IEEE Intelligent Systems

Issue 5 • Sept.-Oct. 2016

Filter Results

Displaying Results 1 - 23 of 23
  • Front Cover 
  • Front Cover

    Publication Year: 2016, Page(s): c1
    Request permission for commercial reuse | |PDF file iconPDF (1920 KB)
    Freely Available from IEEE
  • House Advertisement 
  • Rock Stars of Pervasive, Predictive Analytics

    Publication Year: 2016, Page(s): c2
    Request permission for commercial reuse | |PDF file iconPDF (1885 KB)
    Freely Available from IEEE
  • Table of Contents 
  • Table of Contents

    Publication Year: 2016, Page(s):1 - 2
    Request permission for commercial reuse | |PDF file iconPDF (356 KB)
    Freely Available from IEEE
  • Guest Editors' Introduction 
  • Intelligent Cybersecurity Agents [Guest editors' introduction]

    Publication Year: 2016, Page(s):3 - 7
    Cited by:  Papers (1)
    Request permission for commercial reuse | |PDF file iconPDF (2089 KB) | HTML iconHTML
    Freely Available from IEEE
  • Intelligent Cybersecurity Agents 
  • Revani: Revising and Verifying Normative Specifications for Privacy

    Publication Year: 2016, Page(s):8 - 15
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (1088 KB) | HTML iconHTML

    Privacy remains a major challenge today, partly because it brings together social and technical considerations. Yet, current software engineering focuses only on the technical aspects. In contrast, the authors' approach, Revani, understands privacy from the standpoint of sociotechnical systems (STSs), with particular attention on the social elements of STSs. They specify STSs via a combination of ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Using Behavioral Similarity for Botnet Command-and-Control Discovery

    Publication Year: 2016, Page(s):16 - 22
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (1004 KB) | HTML iconHTML

    Malware authors and operators typically collaborate to achieve the optimal profit. They also frequently change their behavior and resources to avoid detection. The authors propose a social similarity metrics that exploits these relationships to improve the effectiveness and stability of the threat propagation algorithm typically used to discover malicious collaboration. Furthermore, they propose b... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • House Advertisement 
  • IEEE Computer Society

    Publication Year: 2016, Page(s): 23
    Request permission for commercial reuse | |PDF file iconPDF (63 KB)
    Freely Available from IEEE
  • Intelligent Cybersecurity Agents 
  • Case Studies of Network Defense with Attack Graph Games

    Publication Year: 2016, Page(s):24 - 30
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (1086 KB) | HTML iconHTML

    The increasing complexity of securing modern computer networks makes decision support systems an important tool for administrators. A challenge many existing tools fail to address is that attackers react strategically to new security measures, adapting their behaviors in response. Game theory provides a methodology for making decisions that takes into account these reactions, rather than assuming ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • House Advertisement 
  • Rock Stars of Software-Defined Environment

    Publication Year: 2016, Page(s): 31
    Request permission for commercial reuse | |PDF file iconPDF (453 KB)
    Freely Available from IEEE
  • Online Behavioral Analysis 
  • Online Behavioral Analysis with Application to Emotion State Identification

    Publication Year: 2016, Page(s):32 - 39
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (588 KB) | HTML iconHTML

    A novel discriminative model for online behavioral analysis with application to emotion state identification can extract discriminative characteristics from behavioral data and find the direction of optimal projection, leading to better utilization of behavioral information to produce more accurate recognition results. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Recommender Systems 
  • A Social Influence Approach for Group User Modeling in Group Recommendation Systems

    Publication Year: 2016, Page(s):40 - 48
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (518 KB) | HTML iconHTML

    While many studies on typical recommender systems focus on making recommendations to individual users, social activities usually involve groups of users. Issues related to group recommendations are increasingly becoming hot research topics. Among the differences between individual and group recommender systems, the most significant is social factors of group users. Social factors, including person... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • House Advertisement 
  • Rock Stars of Cybersecurity

    Publication Year: 2016, Page(s): 49
    Request permission for commercial reuse | |PDF file iconPDF (1000 KB)
    Freely Available from IEEE
  • Text Mining 
  • Ordinal Classification of Imbalanced Data with Application in Emergency and Disaster Information Services

