges. AI Soc. https:\/\/doi.org\/10.1007\/s00146-020-00950-y","journal-title":"AI Soc"},{"issue":"4","key":"1906_CR46","doi-asserted-by":"publisher","first-page":"472","DOI":"10.1109\/TSMCC.2010.2040275","volume":"40","author":"J Zhan","year":"2010","unstructured":"Zhan J, Hsieh C-L, Wang I-C, Hsu T-S, Liau C-J, Wang D-W (2010) Privacy-preserving collaborative recommender systems. IEEE Trans Syst Man Cybern Part C (Appl Rev) 40(4):472\u2013476. https:\/\/doi.org\/10.1109\/TSMCC.2010.2040275","journal-title":"IEEE Trans Syst Man Cybern Part C (Appl Rev)"},{"key":"1906_CR47","doi-asserted-by":"publisher","DOI":"10.1145\/2499670","author":"BP Knijnenburg","year":"2013","unstructured":"Knijnenburg BP, Kobsa A (2013) Making decisions about privacy: information disclosure in context-aware recommender systems. ACM Trans Interact Intell Syst. https:\/\/doi.org\/10.1145\/2499670","journal-title":"ACM Trans Interact Intell Syst"},{"key":"1906_CR48","unstructured":"Xin Y, Jaakkola T (2014) Controlling privacy in recommender systems. In: Proceedings of the 27th international conference on neural information processing systems\u2014volume 2, NIPS\u201914. MIT Press, Cambridge, pp 2618\u20132626"},{"key":"1906_CR49","doi-asserted-by":"publisher","unstructured":"Bakhshandegan Moghaddam F, Elahi M (2019) Cold start solutions for recommendation systems. https:\/\/doi.org\/10.13140\/RG.2.2.27407.02725","DOI":"10.13140\/RG.2.2.27407.02725"},{"key":"1906_CR50","unstructured":"Bernardi L, Kamps J, Kiseleva J, M\u00fcller MJI (2015) The continuous cold start problem in e-commerce recommender systems. CoRR arXiv:1508.01177"},{"key":"1906_CR51","doi-asserted-by":"publisher","unstructured":"Gope J, Jain SK (2017) A survey on solving cold start problem in recommender systems. In: 2017 international conference on computing, communication and automation (ICCCA). IEEE, pp 133\u2013138. https:\/\/doi.org\/10.1109\/CCAA.2017.8229786","DOI":"10.1109\/CCAA.2017.8229786"},{"key":"1906_CR52","doi-asserted-by":"publisher","unstructured":"Ziegler C-N, Lausen G, Schmidt-Thieme L (2004) Taxonomy-driven computation of product recommendations. In: Proceedings of the thirteenth ACM international conference on information and knowledge management, CIKM \u201904. Association for Computing Machinery, New York, pp 406\u2013415. https:\/\/doi.org\/10.1145\/1031171.1031252","DOI":"10.1145\/1031171.1031252"},{"key":"1906_CR53","doi-asserted-by":"publisher","first-page":"340","DOI":"10.1007\/978-3-642-13657-3_37","volume-title":"Advances in knowledge discovery and data mining","author":"G Shaw","year":"2010","unstructured":"Shaw G, Xu Y, Geva S (2010) Using association rules to solve the cold-start problem in recommender systems. In: Zaki MJ, Yu JX, Ravindran B, Pudi V (eds) Advances in knowledge discovery and data mining. Springer, Berlin, pp 340\u2013347. https:\/\/doi.org\/10.1007\/978-3-642-13657-3_37"},{"issue":"3","key":"1906_CR54","doi-asserted-by":"publisher","first-page":"519","DOI":"10.1016\/j.dss.2011.02.015","volume":"51","author":"H-N Kim","year":"2011","unstructured":"Kim H-N, El-Saddik A, Jo G-S (2011) Collaborative error-reflected models for cold-start recommender systems. Decis Support Syst 51(3):519\u2013531. https:\/\/doi.org\/10.1016\/j.dss.2011.02.015","journal-title":"Decis Support Syst"},{"issue":"4, Part 2","key":"1906_CR55","doi-asserted-by":"publisher","first-page":"2065","DOI":"10.1016\/j.eswa.2013.09.005","volume":"41","author":"B Lika","year":"2014","unstructured":"Lika B, Kolomvatsos K, Hadjiefthymiades S (2014) Facing the cold start problem in recommender systems. Expert Syst Appl 41(4, Part 2):2065\u20132073. https:\/\/doi.org\/10.1016\/j.eswa.2013.09.005","journal-title":"Expert Syst Appl"},{"key":"1906_CR56","doi-asserted-by":"publisher","unstructured":"Kaur P, Goel S (2016) Shilling attack models in recommender system. In: 2016 international conference on inventive computation technologies (ICICT), vol 2, pp 1\u20135. https:\/\/doi.org\/10.1109\/INVENTIVE.2016.7824865","DOI":"10.1109\/INVENTIVE.2016.7824865"},{"key":"1906_CR57","doi-asserted-by":"publisher","unstructured":"Gras B, Brun A, Boyer A (2016) Identifying grey sheep users in collaborative filtering: a distribution-based technique. In: Proceedings of the 2016 conference on user modeling adaptation and personalization, UMAP \u201916. Association for Computing Machinery, pp 17\u201326. https:\/\/doi.org\/10.1145\/2930238.2930242","DOI":"10.1145\/2930238.2930242"},{"key":"1906_CR58","doi-asserted-by":"publisher","unstructured":"Lin J, Dang L, Rahouti M, Xiong K (2021) Ml attack models: adversarial attacks and data poisoning attacks. arXiv preprint arXiv:2112.02797. https:\/\/doi.org\/10.48550\/ARXIV.2112.02797","DOI":"10.48550\/ARXIV.2112.02797"},{"key":"1906_CR59","unstructured":"Demetriou D (2011) Flatter to deceive: Sony pays out for fake film reviews. Independent. https:\/\/www.independent.co.uk\/arts-entertainment\/films\/news\/flatter-to-deceive-sony-pays-out-for-fake-film-reviews-551072.html. Accessed 10 Aug 2021"},{"issue":"4","key":"1906_CR60","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1145\/1278366.1278372","volume":"7","author":"B Mobasher","year":"2007","unstructured":"Mobasher B, Burke R, Bhaumik R, Williams C (2007) Toward trustworthy recommender systems: an analysis of attack models and algorithm robustness. ACM Trans Internet Technol 7(4):23. https:\/\/doi.org\/10.1145\/1278366.1278372","journal-title":"ACM Trans Internet Technol"},{"key":"1906_CR61","doi-asserted-by":"publisher","DOI":"10.1145\/3439729","author":"Y Deldjoo","year":"2021","unstructured":"Deldjoo Y, Noia TD, Merra FA (2021) A survey on adversarial recommender systems: from attack\/defense strategies to generative adversarial networks. ACM Comput Surv. https:\/\/doi.org\/10.1145\/3439729","journal-title":"ACM Comput Surv"},{"key":"1906_CR62","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2022.102746","volume":"118","author":"Y Himeur","year":"2022","unstructured":"Himeur Y, Sohail SS, Bensaali F, Amira A, Alazab M (2022) Latest trends of security and privacy in recommender systems: a comprehensive review and future perspectives. Comput Secur 118:102746. https:\/\/doi.org\/10.1016\/j.cose.2022.102746","journal-title":"Comput Secur"},{"key":"1906_CR63","doi-asserted-by":"publisher","unstructured":"Mehta B, Hofmann T, Nejdl W (2007) Robust collaborative filtering. In: Proceedings of the 2007 ACM conference on recommender systems, RecSys \u201907. Association for Computing Machinery, New York, pp 49\u201356. https:\/\/doi.org\/10.1145\/1297231.1297240","DOI":"10.1145\/1297231.1297240"},{"key":"1906_CR64","unstructured":"Ghazanfar MA, Prugel-Bennett A (2011) Fulfilling the needs of gray-sheep users in recommender systems, a clustering solution. In: 2011 international conference on information systems and computational intelligence"},{"key":"1906_CR65","doi-asserted-by":"publisher","unstructured":"Zheng Y, Agnani M, Singh M (2017) Identifying grey sheep users by the distribution of user similarities in collaborative filtering. In: Proceedings of the 6th annual conference on research in information technology, RIIT \u201917. Association for Computing Machinery, New York, pp 1\u20136. https:\/\/doi.org\/10.1145\/3125649.3125651","DOI":"10.1145\/3125649.3125651"},{"key":"1906_CR66","doi-asserted-by":"publisher","unstructured":"Jain P, Netrapalli P, Sanghavi S (2013) Low-rank matrix completion using alternating minimization. In: Proceedings of the forty-fifth annual ACM symposium on theory of computing, STOC \u201913. Association