Methods, systems, and media for detecting covert malware

BM Bowen, PV Prabhu, VP Kemerlis… - US Patent …, 2013 - Google Patents
Methods, systems, and media for detecting covert malware are provided. In accordance with
some embodiments, a method for detecting covert malware in a computing environ ment is …

Methods, systems, and media for baiting inside attackers

SJ Stolfo, AD Keromytis, BM Bowen… - US Patent …, 2015 - Google Patents
2009-12-05 Assigned to THE TRUSTEES OF COLUMBIA UNIVERSITY IN THE CITY OF
NEW YORK reassignment THE TRUSTEES OF COLUMBIA UNIVERSITY IN THE CITY OF …

Methods, systems, and media for masquerade attack detection by monitoring computer user behavior

SJ Stolfo, MB Salem, S Hershkop - US Patent 8,769,684, 2014 - Google Patents
Methods, systems, and media for masquerade attack detec tion by monitoring computer user
behavior are provided. In accordance with some embodiments, a method for detecting …

Random walks on the click graph

N Craswell, M Szummer - Proceedings of the 30th annual international …, 2007 - dl.acm.org
Search engines can record which documents were clicked for which query, and use these
query-document pairs as" soft" relevance judgments. However, compared to the true …

Mining query logs: Turning search usage data into knowledge

F Silvestri - Foundations and Trends® in Information …, 2009 - nowpublishers.com
Web search engines have stored in their logs information about users since they started to
operate. This information often serves many purposes. The primary focus of this survey is on …

Systems, methods, and media for generating bait information for trap-based defenses

AD Keromytis, SJ Stolfo - US Patent 8,819,825, 2014 - Google Patents
Systems, methods, and media for generating bait information for trap-based defenses are
provided. In some embodiments, methods for generating bait information for trap-based …

Characterizing and forecasting user engagement with in-app action graph: A case study of snapchat

Y Liu, X Shi, L Pierce, X Ren - Proceedings of the 25th ACM SIGKDD …, 2019 - dl.acm.org
While mobile social apps have become increasingly important in people's daily life, we have
limited understanding on what motivates users to engage with these apps. In this paper, we …

A large scale study of European mobile search behaviour

K Church, B Smyth, K Bradley, P Cotter - Proceedings of the 10th …, 2008 - dl.acm.org
Recent evidence suggests that mobile search is becoming an increasingly important way for
mobile users to gain access to online information, especially as off-portal content continues …

[HTML][HTML] A survey on user profiling model for anomaly detection in cyberspace

AH Lashkari, M Chen… - Journal of Cyber …, 2019 - journals.riverpublishers.com
In the face of escalating global Cybersecurity threats, having an automated forewarning
system that can find suspicious user profiles is paramount. It can work as a prevention …

Characterizing typical and atypical user sessions in clickstreams

N Sadagopan, J Li - Proceedings of the 17th international conference on …, 2008 - dl.acm.org
Millions of users retrieve information from the Internet using search engines. Mining these
user sessions can provide valuable information about the quality of user experience and the …