Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- articleDecember 2024
Semantic Web Approaches in Stack Overflow: Research Trends and Technological Insights
International Journal on Semantic Web & Information Systems (IJSWIS-IGI), Volume 20, Issue 1Pages 1–61https://doi.org/10.4018/IJSWIS.358617StackOverflow (SO), a prominent question-answering site for programming, has amassed a vast repository of user-generated content since its inception in 2008. This paper conducts a thorough analysis of research trends on SO, examining 170 publications ...
- research-articleJune 2024
A Threat-Led Approach to Mitigating Ransomware Attacks: Insights from a Comprehensive Analysis of the Ransomware Ecosystem
EICC '24: Proceedings of the 2024 European Interdisciplinary Cybersecurity ConferencePages 210–216https://doi.org/10.1145/3655693.3661321Ransomware attacks have become a major threat to organizations across all sectors, causing significant financial and reputational damage. To address this challenge, this contribution presents a threat-led approach to mitigating ransomware attacks, based ...
- articleJuly 2024
Security of federated learning in 6G era: A review on conceptual techniques and software platforms used for research and analysis
Computer Networks: The International Journal of Computer and Telecommunications Networking (CNTW), Volume 245, Issue Chttps://doi.org/10.1016/j.comnet.2024.110358AbstractFederated Learning (FL) is an emerging Artificial Intelligence (AI) paradigm enabling multiple parties to train a model collaboratively without sharing their data. With the upcoming Sixth Generation (6 G) era, FL is expected to adopt a more ...
- review-articleJune 2024
The Metaverse digital environments: A scoping review of the techniques, technologies, and applications
- Muhammad Tukur,
- Jens Schneider,
- Mowafa Househ,
- Ahmed Haruna Dokoro,
- Usman Idris Ismail,
- Muhammad Dawaki,
- Marco Agus
Journal of King Saud University - Computer and Information Sciences (JKSUCIS), Volume 36, Issue 2https://doi.org/10.1016/j.jksuci.2024.101967AbstractThe “metaverse” has gained immense attention as the next internet frontier, holding significant economic implications, especially for the IT sector. To establish the groundwork for immersive metaverse spaces, our comprehensive scoping review ...
- research-articleDecember 2023
Features, techniques and evaluation in predicting articles’ citations: a review from years 2010–2023
AbstractRobust findings of citations have a positive impact on researchers and significantly contribute to academic development. As a paper is cited more frequently or used as a reference in other articles, its citation count increases. Papers with higher ...
-
- research-articleFebruary 2023
Explainable AI: To Reveal the Logic of Black-Box Models
New Generation Computing (NEWG), Volume 42, Issue 1Pages 53–87https://doi.org/10.1007/s00354-022-00201-2AbstractArtificial intelligence (AI) is continuously evolving; however, in the last 10 years, it has gotten considerably more difficult to explain AI models. With the help of explanations, end users can understand the outcomes generated by AI models. The ...
- research-articleDecember 2022
Guidelines adopted by agile teams in privacy requirements elicitation after the Brazilian general data protection law (LGPD) implementation
- Edna Dias Canedo,
- Angelica Toffano Seidel Calazans,
- Ian Nery Bandeira,
- Pedro Henrique Teixeira Costa,
- Eloisa Toffano Seidel Masson
Requirements Engineering (REQE), Volume 27, Issue 4Pages 545–567https://doi.org/10.1007/s00766-022-00391-7AbstractThe Brazilian General Data Protection Law (LGPD) implementation has impacted activities carried out by the software development teams. Due to it, developers had to become aware of the existing techniques and tools to carry out privacy requirements ...
- research-articleJuly 2022
Deep Learning for Weakly-Supervised Object Detection and Localization: A Survey
Neurocomputing (NEUROC), Volume 496, Issue CPages 192–207https://doi.org/10.1016/j.neucom.2022.01.095AbstractWeakly-Supervised Object Detection (WSOD) and Localization (WSOL), i.e., detecting multiple and single instances with bounding boxes in an image using image-level labels, are long-standing and challenging tasks in object detection. ...
- research-articleJune 2022
Privacy requirements elicitation: a systematic literature review and perception analysis of IT practitioners
- Edna Dias Canedo,
- Ian Nery Bandeira,
- Angelica Toffano Seidel Calazans,
- Pedro Henrique Teixeira Costa,
- Emille Catarine Rodrigues Cançado,
- Rodrigo Bonifácio
Requirements Engineering (REQE), Volume 28, Issue 2Pages 177–194https://doi.org/10.1007/s00766-022-00382-8AbstractDuring the software development process and throughout the software lifecycle, organizations must guarantee users’ privacy by protecting personal data. There are several studies in the literature proposing methodologies, techniques, and tools for ...