for Computing Machinery, New York, pp 665\u2013674. https:\/\/doi.org\/10.1145\/2488608.2488693","DOI":"10.1145\/2488608.2488693"},{"issue":"4","key":"1906_CR67","doi-asserted-by":"publisher","first-page":"1956","DOI":"10.1137\/080738970","volume":"20","author":"J-F Cai","year":"2010","unstructured":"Cai J-F, Cand\u00e8s EJ, Shen Z (2010) A singular value thresholding algorithm for matrix completion. SIAM J Optim 20(4):1956\u20131982","journal-title":"SIAM J Optim"},{"key":"1906_CR68","unstructured":"Li B, Wang Y, Singh A, Vorobeychik Y (2016) Data poisoning attacks on factorization-based collaborative filtering. arXiv e-prints arXiv:1608.08182 [cs.LG]"},{"key":"1906_CR69","doi-asserted-by":"publisher","unstructured":"Fang M, Yang G, Gong NZ, Liu J (2018) Poisoning attacks to graph-based recommender systems. In: Proceedings of the 34th annual computer security applications conference, ACSAC \u201918. Association for Computing Machinery, New York, pp 381\u2013392. https:\/\/doi.org\/10.1145\/3274694.3274706","DOI":"10.1145\/3274694.3274706"},{"key":"1906_CR70","doi-asserted-by":"publisher","unstructured":"Christakopoulou K, Banerjee A (2019) Adversarial attacks on an oblivious recommender. In: Proceedings of the 13th ACM conference on recommender systems, RecSys \u201919. Association for Computing Machinery, New York, pp 322\u2013330. https:\/\/doi.org\/10.1145\/3298689.3347031","DOI":"10.1145\/3298689.3347031"},{"key":"1906_CR71","doi-asserted-by":"publisher","unstructured":"Fang M, Gong NZ, Liu J (2020) Influence function based data poisoning attacks to top-n recommender systems. In: Proceedings of the web conference 2020, WWW \u201920. Association for Computing Machinery, New York, pp 3019\u20133025. https:\/\/doi.org\/10.1145\/3366423.3380072","DOI":"10.1145\/3366423.3380072"},{"key":"1906_CR72","doi-asserted-by":"crossref","unstructured":"Lin C, Chen S, Li H, Xiao Y, Li L, Yang Q (2020) Attacking recommender systems with augmented user profiles. arXiv e-prints arXiv:2005.08164 [cs.IR]","DOI":"10.1145\/3340531.3411884"},{"key":"1906_CR73","doi-asserted-by":"publisher","unstructured":"Anelli VW, Deldjoo Y, Di\u00a0Noia T, Di\u00a0Sciascio E, Merra F (2020) SAShA: semantic-aware shilling attacks on recommender systems exploiting knowledge graphs, pp 307\u2013323. https:\/\/doi.org\/10.1007\/978-3-030-49461-2_18","DOI":"10.1007\/978-3-030-49461-2_18"},{"key":"1906_CR74","doi-asserted-by":"publisher","unstructured":"Sundar AP, Li F, Zou X, Hu Q, Gao T (2020) Multi-armed-bandit-based shilling attack on collaborative filtering recommender systems. In: 2020 IEEE 17th international conference on mobile ad hoc and sensor systems (MASS), pp 347\u2013355. https:\/\/doi.org\/10.1109\/MASS50613.2020.00050","DOI":"10.1109\/MASS50613.2020.00050"},{"key":"1906_CR75","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2016.08.014","author":"D Kotkov","year":"2016","unstructured":"Kotkov D, Wang S, Veijalainen J (2016) A survey of serendipity in recommender systems. Knowl Based Syst. https:\/\/doi.org\/10.1016\/j.knosys.2016.08.014","journal-title":"Knowl Based Syst"},{"key":"1906_CR76","doi-asserted-by":"publisher","unstructured":"Kotkov D, Veijalainen J, Wang S (2016) Challenges of serendipity in recommender systems. In: WEBIST, pp 251\u2013256. https:\/\/doi.org\/10.5220\/0005879802510256","DOI":"10.5220\/0005879802510256"},{"key":"1906_CR77","doi-asserted-by":"publisher","DOI":"10.1145\/2926720","author":"M Kaminskas","year":"2016","unstructured":"Kaminskas M, Bridge D (2016) Diversity, serendipity, novelty, and coverage: a survey and empirical analysis of beyond-accuracy objectives in recommender systems. ACM Trans Interact Intell Syst. https:\/\/doi.org\/10.1145\/2926720","journal-title":"ACM Trans Interact Intell Syst"},{"key":"1906_CR78","doi-asserted-by":"publisher","unstructured":"Kotkov D, Konstan JA, Zhao Q, Veijalainen J (2018) Investigating serendipity in recommender systems based on real user feedback. In: Proceedings of the 33rd annual ACM symposium on applied computing, SAC \u201918. Association for Computing Machinery, New York, pp 1341\u20131350. https:\/\/doi.org\/10.1145\/3167132.3167276","DOI":"10.1145\/3167132.3167276"},{"key":"1906_CR79","doi-asserted-by":"publisher","unstructured":"Badran M, Bou\u00a0abdo J, Al\u00a0Jurdi W, Demerjian J (2019) Adaptive serendipity for recommender systems: let it find you. In: ICAART (2), pp 739\u2013745. https:\/\/doi.org\/10.5220\/0007409507390745","DOI":"10.5220\/0007409507390745"},{"key":"1906_CR80","doi-asserted-by":"publisher","first-page":"375","DOI":"10.1007\/s11390-020-0135-9","volume":"36","author":"R Ziarani","year":"2021","unstructured":"Ziarani R, Ravanmehr R (2021) Serendipity in recommender systems: a systematic literature review. J Comput Sci Technol 36:375\u2013396. https:\/\/doi.org\/10.1007\/s11390-020-0135-9","journal-title":"J Comput Sci Technol"},{"key":"1906_CR81","doi-asserted-by":"publisher","unstructured":"Zuva K, Zuva T (2017) Diversity and serendipity in recommender systems. In: Proceedings of the international conference on big data and internet of thing, BDIOT2017. Association for Computing Machinery, New York, pp 120\u2013124. https:\/\/doi.org\/10.1145\/3175684.3175694","DOI":"10.1145\/3175684.3175694"},{"key":"1906_CR82","doi-asserted-by":"publisher","unstructured":"Deshmukh AA, Nair P, Rao S (2018) A scalable clustering algorithm for serendipity in recommender systems. In: 2018 IEEE international conference on data mining workshops (ICDMW), pp 1279\u20131288. https:\/\/doi.org\/10.1109\/ICDMW.2018.00182","DOI":"10.1109\/ICDMW.2018.00182"},{"key":"1906_CR83","doi-asserted-by":"publisher","unstructured":"Yu C, Lakshmanan L, Amer-Yahia S (2009) Recommendation diversification using explanations. In: 2009 IEEE 25th international conference on data engineering, pp 1299\u20131302. https:\/\/doi.org\/10.1109\/ICDE.2009.225","DOI":"10.1109\/ICDE.2009.225"},{"key":"1906_CR84","doi-asserted-by":"publisher","unstructured":"Adamopoulos P, Tuzhilin A (2014) On over-specialization and concentration bias of recommendations: probabilistic neighborhood selection in collaborative filtering systems. In: Proceedings of the 8th ACM conference on recommender systems, RecSys \u201914. Association for Computing Machinery, New York, pp 153\u2013160. https:\/\/doi.org\/10.1145\/2645710.2645752","DOI":"10.1145\/2645710.2645752"},{"key":"1906_CR85","doi-asserted-by":"publisher","unstructured":"Adamopoulos P (2014) On discovering non-obvious recommendations: using unexpectedness and neighborhood selection methods in collaborative filtering systems. In: Proceedings of the 7th ACM international conference on web search and data mining, WSDM \u201914. Association for Computing Machinery, New York, pp 655\u2013660. https:\/\/doi.org\/10.1145\/2556195.2556204","DOI":"10.1145\/2556195.2556204"},{"issue":"4","key":"1906_CR86","doi-asserted-by":"publisher","first-page":"1186","DOI":"10.1016\/j.chb.2012.02.001","volume":"28","author":"ER N\u00fa\u00f1ez-Vald\u00e9z","year":"2012","unstructured":"N\u00fa\u00f1ez-Vald\u00e9z ER, Cueva Lovelle JM, Sanju\u00e1n Mart\u00ednez O, Garc\u00eda-D\u00edaz V, Ordo\u00f1ez de Pablos P, Montenegro Mar\u00edn CE (2012) Implicit feedback techniques on recommender systems applied to electronic books. Comput Hum Behav 28(4):1186\u20131193. https:\/\/doi.org\/10.1016\/j.chb.2012.02.001","journal-title":"Comput Hum Behav"},{"issue":"4","key":"1906_CR87","doi-asserted-by":"publisher","first-page":"3055","DOI":"10.1016\/j.eswa.2007.06.031","volume":"34","author":"TQ Lee","year":"2008","unstructured":"Lee