A Systematic Review of Recommender Systems and Their Applications in Cybersecurity

被引:30
作者
Pawlicka, Aleksandra [1 ]
Pawlicki, Marek [1 ]
Kozik, Rafal [1 ]
Choras, Ryszard S. [2 ]
机构
[1] ITTI Sp Zoo, Rubiez 46, PL-61612 Poznan, Poland
[2] UTP Univ Sci & Technol, Inst Telecommun & Comp Sci, PL-85796 Bydgoszcz, Poland
关键词
recommender systems; collaborative filtering; cybersecurity;
D O I
10.3390/s21155248
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
This paper discusses the valuable role recommender systems may play in cybersecurity. First, a comprehensive presentation of recommender system types is presented, as well as their advantages and disadvantages, possible applications and security concerns. Then, the paper collects and presents the state of the art concerning the use of recommender systems in cybersecurity; both the existing solutions and future ideas are presented. The contribution of this paper is two-fold: to date, to the best of our knowledge, there has been no work collecting the applications of recommenders for cybersecurity. Moreover, this paper attempts to complete a comprehensive survey of recommender types, after noticing that other works usually mention two-three types at once and neglect the others.
引用
收藏
页数:25
相关论文
共 97 条
[81]   Two Decades of Recommender Systems at Amazon.com [J].
Smith, Brent ;
Linden, Greg .
IEEE INTERNET COMPUTING, 2017, 21 (03) :12-18
[82]  
Smyth B., 2007, The Adaptive Web. Methods and Strategies of Web Personalization, P342
[83]  
Soldo F., 2010, INFOCOM 2010 P IEEE, P1
[84]  
Song Qin, 2010, Proceedings of the 2010 IEEE Second International Conference on Social Computing (SocialCom 2010). the Second IEEE International Conference on Privacy, Security, Risk and Trust (PASSAT 2010), P323, DOI 10.1109/SocialCom.2010.53
[85]  
Stark B, 2017, 2017 2ND IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND APPLICATIONS (ICCIA), P382, DOI 10.1109/CIAPP.2017.8167244
[86]  
Sula E, 2019, THESIS U ZURICH ZURI
[87]  
Tran T., 2000, Knowledge-Based Electronic Markets. Papers from the AAAI Workshop (Technical Report WS-00-04), P78
[88]   Security Operations Center: A Systematic Study and Open Challenges [J].
Vielberth, Manfred ;
Boehm, Fabian ;
Fichtinger, Ines ;
Pernul, Guenther .
IEEE ACCESS, 2020, 8 :227756-227779
[89]  
Wang J., 2006, Proceedings of the Twenty-Ninth Annual International ACM SIGIR Conference on Research and Development in Information Retrieval, P501, DOI 10.1145/1148170.1148257
[90]  
Wang J., 2015, Recommender systems and their security concerns