- research-articleMay 2022
Similarity measures in automated essay scoring systems: A ten-year review
Education and Information Technologies (KLU-EAIT), Volume 27, Issue 4Pages 5573–5604https://doi.org/10.1007/s10639-021-10838-zAbstractIn automated essay scoring (AES) systems, similarity techniques are used to compute the score for student answers. Several methods to compute similarity have emerged over the years. However, only a few of them have been widely used in the AES ...
- review-articleNovember 2021
A survey on different approaches for software test case prioritization
Journal of King Saud University - Computer and Information Sciences (JKSUCIS), Volume 33, Issue 9Pages 1041–1054https://doi.org/10.1016/j.jksuci.2018.09.005AbstractTesting is the process of evaluating a system by manual or automated means. While Regression Test Selection (RTS) discards test cases and Test Suite Minimization (TSM) shows diminution in fault detection rate, Test Case Prioritization (...
- research-articleDecember 2020
Research on Theory and Practice of Financial Frauds
ICEBI '20: Proceedings of the 2020 4th International Conference on E-Business and InternetPages 61–65https://doi.org/10.1145/3436209.3436380With the expansion of the Chinese securities market and the gradual standardization, a large number of financial frauds have been exposed. This has become a serious problem in the development of Chinese securities market, and must be paid sufficient ...
- research-articleOctober 2020
A review on face recognition systems: recent approaches and challenges
Multimedia Tools and Applications (MTAA), Volume 79, Issue 37-38Pages 27891–27922https://doi.org/10.1007/s11042-020-09261-2AbstractFace recognition is an efficient technique and one of the most preferred biometric modalities for the identification and verification of individuals as compared to voice, fingerprint, iris, retina eye scan, gait, ear and hand geometry. This has ...
- research-articleMarch 2019
Integrating the Escaping Technique in Preventing Cross Site Scripting in an Online Inventory System
ICISS '19: Proceedings of the 2nd International Conference on Information Science and SystemsPages 110–114https://doi.org/10.1145/3322645.3322696This paper discusses the implementation of the Escaping Technique in an Online Inventory System to prevent the Cross Site Scripting (XSS) attack. It also covers discussion about XSS described as a kind of injection attack that injects malicious scripts ...
- articleSeptember 2018
Data Mining Algorithms and Techniques in Mental Health: A Systematic Review
- Susel Góngora Alonso,
- Isabel Torre-Díez,
- Sofiane Hamrioui,
- Miguel López-Coronado,
- Diego Calvo Barreno,
- Lola Morón Nozaleda,
- Manuel Franco
Journal of Medical Systems (JMSY), Volume 42, Issue 9Pages 1–15https://doi.org/10.1007/s10916-018-1018-2Data Mining in medicine is an emerging field of great importance to provide a prognosis and deeper understanding of disease classification, specifically in Mental Health areas. The main objective of this paper is to present a review of the existing ...
- articleJanuary 2018
Systematic Literature Reviews in Social Sciences and Humanities: A Case Study
Journal of Information Technology Research (JITR-IGI), Volume 11, Issue 1Pages 1–17https://doi.org/10.4018/JITR.2018010101The objective of this article is to analyze the factors that may influence the results t of a systematic literature review SLR in Social Sciences and Humanities. It is a case study focused on the analysis of a SLR centered on reading research and ...
- articleNovember 2017
A Systematic Review of Techniques and Sources of Big Data in the Healthcare Sector
Journal of Medical Systems (JMSY), Volume 41, Issue 11Pages 1–9https://doi.org/10.1007/s10916-017-0832-2The main objective of this paper is to present a review of existing researches in the literature, referring to Big Data sources and techniques in health sector and to identify which of these techniques are the most used in the prediction of chronic ...
- research-articleJune 2017
Hybrid control of the three phase induction machine using artificial neural networks and fuzzy logic
Applied Soft Computing (APSC), Volume 55, Issue CPages 289–301https://doi.org/10.1016/j.asoc.2017.01.048Display Omitted An hybrid approach for vector control of the three-phase induction motor is proposed.The proposed approach combines in a different manner that existing in literature the two techniques: the artificial neuronal network (ANN) and the fuzzy ...
- articleJanuary 2017
An Empirical Analysis of Web Navigation Prediction Techniques
Journal of Cases on Information Technology (JCIT-IGI), Volume 19, Issue 1Pages 1–14https://doi.org/10.4018/jcit.2017010101With the advancement of Information Technology, web is growing rapidly and it has became necessary part of our daily lives. It is mandate to study the navigation behavior of the user to improve the quality of web site design for personalization and ...