TQ, Park Y, Park Y-T (2008) A time-based approach to effective recommender systems using implicit feedback. Expert Syst Appl 34(4):3055\u20133062. https:\/\/doi.org\/10.1016\/j.eswa.2007.06.031","journal-title":"Expert Syst Appl"},{"key":"1906_CR88","doi-asserted-by":"publisher","unstructured":"Ding J, Yu G, He X, Quan Y, Li Y, Chua T-S, Jin D, Yu, J (2018) Improving implicit recommender systems with view data. In: IJCAI, pp 3343\u20133349. https:\/\/doi.org\/10.24963\/ijcai.2018\/464","DOI":"10.24963\/ijcai.2018\/464"},{"key":"1906_CR89","doi-asserted-by":"publisher","DOI":"10.1145\/3372338","author":"J Ding","year":"2020","unstructured":"Ding J, Yu G, Li Y, He X, Jin D (2020) Improving implicit recommender systems with auxiliary data. ACM Trans Inf Syst. https:\/\/doi.org\/10.1145\/3372338","journal-title":"ACM Trans Inf Syst"},{"issue":"7","key":"1906_CR90","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3465401","volume":"54","author":"S Wang","year":"2021","unstructured":"Wang S, Cao L, Wang Y, Sheng QZ, Orgun MA, Lian D (2021) A survey on session-based recommender systems. ACM Comput Surv (CSUR) 54(7):1\u201338. https:\/\/doi.org\/10.1145\/3465401","journal-title":"ACM Comput Surv (CSUR)"},{"key":"1906_CR91","doi-asserted-by":"publisher","first-page":"555","DOI":"10.1007\/s10618-011-0215-0","volume":"24","author":"A Papadimitriou","year":"2012","unstructured":"Papadimitriou A, Symeonidis P, Manolopoulos Y (2012) A generalized taxonomy of explanations styles for traditional and social recommender systems. Data Min Knowl Discov 24:555\u2013583. https:\/\/doi.org\/10.1007\/s10618-011-0215-0","journal-title":"Data Min Knowl Discov"},{"key":"1906_CR92","unstructured":"Al-Taie MZ (2013) Explanations in recommender systems: overview and research approaches. In: Proceedings of the 14th international Arab conference on information technology, Khartoum, Sudan, ACIT, vol 13"},{"key":"1906_CR93","unstructured":"Zhang Y, Chen X (2018) Explainable recommendation: a survey and new perspectives. arXiv e-prints arXiv:1804.11192 [cs.IR]"},{"key":"1906_CR94","doi-asserted-by":"publisher","unstructured":"Abdollahi B, Nasraoui O (2018) Transparency in fair machine learning: the case of explainable recommender systems. Springer, Cham, pp 21\u201335. https:\/\/doi.org\/10.1007\/978-3-319-90403-0_2","DOI":"10.1007\/978-3-319-90403-0_2"},{"key":"1906_CR95","unstructured":"Wang S, Zhang X, Wang Y, Liu H, Ricci F (2022) Trustworthy recommender systems. arXiv preprint arXiv:2208.06265"},{"key":"1906_CR96","doi-asserted-by":"crossref","unstructured":"Cheng Z, Chang X, Zhu L, Kanjirathinkal RC, Kankanhalli M (2018) MMALFM: explainable recommendation by leveraging reviews and images. arXiv e-prints arXiv:1811.05318 [cs.IR]","DOI":"10.1145\/3291060"},{"key":"1906_CR97","doi-asserted-by":"crossref","unstructured":"Bellini V, Schiavone A, Di Noia T, Ragone A, Di Sciascio E (2018) Knowledge-aware autoencoders for explainable recommender sytems. arXiv e-prints arXiv:1807.06300 [cs.IR]","DOI":"10.1145\/3270323.3270327"},{"key":"1906_CR98","doi-asserted-by":"publisher","unstructured":"Samih A, Adadi A, Berrada M (2019) Towards a knowledge based explainable recommender systems. In: Proceedings of the 4th international conference on big data and internet of things, BDIoT\u201919. Association for Computing Machinery, New York, pp 1\u20135. https:\/\/doi.org\/10.1145\/3372938.3372959","DOI":"10.1145\/3372938.3372959"},{"key":"1906_CR99","unstructured":"ATT &CK M (2021) Enterprise matrix. MITRE ATT &CK. https:\/\/attack.mitre.org\/matrices\/enterprise\/. Accessed 3 May 2021"},{"issue":"1","key":"1906_CR100","doi-asserted-by":"publisher","first-page":"616","DOI":"10.1109\/COMST.2019.2953364","volume":"22","author":"I Butun","year":"2020","unstructured":"Butun I, \u00d6sterberg P, Song H (2020) Security of the internet of things: vulnerabilities, attacks, and countermeasures. IEEE Commun Surv Tutor 22(1):616\u2013644. https:\/\/doi.org\/10.1109\/COMST.2019.2953364","journal-title":"IEEE Commun Surv Tutor"},{"issue":"2","key":"1906_CR101","doi-asserted-by":"publisher","first-page":"432","DOI":"10.1109\/TMC.2019.2893338","volume":"19","author":"Y Meng","year":"2020","unstructured":"Meng Y, Li J, Zhu H, Liang X, Liu Y, Ruan N (2020) Revealing your mobile password via WiFi signals: attacks and countermeasures. IEEE Trans Mob Comput 19(2):432\u2013449. https:\/\/doi.org\/10.1109\/TMC.2019.2893338","journal-title":"IEEE Trans Mob Comput"},{"key":"1906_CR102","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1007\/978-3-319-14977-6_3","volume-title":"Distributed computing and internet technology","author":"ML Das","year":"2015","unstructured":"Das ML (2015) Privacy and security challenges in internet of things. In: Natarajan R, Barua G, Patra MR (eds) Distributed computing and internet technology. Springer, Cham, pp 33\u201348. https:\/\/doi.org\/10.1007\/978-3-319-14977-6_3"},{"issue":"2","key":"1906_CR103","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1109\/MCE.2019.2953740","volume":"9","author":"T Alladi","year":"2020","unstructured":"Alladi T, Chamola V, Sikdar B, Choo KR (2020) Consumer IoT: security vulnerability case studies and solutions. IEEE Consum Electron Mag 9(2):17\u201325. https:\/\/doi.org\/10.1109\/MCE.2019.2953740","journal-title":"IEEE Consum Electron Mag"},{"key":"1906_CR104","doi-asserted-by":"publisher","unstructured":"Giraldo J, Urbina D, Tang C, Cardenas AA (2020) The more the merrier: adding hidden measurements to secure industrial control systems. In: Proceedings of the 7th symposium on hot topics in the science of security, HotSoS \u201920. Association for Computing Machinery, Lawrence, Kansas, pp 1\u201310. https:\/\/doi.org\/10.1145\/3384217.3385624","DOI":"10.1145\/3384217.3385624"},{"key":"1906_CR105","unstructured":"Boehm J, Kaplan J, Sorel M, Sportsman N, Steen T (2020) Cybersecurity tactics for the coronavirus pandemic. McKinsey & Company. https:\/\/www.mckinsey.com\/business-functions\/risk-and-resilience\/our-insights\/cybersecurity-tactics-for-the-coronavirus-pandemic. Accessed 26 Feb 2021"},{"key":"1906_CR106","unstructured":"Cipher (2017) What are the most common cyber attacks? https:\/\/www.cisco.com\/c\/en\/us\/products\/security\/common-cyberattacks.html. Accessed 15 Jan 2020"},{"issue":"5","key":"1906_CR107","doi-asserted-by":"publisher","first-page":"973","DOI":"10.1016\/j.jcss.2014.02.005","volume":"80","author":"J Jang-Jaccard","year":"2014","unstructured":"Jang-Jaccard J, Nepal S (2014) A survey of emerging threats in cybersecurity. J Comput Syst Sci 80(5):973\u2013993. https:\/\/doi.org\/10.1016\/j.jcss.2014.02.005","journal-title":"J Comput Syst Sci"},{"key":"1906_CR108","unstructured":"Gantenbein K (2021) How ransomware works and how to prevent it. ExtraHop. https:\/\/www.extrahop.com\/company\/blog\/2020\/ransomware-explanation-and-prevention\/. Accessed 3 Oct 2021"},{"key":"1906_CR109","first-page":"48","volume":"12","author":"S Aurangzeb","year":"2017","unstructured":"Aurangzeb S, Aleem M, Iqbal M, Islam A (2017) Ransomware: a survey and trends. J Inf Assur Secur 12:48\u201358","journal-title":"J Inf Assur Secur"},{"issue":"C","key":"1906_CR110","doi-asserted-by":"publisher","first-page":"144","DOI":"10.1016\/j.cose.2018.01.001","volume":"74","author":"BAS Al-rimy","year":"2018","unstructured":"Al-rimy BAS, Maarof MA, Shaid SZM (2018) Ransomware threat success factors, taxonomy, and countermeasures. Comput Secur 74(C):144\u2013166. https:\/\/doi.org\/10.1016\/j.cose.2018.01.001","journal-title":"Comput