Automatic text processing: the transformation, analysis, and retrieval of information by computer
Automatic text processing: the transformation, analysis, and retrieval of information by computer
Understanding and Using Context
Personal and Ubiquitous Computing
Mobile Recommendation Systems for Decision Making "On the Go"
ICMB '05 Proceedings of the International Conference on Mobile Business
Acquiring and Revising Preferences in a Critique-Based Mobile Recommender System
IEEE Intelligent Systems
Activity theory for designing mobile learning
International Journal of Mobile Learning and Organisation
Ubiquitous Recommendation Systems
Computer
SRRS: a recommendation system for security requirements
Proceedings of the 2008 international workshop on Recommendation systems for software engineering
Scalable architecture for context-aware activity-detecting mobile recommendation systems
WOWMOM '08 Proceedings of the 2008 International Symposium on a World of Wireless, Mobile and Multimedia Networks
Strategies for Effective Shilling Attacks against Recommender Systems
Privacy, Security, and Trust in KDD
Towards shrink-wrapped security: A taxonomy of security-relevant context
PERCOM '09 Proceedings of the 2009 IEEE International Conference on Pervasive Computing and Communications
A Survey of Security Middleware for Pervasive and Ubiquitous Systems
NBIS '09 Proceedings of the 2009 International Conference on Network-Based Information Systems
Hybrid web recommender systems
The adaptive web
Privacy-preserving collaborative recommender systems
IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews
A Collaborative Recommender System Based on Space-Time Similarities
IEEE Pervasive Computing
Hi-index | 0.00 |
Mobile devices using traditional authentication processes are vulnerable and inadequate. New approaches must be considered for solving this problem: environmental characteristics, device limitations and information obtained from sensors. This paper presents a recommendation system approach for information systems based on user behavior and information context in which the users are located. The recommendation system has been defined and deployed through filtering processes (content-based, collaborative and hybrid). The behavior is defined by the events and the actions that comprise the user activities. The experimental results indicate: (i) a more dynamic and autonomic mechanism for authenticating users in a pervasive mobile environment, and (ii) an efficiency improvement in detecting anomalies on authentication by using a similarity model and space-time permutation.