    Publication Year: 2016, Page(s):50 - 56
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (515 KB) | HTML iconHTML

    Previous ordinal classification methods implicitly assume that the class distribution within a dataset is balanced, which is often not the case for real-world datasets. If the dataset is imbalanced, the previous methods tend to be biased toward the majority class. The authors propose a new method for ordinal classification that attempts to mitigate the impact of imbalanced datasets. They propose a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • House Advertisement 
  • IEEE Computer Society 2016 Call for Major Award Nominations

    Publication Year: 2016, Page(s): 57
    Request permission for commercial reuse | |PDF file iconPDF (220 KB)
    Freely Available from IEEE
  • Behavioral Modeling 
  • DNA-Inspired Online Behavioral Modeling and Its Application to Spambot Detection

    Publication Year: 2016, Page(s):58 - 64
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (1151 KB) | HTML iconHTML

    A novel, simple, and effective approach to modeling online user behavior extracts and analyzes digital DNA sequences from user online actions and uses Twitter as a benchmark to test the proposal. Specifically, the model obtains an incisive and compact DNA-inspired characterization of user actions. Then, standard DNA analysis techniques discriminate between genuine and spambot accounts on Twitter. ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • House Advertisement 
  • 2017 Richard E. Merwin Award for Distinguished Service

    Publication Year: 2016, Page(s): 65
    Request permission for commercial reuse | |PDF file iconPDF (6614 KB)
    Freely Available from IEEE
  • Expert Opinion 
  • Data Science: Nature and Pitfalls

    Publication Year: 2016, Page(s):66 - 75
    Cited by:  Papers (1)
    Request permission for commercial reuse | |PDF file iconPDF (824 KB) | HTML iconHTML
    Freely Available from IEEE
  • Human-Centered Computing 
  • Bridging the Ethical Gap: From Human Principles to Robot Instructions

    Publication Year: 2016, Page(s):76 - 82
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (1110 KB) | HTML iconHTML

    Asimov's three laws of robotics and the Murphy-Woods alternative laws assume that a robot has the cognitive ability to make moral decisions, and fail to escape the myth of self-sufficiency. But ethical decision making on the part of robots in human-robot interaction is grounded on the interdependence of human and machine. Furthermore, the proposed laws are high-level principles that cannot easily ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Internet of Things 
  • Building the Web of Knowledge with Smart IoT Applications

    Publication Year: 2016, Page(s):83 - 88
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (942 KB) | HTML iconHTML

    This column discusses the benefits of using Semantic Web technologies to get meaningful knowledge from sensor data. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • AI in Government 
  • Linked Open Cube Analytics Systems: Potential and Challenges

    Publication Year: 2016, Page(s):89 - 92
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (1231 KB) | HTML iconHTML

    Linked Open Cube Analytics (LOCA) systems enable the performance of analytics on top of multiple open statistical data (OSD) that reside in disparate portals. We present OSD's potential and highlight the problems hampering its integration and reuse. To overcome these problems, we introduce an approach for OSD integration. The proposed approach capitalizes on the data cube model and linked data tec... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • AI and Sustainability 
  • Incorporating Sustainability into Computing Education

    Publication Year: 2016, Page(s):93 - 96
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (1382 KB) | HTML iconHTML

    This column provides a survey of the educational resources and courses offered that integrate sustainability into computer science curricula at colleges and universities. The authors also discuss possible future avenues for the field of computational sustainability. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Back Covers 
  • Achieve your career goals with the fit that's right for you

    Publication Year: 2016, Page(s): c3
    Request permission for commercial reuse | |PDF file iconPDF (175 KB)
    Freely Available from IEEE
  • IEEE Computer Society: Be at the Center of It All

    Publication Year: 2016, Page(s): c4
    Request permission for commercial reuse | |PDF file iconPDF (56 KB)
    Freely Available from IEEE

Aims & Scope

IEEE Intelligent Systems serves users, managers, developers, researchers, and purchasers who are interested in intelligent systems and artificial intelligence, with particular emphasis on applications.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Daniel Zeng
University of Arizona