Secur"},{"issue":"1","key":"1906_CR111","doi-asserted-by":"publisher","first-page":"105","DOI":"10.1016\/j.eij.2020.05.003","volume":"22","author":"M Humayun","year":"2021","unstructured":"Humayun M, Jhanjhi N, Alsayat A, Ponnusamy V (2021) Internet of things and ransomware: evolution, mitigation and prevention. Egypt Inform J 22(1):105\u2013117. https:\/\/doi.org\/10.1016\/j.eij.2020.05.003","journal-title":"Egypt Inform J"},{"issue":"16","key":"1906_CR112","doi-asserted-by":"publisher","first-page":"6272","DOI":"10.1002\/cpe.6272","volume":"33","author":"S Sharma","year":"2021","unstructured":"Sharma S, Kumar R, Rama Krishna C (2021) A survey on analysis and detection of android ransomware. Concurr Comput Pract Exp 33(16):6272. https:\/\/doi.org\/10.1002\/cpe.6272","journal-title":"Concurr Comput Pract Exp"},{"key":"1906_CR113","doi-asserted-by":"crossref","unstructured":"Oz H, Aris A, Levi A, Selcuk Uluagac A (2021) A survey on ransomware: evolution, taxonomy, and defense solutions. arXiv e-prints arXiv:2102.06249 [cs.CR]","DOI":"10.1145\/3514229"},{"key":"1906_CR114","doi-asserted-by":"publisher","first-page":"382","DOI":"10.1007\/978-3-319-26362-5_18","volume-title":"Research in attacks, intrusions, and defenses","author":"N Andronio","year":"2015","unstructured":"Andronio N, Zanero S, Maggi F (2015) HelDroid: dissecting and detecting mobile ransomware. In: Bos H, Monrose F, Blanc G (eds) Research in attacks, intrusions, and defenses. Springer, Cham, pp 382\u2013404. https:\/\/doi.org\/10.1007\/978-3-319-26362-5_18"},{"key":"1906_CR115","doi-asserted-by":"publisher","unstructured":"Kharraz A, Arshad S, Mulliner C, Robertson W, Kirda E (2016) UNVEIL: a large-scale, automated approach to detecting ransomware. In: Proceedings of the 25th USENIX conference on security symposium, SEC\u201916. USENIX Association, USA, pp 757\u2013772. https:\/\/doi.org\/10.1109\/SANER.2017.7884603","DOI":"10.1109\/SANER.2017.7884603"},{"key":"1906_CR116","doi-asserted-by":"publisher","unstructured":"Hou S, Ye Y, Song Y, Abdulhayoglu M (2017) HinDroid: an intelligent android malware detection system based on structured heterogeneous information network. In: Proceedings of the 23rd ACM SIGKDD international conference on knowledge discovery and data mining, KDD \u201917. Association for Computing Machinery, New York, pp 1507\u20131515. https:\/\/doi.org\/10.1145\/3097983.3098026","DOI":"10.1145\/3097983.3098026"},{"key":"1906_CR117","doi-asserted-by":"publisher","unstructured":"Hatzivasilis G, Soultatos O, Ioannidis S, Verikoukis C, Demetriou G, Tsatsoulis C (2019) Review of security and privacy for the internet of medical things (IoMT). In: 2019 15th international conference on distributed computing in sensor systems (DCOSS), pp 457\u2013464. https:\/\/doi.org\/10.1109\/DCOSS.2019.00091","DOI":"10.1109\/DCOSS.2019.00091"},{"issue":"12","key":"1906_CR118","doi-asserted-by":"publisher","first-page":"2728","DOI":"10.1002\/sec.795","volume":"7","author":"JH Ziegeldorf","year":"2014","unstructured":"Ziegeldorf JH, Morchon OG, Wehrle K (2014) Privacy in the internet of things: threats and challenges. Secur Commun Netw 7(12):2728\u20132742. https:\/\/doi.org\/10.1002\/sec.795","journal-title":"Secur Commun Netw"},{"key":"1906_CR119","doi-asserted-by":"publisher","DOI":"10.13052\/jcsm2245-1439.414","author":"M Abomhara","year":"2021","unstructured":"Abomhara M, K\u00f8ien G, Alghamdi M (2021) Cyber security and the internet of things: vulnerabilities, threats. Intruders Attacks. https:\/\/doi.org\/10.13052\/jcsm2245-1439.414","journal-title":"Intruders Attacks"},{"issue":"1","key":"1906_CR120","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1109\/SURV.2013.103013.00206","volume":"16","author":"C-W Tsai","year":"2014","unstructured":"Tsai C-W, Lai C-F, Chiang M-C, Yang LT (2014) Data mining for internet of things: a survey. IEEE Commun Surv Tutor 16(1):77\u201397. https:\/\/doi.org\/10.1109\/SURV.2013.103013.00206","journal-title":"IEEE Commun Surv Tutor"},{"key":"1906_CR121","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1016\/j.jnca.2017.02.009","volume":"84","author":"BB Zarpel\u00e3o","year":"2017","unstructured":"Zarpel\u00e3o BB, Miani RS, Kawakani CT, de Alvarenga SC (2017) A survey of intrusion detection in Internet of Things. J Netw Comput Appl 84:25\u201337. https:\/\/doi.org\/10.1016\/j.jnca.2017.02.009","journal-title":"J Netw Comput Appl"},{"key":"1906_CR122","doi-asserted-by":"publisher","unstructured":"Abouzakhar NS, Jones A, Angelopoulou O (2017) Internet of things security: a review of risks and threats to healthcare sector. In: 2017 IEEE international conference on Internet of Things (iThings) and IEEE green computing and communications (GreenCom) and IEEE cyber, physical and social computing (CPSCom) and IEEE smart data (SmartData), pp 373\u2013378. https:\/\/doi.org\/10.1109\/iThings-GreenCom-CPSCom-SmartData.2017.62","DOI":"10.1109\/iThings-GreenCom-CPSCom-SmartData.2017.62"},{"issue":"2","key":"1906_CR123","doi-asserted-by":"publisher","first-page":"1636","DOI":"10.1109\/COMST.2018.2874978","volume":"21","author":"I Makhdoom","year":"2019","unstructured":"Makhdoom I, Abolhasan M, Lipman J, Liu RP, Ni W (2019) Anatomy of threats to the Internet of Things. IEEE Commun Surv Tutor 21(2):1636\u20131675. https:\/\/doi.org\/10.1109\/COMST.2018.2874978","journal-title":"IEEE Commun Surv Tutor"},{"key":"1906_CR124","doi-asserted-by":"publisher","first-page":"88","DOI":"10.1016\/j.future.2018.03.007","volume":"85","author":"H HaddadPajouh","year":"2018","unstructured":"HaddadPajouh H, Dehghantanha A, Khayami R, Choo K-KR (2018) A deep recurrent neural network based approach for Internet of Things malware threat hunting. Futur Gener Comput Syst 85:88\u201396. https:\/\/doi.org\/10.1016\/j.future.2018.03.007","journal-title":"Futur Gener Comput Syst"},{"key":"1906_CR125","doi-asserted-by":"publisher","unstructured":"Doshi R, Apthorpe N, Feamster N (2018) Machine learning DDoS detection for consumer internet of things devices. In: 2018 IEEE security and privacy workshops (SPW), pp 29\u201335. https:\/\/doi.org\/10.1109\/SPW.2018.00013","DOI":"10.1109\/SPW.2018.00013"},{"key":"1906_CR126","doi-asserted-by":"publisher","first-page":"1","DOI":"10.3390\/computers3010001","volume":"3","author":"I Khalil","year":"2014","unstructured":"Khalil I, Khreishah A, Azeem M (2014) Cloud computing security: a survey. Computers 3:1\u201335. https:\/\/doi.org\/10.3390\/computers3010001","journal-title":"Computers"},{"key":"1906_CR127","doi-asserted-by":"publisher","DOI":"10.1145\/2767005","author":"CA Ardagna","year":"2015","unstructured":"Ardagna CA, Asal R, Damiani E, Vu QH (2015) From security to assurance in the cloud: a survey. ACM Comput Surv. https:\/\/doi.org\/10.1145\/2767005","journal-title":"ACM Comput Surv"},{"key":"1906_CR128","doi-asserted-by":"publisher","DOI":"10.1155\/2019\/7516035","author":"Y Al-Issa","year":"2019","unstructured":"Al-Issa Y, Ottom MA, Tamrawi A (2019) eHealth cloud security challenges: a survey. J Healthc Eng. https:\/\/doi.org\/10.1155\/2019\/7516035","journal-title":"J Healthc Eng"},{"key":"1906_CR129","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.cosrev.2019.05.002","volume":"33","author":"R Kumar","year":"2019","unstructured":"Kumar R, Goyal R (2019) On cloud security requirements, threats, vulnerabilities and countermeasures: a survey. Comput Sci Rev 33:1\u201348. https:\/\/doi.org\/10.1016\/j.cosrev.2019.05.002","journal-title":"Comput Sci Rev"},{"key":"1906_CR130","doi-asserted-by":"publisher","unstructured":"Potluri S, Mangla M, Satpathy S, Mohanty