The recommendation systems used to form a news feed in social networks or to create recommendation lists on content websites or Internet stores are often exposed to information profile injection attacks. These attacks are aimed at changing ratings, and thus at changing the frequency of appearing in recommendations, certain objects of a system. This can lead to threats to users’ information security and losses of the system owners. There are methods to detect attacks in recommendation systems, but they require permanent repetitive checks of all users’ profiles, which is a rather resource-intensive operation. At the same time, these methods do not contain any proposals as for determining the optimal frequency of attack checks. However, a prop...
Collaborative filtering techniques have been successfully em-ployed in recommender systems in order ...
This paper examines the effect of Recommender Systems in security oriented issues. Currently researc...
The modeling of Web user navigational patterns is a critical component of many Web applications such...
The recommendation systems used to form a news feed in social networks or to create recommendation l...
E-commerce recommender systems are vulnerable to different types of shilling attack where the attack...
Collaborative recommender systems are known to be highly vulnerable to profile injection attacks, at...
Recommender systems are widely used in a variety of scenarios, including online shopping, social net...
Information systems are pervasive in our everyday life. Anyone who is online must deal with the cons...
Nowadays, online services, like e-commerce or streaming services, provide a personalized user experi...
Monitoring security and trust in on-line personalised recommendation systems is now recognised as a ...
Recommendation systems based on collaborative filtering are open by nature, what makes them vulnerab...
Copyright © 2014 Min Gao et al.This is an open access article distributed under the Creative Commons...
Modern information society depends on reliable functionality of information systems infrastructure, ...
Recommender systems are widely used, in social networks and online stores, to overcome the problems ...
With the rapid development of e-business, personalized recommendation has become core competence for...
Collaborative filtering techniques have been successfully em-ployed in recommender systems in order ...
This paper examines the effect of Recommender Systems in security oriented issues. Currently researc...
The modeling of Web user navigational patterns is a critical component of many Web applications such...
The recommendation systems used to form a news feed in social networks or to create recommendation l...
E-commerce recommender systems are vulnerable to different types of shilling attack where the attack...
Collaborative recommender systems are known to be highly vulnerable to profile injection attacks, at...
Recommender systems are widely used in a variety of scenarios, including online shopping, social net...
Information systems are pervasive in our everyday life. Anyone who is online must deal with the cons...
Nowadays, online services, like e-commerce or streaming services, provide a personalized user experi...
Monitoring security and trust in on-line personalised recommendation systems is now recognised as a ...
Recommendation systems based on collaborative filtering are open by nature, what makes them vulnerab...
Copyright © 2014 Min Gao et al.This is an open access article distributed under the Creative Commons...
Modern information society depends on reliable functionality of information systems infrastructure, ...
Recommender systems are widely used, in social networks and online stores, to overcome the problems ...
With the rapid development of e-business, personalized recommendation has become core competence for...
Collaborative filtering techniques have been successfully em-ployed in recommender systems in order ...
This paper examines the effect of Recommender Systems in security oriented issues. Currently researc...
The modeling of Web user navigational patterns is a critical component of many Web applications such...