Methods, systems, and media for masquerade attack detec tion by monitoring computer user behavior are provided. In accordance with some embodiments, a method for detecting …
N Craswell, M Szummer - Proceedings of the 30th annual international …, 2007 - dl.acm.org
Search engines can record which documents were clicked for which query, and use these query-document pairs as" soft" relevance judgments. However, compared to the true …
F Silvestri - Foundations and Trends® in Information …, 2009 - nowpublishers.com
Web search engines have stored in their logs information about users since they started to operate. This information often serves many purposes. The primary focus of this survey is on …
Systems, methods, and media for generating bait information for trap-based defenses are provided. In some embodiments, methods for generating bait information for trap-based …
Y Liu, X Shi, L Pierce, X Ren - Proceedings of the 25th ACM SIGKDD …, 2019 - dl.acm.org
While mobile social apps have become increasingly important in people's daily life, we have limited understanding on what motivates users to engage with these apps. In this paper, we …
K Church, B Smyth, K Bradley, P Cotter - Proceedings of the 10th …, 2008 - dl.acm.org
Recent evidence suggests that mobile search is becoming an increasingly important way for mobile users to gain access to online information, especially as off-portal content continues …
AH Lashkari, M Chen… - Journal of Cyber …, 2019 - journals.riverpublishers.com
In the face of escalating global Cybersecurity threats, having an automated forewarning system that can find suspicious user profiles is paramount. It can work as a prevention …
N Sadagopan, J Li - Proceedings of the 17th international conference on …, 2008 - dl.acm.org
Millions of users retrieve information from the Internet using search engines. Mining these user sessions can provide valuable information about the quality of user experience and the …