SN (2020) Detection and prevention mechanisms for DDoS Attack in cloud computing environment. In: 2020 11th international conference on computing, communication and networking technologies (ICCCNT), pp 1\u20136. https:\/\/doi.org\/10.1109\/ICCCNT49239.2020.9225396","DOI":"10.1109\/ICCCNT49239.2020.9225396"},{"issue":"4","key":"1906_CR131","doi-asserted-by":"publisher","first-page":"1097","DOI":"10.1016\/j.jnca.2010.06.004","volume":"34","author":"A Chonka","year":"2011","unstructured":"Chonka A, Xiang Y, Zhou W, Bonti A (2011) Cloud security defence to protect cloud computing against http-dos and xml-dos attacks. J Netw Comput Appl 34(4):1097\u20131107. https:\/\/doi.org\/10.1016\/j.jnca.2010.06.004","journal-title":"J Netw Comput Appl"},{"key":"1906_CR132","doi-asserted-by":"publisher","unstructured":"Mohamed H, Adil L, Saida T, Hicham M (2013) A collaborative intrusion detection and prevention system in cloud computing. In: 2013 Africon, pp 1\u20135. https:\/\/doi.org\/10.1109\/AFRCON.2013.6757727","DOI":"10.1109\/AFRCON.2013.6757727"},{"key":"1906_CR133","doi-asserted-by":"publisher","unstructured":"Xing T, Xiong Z, Huang D, Medhi D (2014) SDNIPS: enabling software-defined networking based intrusion prevention system in clouds. In: 10th international conference on network and service management (CNSM) and workshop, pp 308\u2013311. https:\/\/doi.org\/10.1109\/CNSM.2014.7014181","DOI":"10.1109\/CNSM.2014.7014181"},{"key":"1906_CR134","doi-asserted-by":"publisher","first-page":"12103","DOI":"10.1109\/ACCESS.2018.2805680","volume":"6","author":"Q Liu","year":"2018","unstructured":"Liu Q, Li P, Zhao W, Cai W, Yu S, Leung VCM (2018) A survey on security threats and defensive techniques of machine learning: a data driven view. IEEE Access 6:12103\u201312117. https:\/\/doi.org\/10.1109\/ACCESS.2018.2805680","journal-title":"IEEE Access"},{"key":"1906_CR135","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2019.100199","volume":"34","author":"N Pitropakis","year":"2019","unstructured":"Pitropakis N, Panaousis E, Giannetsos T, Anastasiadis E, Loukas G (2019) A taxonomy and survey of attacks against machine learning. Comput Sci Rev 34:100199. https:\/\/doi.org\/10.1016\/j.cosrev.2019.100199","journal-title":"Comput Sci Rev"},{"issue":"2","key":"1906_CR136","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1109\/MSEC.2018.2888775","volume":"17","author":"M Al-Rubaie","year":"2019","unstructured":"Al-Rubaie M, Chang JM (2019) Privacy-preserving machine learning: threats and solutions. IEEE Secur Priv 17(2):49\u201358. https:\/\/doi.org\/10.1109\/MSEC.2018.2888775","journal-title":"IEEE Secur Priv"},{"key":"1906_CR137","doi-asserted-by":"publisher","first-page":"74720","DOI":"10.1109\/ACCESS.2020.2987435","volume":"8","author":"M Xue","year":"2020","unstructured":"Xue M, Yuan C, Wu H, Zhang Y, Liu W (2020) Machine learning security: threats, countermeasures, and evaluations. IEEE Access 8:74720\u201374742. https:\/\/doi.org\/10.1109\/ACCESS.2020.2987435","journal-title":"IEEE Access"},{"key":"1906_CR138","doi-asserted-by":"publisher","unstructured":"Zhang J, Li C, Ye J, Qu G (2020) Privacy threats and protection in machine learning. Association for Computing Machinery, New York, pp 531\u2013536. https:\/\/doi.org\/10.1145\/3386263.3407599","DOI":"10.1145\/3386263.3407599"},{"key":"1906_CR139","doi-asserted-by":"publisher","first-page":"406","DOI":"10.1016\/j.comcom.2020.02.008","volume":"153","author":"R Gupta","year":"2020","unstructured":"Gupta R, Tanwar S, Tyagi S, Kumar N (2020) Machine learning models for secure data analytics: a taxonomy and threat model. Comput Commun 153:406\u2013440. https:\/\/doi.org\/10.1016\/j.comcom.2020.02.008","journal-title":"Comput Commun"},{"key":"1906_CR140","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2021.100365","volume":"14","author":"R Ahmad","year":"2021","unstructured":"Ahmad R, Alsmadi I (2021) Machine learning approaches to IoT security: a systematic literature review. Internet Things 14:100365. https:\/\/doi.org\/10.1016\/j.iot.2021.100365","journal-title":"Internet Things"},{"key":"1906_CR141","doi-asserted-by":"crossref","unstructured":"Papernot N, McDaniel P, Goodfellow I, Jha S, Berkay Celik Z, Swami A (2016) Practical black-box attacks against machine learning. arXiv e-prints arXiv:1602.02697 [cs.CR]","DOI":"10.1145\/3052973.3053009"},{"key":"1906_CR142","doi-asserted-by":"publisher","unstructured":"Baracaldo N, Chen B, Ludwig H, Safavi JA (2017) Mitigating poisoning attacks on machine learning models: a data provenance based approach. In: Proceedings of the 10th ACM workshop on artificial intelligence and security, AISec \u201917. Association for Computing Machinery, New York, pp 103\u2013110. https:\/\/doi.org\/10.1145\/3128572.3140450","DOI":"10.1145\/3128572.3140450"},{"key":"1906_CR143","doi-asserted-by":"publisher","unstructured":"Chen L, Hou S, Ye Y (2017) Securedroid: enhancing security of machine learning-based detection against adversarial android malware attacks. In: Proceedings of the 33rd annual computer security applications conference, ACSAC 2017. Association for Computing Machinery, New York, pp 362\u2013372. https:\/\/doi.org\/10.1145\/3134600.3134636","DOI":"10.1145\/3134600.3134636"},{"key":"1906_CR144","doi-asserted-by":"publisher","unstructured":"Sai AR, Buckley J, Le\u00a0Gear A (2019) Privacy and security analysis of cryptocurrency mobile applications. In: 2019 fifth conference on mobile and secure services (MobiSecServ), pp 1\u20136. https:\/\/doi.org\/10.1109\/MOBISECSERV.2019.8686583","DOI":"10.1109\/MOBISECSERV.2019.8686583"},{"key":"1906_CR145","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2020.102635","volume":"163","author":"A Ghosh","year":"2020","unstructured":"Ghosh A, Gupta S, Dua A, Kumar N (2020) Security of cryptocurrencies in blockchain technology: state-of-art, challenges and future prospects. J Netw Comput Appl 163:102635. https:\/\/doi.org\/10.1016\/j.jnca.2020.102635","journal-title":"J Netw Comput Appl"},{"key":"1906_CR146","unstructured":"Scicchitano F, Liguori A, Guarascio M, Ritacco E, Manco G (2020) A deep learning approach for detecting security attacks on blockchain. In: ITASEC, pp 212\u2013222"},{"key":"1906_CR147","doi-asserted-by":"publisher","DOI":"10.1088\/1742-6596\/1450\/1\/012075","volume":"1450","author":"W Handaya","year":"2020","unstructured":"Handaya W, Yusoff MN, Jantan A (2020) Machine learning approach for detection of fileless cryptocurrency mining malware. J Phys Conf Ser 1450:012075. https:\/\/doi.org\/10.1088\/1742-6596\/1450\/1\/012075","journal-title":"J Phys Conf Ser"},{"key":"1906_CR148","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2020.106630","volume":"96","author":"A Yazdinejad","year":"2020","unstructured":"Yazdinejad A, HaddadPajouh H, Dehghantanha A, Parizi RM, Srivastava G, Chen M-Y (2020) Cryptocurrency malware hunting: a deep recurrent neural network approach. Appl Soft Comput 96:106630. https:\/\/doi.org\/10.1016\/j.asoc.2020.106630","journal-title":"Appl Soft Comput"},{"key":"1906_CR149","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1007\/978-3-319-99951-7_2","volume-title":"Perspectives in business informatics research","author":"J Tom","year":"2018","unstructured":"Tom J, Sing E, Matulevi\u010dius R (2018) Conceptual representation of the GDPR: model and application directions. In: Zdravkovic J, Grabis J, Nurcan S, Stirna J (eds) Perspectives in business informatics research. Springer, Cham, pp 