{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T06:17:25Z","timestamp":1725603445031},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642242083"},{"type":"electronic","value":"9783642242090"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-24209-0_18","type":"book-chapter","created":{"date-parts":[[2011,8,29]],"date-time":"2011-08-29T00:37:43Z","timestamp":1314578263000},"page":"266-277","source":"Crossref","is-referenced-by-count":1,"title":["Secure Personalized Recommendation System for Mobile User"],"prefix":"10.1007","author":[{"given":"Soe Yu","family":"Maw","sequence":"first","affiliation":[]}],"member":"297","reference":[{"issue":"5","key":"18_CR1","doi-asserted-by":"publisher","first-page":"307","DOI":"10.1007\/s10207-007-0049-3","volume":"7","author":"E. A\u00efmeur","year":"2008","unstructured":"A\u00efmeur, E., Brassard, G., Fernandez, J.M., Onana, F.S.M.: Alambic: A Privacy-Preserving Recommender System for Electronic Commerce. International Journal of Information Security\u00a07(5), 307\u2013334 (2008)","journal-title":"International Journal of Information Security"},{"key":"18_CR2","unstructured":"Burke, R., Mobasher, B., Zabicki, R., Bhaumik, R.: Identifying Attack Models for Secure Recommendation. In: Beyond Personalization: A Workshop on the Next Generation of Recommender Systems, San Diego, California (2005)"},{"key":"18_CR3","unstructured":"Cheng, Z., Hurley, N.: Analysis of Robustness in Trust-based Recommender Systems. In: RIAO 2010, Paris, France, Copyright CID (2010)"},{"issue":"12","key":"18_CR4","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1145\/138859.138867","volume":"35","author":"D. Goldberg","year":"1992","unstructured":"Goldberg, D., Nichols, D., Oki, B., Terry, D.: Using Collaborative Filtering to Weave an Information Tapestry. ACM\u00a035(12), 61\u201370 (1992)","journal-title":"ACM"},{"key":"18_CR5","doi-asserted-by":"crossref","unstructured":"Lam, S.K., Riedl, J.: Shilling Recommender Systems for Fun and Profit. In: 13th International World Wide Web Conference (WWW 2004), New York, NY, USA, pp. 393\u2013402 (2004)","DOI":"10.1145\/988672.988726"},{"key":"18_CR6","doi-asserted-by":"publisher","first-page":"157","DOI":"10.3727\/1098305031436980","volume":"6","author":"S. Loh","year":"2004","unstructured":"Loh, S., Lorenzi, F., Saldana, R., Licthnow, D.: A Tourism Recommender System based on Collaboration and Text Analysis. Information Technology & Tourism\u00a06, 157\u2013165 (2004)","journal-title":"Information Technology & Tourism"},{"key":"18_CR7","first-page":"2722","volume-title":"Information Science Reference","author":"S.Y. Maw","year":"2008","unstructured":"Maw, S.Y., Thein, N.L.: Multi-Agent Mobile Tourism System. Encyclopedia of Information Science and Technology. In: Information Science Reference, 2nd edn., vol.\u00a0VI (Mu-Q), pp. 2722\u20132727. IGI Global Publishing, Hershey (2008)","edition":"2"},{"key":"18_CR8","doi-asserted-by":"crossref","unstructured":"Maw, S.Y., Naing, M.-M., Thein, N.L.: RPCF Algorithm for Multi-Agent Tourism System. In: IEEE International Symposium on Micro-NanoMachatronics and Human Science (MHS 2006), Nagoya, Japan, pp. 533\u2013538 (2006)","DOI":"10.1109\/MHS.2006.320233"},{"key":"18_CR9","series-title":"Ch. XV","first-page":"289","volume-title":"Social Information Retrieval System: Emerging Technologies and Applications for Searching the Web Effectively","author":"S.Y. Maw","year":"2007","unstructured":"Maw, S.Y., Naing, M.-M.: Multi-Agent Tourism System (MATS). In: Social Information Retrieval System: Emerging Technologies and Applications for Searching the Web Effectively. Ch. XV, pp. 289\u2013310. IGI Global Publishing, Hershey (2007)"},{"key":"18_CR10","unstructured":"Mobasher, B., Burke, R., Bhaumik, R., Williams, C.: Effective Attack Models for Shilling Item-based Collaborative Filtering Systems. In: WebKDD Workshop (2005)"},{"issue":"3","key":"18_CR11","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1109\/MIS.2007.45","volume":"22","author":"B. Mobasher","year":"2007","unstructured":"Mobasher, B., Burke, R., Bhaumik, R., Sandvig, J.: Attacks and Remedies in Collaborative Recommendation. IEEE Intelligent Systems\u00a022(3), 56\u201363 (2007)","journal-title":"IEEE Intelligent Systems"},{"key":"18_CR12","doi-asserted-by":"publisher","first-page":"167","DOI":"10.1145\/1040830.1040870","volume-title":"10th International Conference on Intelligent User Interfaces (IUI 2005)","author":"J. O\u2019Donovan","year":"2005","unstructured":"O\u2019Donovan, J., Smyth, B.: Trust in Recommender Systems. In: 10th International Conference on Intelligent User Interfaces (IUI 2005), pp. 167\u2013174. ACM Press, San Diego (2005)"},{"key":"18_CR13","unstructured":"Quan, Q., Hinze, A.: Trust-based Recommendations for Mobile Tourists in TIP. Working Paper: 13\/2008, Hamilton, New Zealand (2008)"},{"key":"18_CR14","series-title":"Ch. 00338","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-0-387-30164-8","volume-title":"Encyclopedia of Machine Learning","author":"C. Sammut","year":"2010","unstructured":"Sammut, C., Webb, G.: Encyclopedia of Machine Learning. Ch. 00338, pp. 1\u20139. Springer, Heidelberg (2010)"},{"key":"18_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"88","DOI":"10.1007\/978-3-540-74573-0_10","volume-title":"Network-Based Information Systems","author":"T. Shon","year":"2007","unstructured":"Shon, T., Choi, W.: An Analysis of Mobile WiMAX Security: Vulnerabilities and Solutions. In: Enokido, T., Barolli, L., Takizawa, M. (eds.) NBiS 2007. LNCS, vol.\u00a04658, pp. 88\u201397. Springer, Heidelberg (2007)"},{"key":"18_CR16","unstructured":"Web site personalization, \n \n http:\/\/www.128.ibm.com\/developerworks\/websphere\/library\/techarticles\/hipods\/personalize.html"},{"key":"18_CR17","unstructured":"Williams, C., Bhaumik, R., Burke, R., Mobasher, B.: The Impact of Attack Profile Classification on the Robustness of Collaborative Recommendation. In: WebKDD Workshop, ACM SIGKDD Conference on Data Mining and Knowledge Discovery (KDD 2006), Philadelphia (2006)"}],"container-title":["Lecture Notes in Computer Science","Information Security and Cryptology - ICISC 2010"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-24209-0_18","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,1]],"date-time":"2019-04-01T09:36:26Z","timestamp":1554111386000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-24209-0_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642242083","9783642242090"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-24209-0_18","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2011]]}}}