18\u201328. https:\/\/doi.org\/10.1007\/978-3-319-99951-7_2"},{"issue":"1","key":"1906_CR150","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1080\/1097198X.2019.1569186","volume":"22","author":"H Li","year":"2019","unstructured":"Li H, Yu L, He W (2019) The impact of GDPR on global technology development. J Glob Inf Technol Manag 22(1):1\u20136. https:\/\/doi.org\/10.1080\/1097198X.2019.1569186","journal-title":"J Glob Inf Technol Manag"},{"key":"1906_CR151","doi-asserted-by":"publisher","unstructured":"Addis C, Kutar M (2019) AI management an exploratory survey of the influence of GDPR and FAT principles. In: 2019 IEEE SmartWorld, ubiquitous intelligence computing, advanced trusted computing, scalable computing communications, cloud big data computing, internet of people and smart city innovation (SmartWorld\/SCALCOM\/UIC\/ATC\/CBDCom\/IOP\/SCI), pp 342\u2013347. https:\/\/doi.org\/10.1109\/SmartWorld-UIC-ATC-SCALCOM-IOP-SCI.2019.00102","DOI":"10.1109\/SmartWorld-UIC-ATC-SCALCOM-IOP-SCI.2019.00102"},{"key":"1906_CR152","doi-asserted-by":"publisher","first-page":"1746","DOI":"10.1109\/TIFS.2019.2948287","volume":"15","author":"NB Truong","year":"2020","unstructured":"Truong NB, Sun K, Lee GM, Guo Y (2020) GDPR-compliant personal data management: a blockchain-based solution. IEEE Trans Inf Forensics Secur 15:1746\u20131761. https:\/\/doi.org\/10.1109\/TIFS.2019.2948287","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"1906_CR153","doi-asserted-by":"publisher","first-page":"78","DOI":"10.1007\/978-3-030-27813-7_6","volume-title":"Trust, privacy and security in digital business","author":"L Piras","year":"2019","unstructured":"Piras L, Al-Obeidallah MG, Praitano A, Tsohou A, Mouratidis H, Gallego-Nicasio Crespo B, Bernard JB, Fiorani M, Magkos E, Sanz AC, Pavlidis M, D\u2019Addario R, Zorzino GG (2019) DEFeND architecture: a privacy by design platform for GDPR compliance. In: Gritzalis S, Weippl ER, Katsikas SK, Anderst-Kotsis G, Tjoa AM, Khalil I (eds) Trust, privacy and security in digital business. Springer, Cham, pp 78\u201393. https:\/\/doi.org\/10.1007\/978-3-030-27813-7_6"},{"key":"1906_CR154","doi-asserted-by":"publisher","first-page":"100","DOI":"10.1007\/978-3-030-58135-0_9","volume-title":"Advanced information systems engineering","author":"R Matulevi\u010dius","year":"2020","unstructured":"Matulevi\u010dius R, Tom J, Kala K, Sing E (2020) A method for managing GDPR compliance in business processes. In: Herbaut N, La Rosa M (eds) Advanced information systems engineering. Springer, Cham, pp 100\u2013112. https:\/\/doi.org\/10.1007\/978-3-030-58135-0_9"},{"key":"1906_CR155","unstructured":"Splunk (2019) Combating cyber attacks with SOAR. Splunk. https:\/\/www.splunk.com\/en_us\/data-insider\/what-is-soar.html. Accessed 14 April 2021"},{"issue":"5","key":"1906_CR156","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1109\/MSP.2014.103","volume":"12","author":"S Bhatt","year":"2014","unstructured":"Bhatt S, Manadhata PK, Zomlot L (2014) The operational role of security information and event management systems. IEEE Secur Priv 12(5):35\u201341. https:\/\/doi.org\/10.1109\/MSP.2014.103","journal-title":"IEEE Secur Priv"},{"key":"1906_CR157","doi-asserted-by":"publisher","unstructured":"Gonzalez Granadillo G, El-Barbori M, Debar H (2016) New types of alert correlation for security information and event management systems. In: 2016 8th IFIP international conference on new technologies, mobility and security (NTMS), pp 1\u20137. https:\/\/doi.org\/10.1109\/NTMS.2016.7792462","DOI":"10.1109\/NTMS.2016.7792462"},{"key":"1906_CR158","doi-asserted-by":"publisher","first-page":"488","DOI":"10.1016\/j.future.2020.07.015","volume":"113","author":"JC Sancho","year":"2020","unstructured":"Sancho JC, Caro A, \u00c1vila M, Bravo A (2020) New approach for threat classification and security risk estimations based on security event management. Futur Gener Comput Syst 113:488\u2013505. https:\/\/doi.org\/10.1016\/j.future.2020.07.015","journal-title":"Futur Gener Comput Syst"},{"key":"1906_CR159","doi-asserted-by":"publisher","first-page":"163","DOI":"10.1515\/pik-2014-0009","volume":"37","author":"O Wenge","year":"2014","unstructured":"Wenge O, Lampe U, Rensing C, Steinmetz R (2014) Security information and event monitoring as a service: a survey on current concerns and solutions. PIK Praxis der Informationsverarbeitung und Kommunikation 37:163\u2013170. https:\/\/doi.org\/10.1515\/pik-2014-0009","journal-title":"PIK Praxis der Informationsverarbeitung und Kommunikation"},{"issue":"16","key":"1906_CR160","doi-asserted-by":"publisher","first-page":"3790","DOI":"10.1002\/sec.1538","volume":"9","author":"M Irfan","year":"2016","unstructured":"Irfan M, Abbas H, Sun Y, Sajid A, Pasha M (2016) A framework for cloud forensics evidence collection and analysis using security information and event management. Secur Commun Netw 9(16):3790\u20133807. https:\/\/doi.org\/10.1002\/sec.1538","journal-title":"Secur Commun Netw"},{"key":"1906_CR161","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1016\/j.ijcip.2016.03.002","volume":"13","author":"CD Sarno","year":"2016","unstructured":"Sarno CD, Garofalo A, Matteucci I, Vallini M (2016) A novel security information and event management system for enhancing cyber security in a hydroelectric dam. Int J Crit Infrastruct Prot 13:39\u201351. https:\/\/doi.org\/10.1016\/j.ijcip.2016.03.002","journal-title":"Int J Crit Infrastruct Prot"},{"key":"1906_CR162","doi-asserted-by":"publisher","unstructured":"Adam I, Ping J (2018) Framework for security event management in 5G. In: Proceedings of the 13th international conference on availability, reliability and security, pp 1\u20137. https:\/\/doi.org\/10.1145\/3230833.3233254","DOI":"10.1145\/3230833.3233254"},{"key":"1906_CR163","doi-asserted-by":"publisher","unstructured":"Mulyadi F, Annam LA, Promya R, Charnsripinyo C (2020) Implementing dockerized elastic stack for security information and event management. In: 2020\u20145th international conference on information technology (InCIT), pp 243\u2013248. https:\/\/doi.org\/10.1109\/InCIT50588.2020.9310950","DOI":"10.1109\/InCIT50588.2020.9310950"},{"issue":"10","key":"1906_CR164","doi-asserted-by":"publisher","first-page":"8","DOI":"10.1016\/S1361-3723(19)30106-X","volume":"2019","author":"R Brewer","year":"2019","unstructured":"Brewer R (2019) Could SOAR save skills-short SOCs? Computer Fraud Secur 2019(10):8\u201311. https:\/\/doi.org\/10.1016\/S1361-3723(19)30106-X","journal-title":"Computer Fraud Secur"},{"key":"1906_CR165","doi-asserted-by":"publisher","DOI":"10.1145\/3305268","author":"C Islam","year":"2019","unstructured":"Islam C, Babar MA, Nepal S (2019) A multi-vocal review of security orchestration. ACM Comput Surv. https:\/\/doi.org\/10.1145\/3305268","journal-title":"ACM Comput Surv"},{"key":"1906_CR166","doi-asserted-by":"publisher","first-page":"901","DOI":"10.1729\/Journal.24048","volume":"6","author":"SM Mohammad","year":"2018","unstructured":"Mohammad SM, Surya L (2018) Security automation in information technology. SSRN Electron J 6:901\u2013905. https:\/\/doi.org\/10.1729\/Journal.24048","journal-title":"SSRN Electron J"},{"key":"1906_CR167","doi-asserted-by":"publisher","unstructured":"Song Luo, Ben Salem M (2016) Orchestration of software-defined security services. In: 2016 IEEE international conference on communications workshops (ICC), pp 436\u2013441. https:\/\/doi.org\/10.1109\/ICCW.2016.7503826","DOI":"10.1109\/ICCW.2016.7503826"},{"issue":"1","key":"1906_CR168","doi-asserted-by":"publisher","first-page":"7","DOI":"10.1016\/j.infsof.2008.09.009","volume":"51","author":"B Kitchenham","year":"2009","unstructured":"Kitchenham B, Pearl Brereton O, Budgen D, Turner M, Bailey J, Linkman S (2009) Systematic literature reviews in software engineering\u2014a systematic literature review. Inf Softw Technol 51(1):7\u201315. https:\/\/doi.org\/10.1016\/j.infsof.2008.09.009","journal-title":"Inf Softw Technol"},{"key":"1906_CR169","unstructured":"Lyons KB (2014) A recommender system in the cyber defense domain. Master\u2019s thesis, Air Force Institute of Technology Graduate School of Engineering and Management (AFIT\/EN), 2950 Hobson Way Wright-Patterson Air Force Base, Ohio 45433-7765"},{"key":"1906_CR170","doi-asserted-by":"publisher","DOI":"10.1007\/s12530-018-9234-z","author":"N Polatidis","year":"2018","unstructured":"Polatidis N, Pimenidis E, Pavlidis M, Papastergiou S, Mouratidis H (2018) From product recommendation to cyber-attack prediction: generating attack graphs and predicting future attacks. Evolv Syst. https:\/\/doi.org\/10.1007\/s12530-018-9234-z","journal-title":"Evolv Syst"},{"key":"1906_CR171","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s13635-019-0092-4","volume":"1","author":"FD Nembhard","year":"2019","unstructured":"Nembhard FD, Carvalho MM, Eskridge TC (2019) Towards the application of recommender systems to secure coding. EURASIP J Inf Secur 1:1\u201324. https:\/\/doi.org\/10.1186\/s13635-019-0092-4","journal-title":"EURASIP J Inf Secur"},{"key":"1906_CR172","doi-asserted-by":"publisher","unstructured":"McDonnell S, Nada O, Abid MR, Amjadian E (2021) CyberBERT: a deep dynamic-state session-based recommender system for cyber threat recognition. In: 2021 IEEE aerospace conference (50100), pp 1\u201312. https:\/\/doi.org\/10.1109\/AERO50100.2021.9438286","DOI":"10.1109\/AERO50100.2021.9438286"},{"key":"1906_CR173","doi-asserted-by":"publisher","unstructured":"Soldo F, Le A, Markopoulou A (2010) Predictive blacklisting as an implicit recommendation system. In: 2010 proceedings IEEE INFOCOM, pp 1\u20139. https:\/\/doi.org\/10.1109\/INFCOM.2010.5461982","DOI":"10.1109\/INFCOM.2010.5461982"},{"key":"1906_CR174","doi-asserted-by":"publisher","unstructured":"Abuhussein A, Shiva S, Sheldon FT (2016) CSSR: cloud services security recommender. In: 2016 IEEE world congress on services (SERVICES). IEEE Computer Society, San Francisco, pp 48\u201355. https:\/\/doi.org\/10.1109\/SERVICES.2016.13","DOI":"10.1109\/SERVICES.2016.13"},{"key":"1906_CR175","doi-asserted-by":"publisher","unstructured":"Sayan C, Hariri S, Ball G (2017) Cyber security assistant: design overview. In: Proceedings\u20142017 IEEE 2nd international workshops on foundations and applications of self* systems, FAS*W 2017. Institute of Electrical and Electronics Engineers Inc., United States, pp 313\u2013317. https:\/\/doi.org\/10.1109\/FAS-W.2017.165","DOI":"10.1109\/FAS-W.2017.165"},{"key":"1906_CR176","doi-asserted-by":"publisher","unstructured":"Franco, M., Rodrigues, B., Stiller, B. (2019) MENTOR: the design and evaluation of a protection services recommender system. In: 2019 15th international conference on network and service management (CNSM), Halifax, NS, Canada, pp 1\u20137. https:\/\/doi.org\/10.23919\/CNSM46954.2019.9012686","DOI":"10.23919\/CNSM46954.2019.9012686"},{"key":"1906_CR177","unstructured":"Sula E (2019) ProtecDDoS: a recommender system for distributed denial-of-service protection services. Master\u2019s thesis, University of Zurich, Z\u00fcrich, Switzerland"},{"key":"1906_CR178","doi-asserted-by":"publisher","DOI":"10.13052\/jcsm2245-1439.1032","author":"NN Ahmed","year":"2021","unstructured":"Ahmed NN, Nanath K (2021) Exploring cybersecurity ecosystem in the middle east: towards an SME recommender system. J Cyber Secur Mobil. https:\/\/doi.org\/10.13052\/jcsm2245-1439.1032","journal-title":"J Cyber Secur Mobil"},{"key":"1906_CR179","doi-asserted-by":"publisher","unstructured":"Huff P, McClanahan K, Le T, Li Q (2021) A recommender system for tracking vulnerabilities. In: Proceedings of the 16th international conference on availability, reliability and security, ARES 21. Association for Computing Machinery, New York. https:\/\/doi.org\/10.1145\/3465481.3470039","DOI":"10.1145\/3465481.3470039"},{"key":"1906_CR180","doi-asserted-by":"crossref","unstructured":"Brisse R, Boche S, Majorczyk F, Lalande J-F (2021) KRAKEN: a knowledge-based recommender system for analysts, to kick exploration up a notch. In: SECITC 2021\u201414th international conference on security for information technology and communications, Virtual, France, pp 1\u201317. https:\/\/hal.inria.fr\/hal-03486546","DOI":"10.1007\/978-3-031-17510-7_1"},{"key":"1906_CR181","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-0-387-85820-3_1","volume-title":"Introduction to recommender systems handbook","author":"F Ricci","year":"2011","unstructured":"Ricci F, Rokach L, Shapira B (2011) Introduction to recommender systems handbook. Springer, Boston, pp 1\u201335. https:\/\/doi.org\/10.1007\/978-0-387-85820-3_1"},{"key":"1906_CR182","unstructured":"Smith A (2020) In 2020, coronavirus concerns are a cloud security catalyst. Security Magazine. https:\/\/www.securitymagazine.com\/articles\/94086-in-2020-coronavirus-concerns-are-a-cloud-security-catalyst. Accessed 28 Feb 2021"},{"key":"1906_CR183","unstructured":"Salinger Y(2019) 2020 and beyond: what cybersecurity challenges will we face? Forbes. https:\/\/www.forbes.com\/sites\/forbestechcouncil\/2019\/12\/23\/2020-and-beyond-what-cybersecurity-challenges-will-we-face\/#6c3d000a6f3d. Accessed 30 Jan 2020"},{"key":"1906_CR184","doi-asserted-by":"publisher","unstructured":"Sayan CM (2017) An intelligent security assistant for cyber security operations. In: 2017 IEEE 2nd international workshops on foundations and applications of self* systems (FAS*W), pp 375\u2013376. https:\/\/doi.org\/10.1109\/FAS-W.2017.179","DOI":"10.1109\/FAS-W.2017.179"},{"key":"1906_CR185","doi-asserted-by":"publisher","first-page":"147","DOI":"10.1016\/j.cose.2019.06.005","volume":"86","author":"M Ring","year":"2019","unstructured":"Ring M, Wunderlich S, Scheuring D, Landes D, Hotho A (2019) A survey of network-based intrusion detection data sets. Comput Secur 86:147\u2013167. https:\/\/doi.org\/10.1016\/j.cose.2019.06.005","journal-title":"Comput Secur"},{"key":"1906_CR186","unstructured":"Morgan S (2019) Cybersecurity talent crunch to create 3.5 million unfilled jobs globally by 2021. CyberCrime Magazine. https:\/\/cybersecurityventures.com\/jobs\/. Accessed 23 Aug 2021"},{"key":"1906_CR187","doi-asserted-by":"publisher","DOI":"10.1155\/2019\/6268476","author":"D Kim","year":"2019","unstructured":"Kim D, Kim HK (2019) Automated dataset generation system for collaborative research of cyber threat analysis. Secur Commun Netw. https:\/\/doi.org\/10.1155\/2019\/6268476","journal-title":"Secur Commun Netw"},{"key":"1906_CR188","doi-asserted-by":"publisher","first-page":"234","DOI":"10.1007\/978-3-319-11379-1_12","volume-title":"Research in attacks, intrusions and defenses","author":"N Boggs","year":"2014","unstructured":"Boggs N, Zhao H, Du S, Stolfo SJ (2014) Synthetic data generation and defense in depth measurement of web applications. In: Stavrou A, Bos H, Portokalidis G (eds) Research in attacks, intrusions and defenses. Springer, Cham, pp 234\u2013254. https:\/\/doi.org\/10.1007\/978-3-319-11379-1_12"},{"key":"1906_CR189","doi-asserted-by":"publisher","DOI":"10.5772\/intechopen.97789","volume-title":"Introduction to intelligent user interfaces (IUIs)","author":"N Jalil","year":"2021","unstructured":"Jalil N (2021) Introduction to intelligent user interfaces (IUIs). IntechOpen, Rijeka. https:\/\/doi.org\/10.5772\/intechopen.97789"},{"key":"1906_CR190","doi-asserted-by":"publisher","unstructured":"Akinsola JET, Akinseinde S, Kalesanwo O, Adeagbo M, Oladapo K, Awoseyi A, Kasali F (2021) Application of artificial intelligence in user interfaces design for cyber security threat modeling. In: Intelligent user interfaces. IntechOpen. https:\/\/doi.org\/10.5772\/intechopen.96534","DOI":"10.5772\/intechopen.96534"},{"issue":"6","key":"1906_CR191","doi-asserted-by":"publisher","first-page":"1487","DOI":"10.3233\/IDA-163209","volume":"21","author":"E \u00c7ano","year":"2017","unstructured":"\u00c7ano E, Morisio M (2017) Hybrid recommender systems: a systematic literature review. Intell Data Anal 21(6):1487\u20131524. https:\/\/doi.org\/10.3233\/IDA-163209","journal-title":"Intell Data Anal"},{"issue":"6","key":"1906_CR192","doi-asserted-by":"publisher","first-page":"3975","DOI":"10.1007\/s10489-020-01962-3","volume":"51","author":"F Gasparetti","year":"2021","unstructured":"Gasparetti F, Sansonetti G, Micarelli A (2021) Community detection in social recommender systems: a survey. Appl Intell 51(6):3975\u20133995. https:\/\/doi.org\/10.1007\/s10489-020-01962-3","journal-title":"Appl Intell"},{"key":"1906_CR193","doi-asserted-by":"crossref","unstructured":"Gao C, Lei W, He X, de Rijke M, Chua T-S (2021) Advances and challenges in conversational recommender systems: a survey. arXiv e-prints arXiv:2101.09459 [cs.IR]","DOI":"10.1016\/j.aiopen.2021.06.002"},{"key":"1906_CR194","unstructured":"Afsar MM, Crump T, Far B (2021) Reinforcement learning based recommender systems: a survey. arXiv e-prints arXiv:2101.06286 [cs.IR]"},{"key":"1906_CR195","doi-asserted-by":"publisher","DOI":"10.1145\/3453443","author":"M Al-Ghossein","year":"2021","unstructured":"Al-Ghossein M, Abdessalem T, Barr\u00e9 A (2021) A survey on stream-based recommender systems. ACM Comput Surv. https:\/\/doi.org\/10.1145\/3453443","journal-title":"ACM Comput Surv"},{"key":"1906_CR196","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/bxab049","author":"M Altulyan","year":"2021","unstructured":"Altulyan M, Yao L, Wang X, Huang C, Kanhere SS, Sheng QZ (2021) A survey on recommender systems for Internet of Things: techniques, applications and future directions. Comput J. https:\/\/doi.org\/10.1093\/comjnl\/bxab049","journal-title":"Comput J"},{"issue":"1","key":"1906_CR197","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10462-018-9654-y","volume":"52","author":"Z Batmaz","year":"2019","unstructured":"Batmaz Z, Yurekli A, Bilge A, Kaleli C (2019) A review on deep learning for recommender systems: challenges and remedies. Artif Intell Rev 52(1):1\u201337. https:\/\/doi.org\/10.1007\/s10462-018-9654-y","journal-title":"Artif Intell Rev"},{"key":"1906_CR198","doi-asserted-by":"publisher","unstructured":"Kuppa A, Le-Khac N-A (2020) Black box attacks on explainable artificial intelligence (XAI) methods in Cyber Security. In: 2020 international joint conference on neural networks (IJCNN), pp 1\u20138. https:\/\/doi.org\/10.1109\/IJCNN48605.2020.9206780","DOI":"10.1109\/IJCNN48605.2020.9206780"},{"key":"1906_CR199","doi-asserted-by":"publisher","DOI":"10.2760\/57493","volume-title":"Robustness and explainability of artificial intelligence","author":"R Hamon","year":"2020","unstructured":"Hamon R, Junklewitz H, Sanchez I (2020) Robustness and explainability of artificial intelligence. Publications Office of the European Union, Luxembourg. https:\/\/doi.org\/10.2760\/57493"},{"key":"1906_CR200","unstructured":"Splunk (2018) What is SIEM? Splunk. https:\/\/www.splunk.com\/en_us\/data-insider\/what-is-siem.html. Accessed 10 Aug 2021"},{"key":"1906_CR201","doi-asserted-by":"publisher","DOI":"10.3390\/s21144759","author":"G Gonz\u00e1lez-Granadillo","year":"2021","unstructured":"Gonz\u00e1lez-Granadillo G, Gonz\u00e1lez-Zarzosa S, Diaz R (2021) Security information and event management (SIEM): analysis, trends, and usage in critical infrastructures. Sensors. https:\/\/doi.org\/10.3390\/s21144759","journal-title":"Sensors"},{"key":"1906_CR202","doi-asserted-by":"publisher","first-page":"0196533","DOI":"10.1371\/journal.pone.0196533","volume":"13","author":"W Zhou","year":"2018","unstructured":"Zhou W, Wen J, Qu Q, Zeng J, Cheng T (2018) Shilling attack detection for recommender systems based on credibility of group users and rating time series. PLoS ONE 13:0196533. https:\/\/doi.org\/10.1371\/journal.pone.0196533","journal-title":"PLoS ONE"},{"key":"1906_CR203","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1016\/j.knosys.2019.04.001","volume":"177","author":"H Cai","year":"2019","unstructured":"Cai H, Zhang F (2019) Detecting shilling attacks in recommender systems based on analysis of user rating behavior. Knowl-Based Syst 177:22\u201343. https:\/\/doi.org\/10.1016\/j.knosys.2019.04.001","journal-title":"Knowl-Based Syst"},{"key":"1906_CR204","doi-asserted-by":"publisher","DOI":"10.1007\/s00500-021-05586-8","author":"S Rani","year":"2021","unstructured":"Rani S, Kaur M, Kumar M, Ravi V, Ghosh U, Mohanty J (2021) Detection of shilling attack in recommender system for YouTube video statistics using machine learning techniques. Soft Comput. https:\/\/doi.org\/10.1007\/s00500-021-05586-8","journal-title":"Soft Comput"},{"key":"1906_CR205","doi-asserted-by":"publisher","unstructured":"Tejeda-Lorente A, Bernabe-Moreno J, Herce-Zelaya J, Porcel C, Herrera-Viedma E (2018). Adapting recommender systems to the new data privacy regulations. https:\/\/doi.org\/10.3233\/978-1-61499-900-3-373","DOI":"10.3233\/978-1-61499-900-3-373"},{"issue":"12","key":"1906_CR206","doi-asserted-by":"publisher","first-page":"557","DOI":"10.1038\/s42256-019-0109-1","volume":"1","author":"M Taddeo","year":"2019","unstructured":"Taddeo M, McCutcheon T, Floridi L (2019) Trusting artificial intelligence in cybersecurity is a double-edged sword. Nat Mach Intell 1(12):557\u2013560. https:\/\/doi.org\/10.1038\/s42256-019-0109-1","journal-title":"Nat Mach Intell"},{"key":"1906_CR207","unstructured":"Government Technology (2021) Proactive vs. reactive cybersecurity. Government Technology. http:\/\/govtech.com\/sponsored\/proactive-vs-reactive-cybersecurity. Accessed 10 Aug 2021"},{"key":"1906_CR208","unstructured":"Deloitte (2021) Impact of COVID-19 on cybersecurity. Deloitte. https:\/\/www2.deloitte.com\/ch\/en\/pages\/risk\/articles\/impact-covid-cybersecurity.html. Accessed 10 Aug 2021"}],"container-title":["Knowledge and Information Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10115-023-01906-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10115-023-01906-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10115-023-01906-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,30]],"date-time":"2023-09-30T19:10:00Z","timestamp":1696101000000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10115-023-01906-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,6,5]]},"references-count":208,"journal-issue":{"issue":"12","published-print":{"date-parts":[[2023,12]]}},"alternative-id":["1906"],"URL":"https:\/\/doi.org\/10.1007\/s10115-023-01906-6","relation":{},"ISSN":["0219-1377","0219-3116"],"issn-type":[{"value":"0219-1377","type":"print"},{"value":"0219-3116","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,6,5]]},"assertion":[{"value":"10 November 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 May 2023","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 May 2023","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 June 2023","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}