Filters








875 Hits in 7.1 sec

Leveraging Site Search Logs to Identify Missing Content on Enterprise Webpages [chapter]

Harsh Jhamtani, Rishiraj Saha Roy, Niyati Chhaya, Eric Nyberg
2017 Lecture Notes in Computer Science  
(w,q) tuples with e ij > δ are missing content tuples.  ...  Phase 1 (Figure 1) -We make the following assumption for navigation scenario: Distribution of queries will be independent of referral webpage i.e. P(Q=q|w) = P(Q=q).  ...  Use content / link to the inferred webpage(s) -Missing content on site: Topics for author to write about -Unsatisfactorily present content: Leverage clickthrough data as described earlier Phase 2(Figure  ... 
doi:10.1007/978-3-319-56608-5_41 fatcat:sbe5sjs5mjeaxcmqixvlwx2uzu

WeBrowse: Mining HTTP logs online for network-based content recommendation [article]

Giuseppe Scavo, Zied Ben Houidi, Stefano Traverso, Renata Teixeira, Marco Mellia
2016 arXiv   pre-print
To counter this effect, we propose passive crowdsourced content discovery, an approach that leverages the passive observation of web-clicks as an indication of users' interest in a piece of content.  ...  Evaluation based on our deployments shows the feasibility of our approach. The majority of WeBrowse's users welcome the quality of content it promotes.  ...  To detect candidate-URLs, we leverage the presence of social buttons in a webpage, since it is an explicit indication that a user may want to share its content.  ... 
arXiv:1602.06678v2 fatcat:rnsihmzx6bcjpczyrzp74q2nwy

Understanding Malvertising Through Ad-Injecting Browser Extensions

Xinyu Xing, Wei Meng, Byoungyoung Lee, Udi Weinsberg, Anmol Sheth, Roberto Perdisci, Wenke Lee
2015 Proceedings of the 24th International Conference on World Wide Web - WWW '15  
Moreover, while some extensions simply serve ads from ad networks that support malvertising, other extensions maliciously alter the content of visited webpages to force users into installing malware.  ...  Malvertising is a malicious activity that leverages advertising to distribute various forms of malware.  ...  Acknowledgments The authors would like to thank the anonymous reviewers and the IBM researcher, Yunhui Zheng, for their help and feedback.  ... 
doi:10.1145/2736277.2741630 dblp:conf/www/XingMLWSPL15 fatcat:igr3vt3tzbcplkkn7h4urxkgca

Acquisitional Rule-based Engine for Discovering Internet-of-Thing Devices

Xuan Feng, Qiang Li, Haining Wang, Limin Sun
2018 USENIX Security Symposium  
to the Proceedings of the 27th USENIX Security Symposium is sponsored by USENIX.  ...  Acknowledgments We are grateful to our shepherd Gang Wang and anonymous reviewers for their insightful feedback.  ...  A recent work [21] leverages honeypot traffic to detect the Miria botnet infections based on unique packet content signatures.  ... 
dblp:conf/uss/Feng0WS18 fatcat:26jzturvdbhzhbxbodj3oxiuza

Social search and discovery using a unified approach

Einat Amitay, David Carmel, Nadav Har'El, Shila Ofek-Koifman, Aya Soffer, Sivan Yogev, Nadav Golbandi
2009 Proceedings of the 18th international conference on World wide web - WWW '09  
We describe a social search engine positioned within a large enterprise, applied over social data gathered from several Web 2.0 applications.  ...  We address a novel solution based on multifaceted search which provides an efficient update mechanism for relations between objects, as well as efficient search over the heterogeneous data.  ...  This system leverages the information gathered from existing Web 2.0 applications in IBM to improve enterprise search.  ... 
doi:10.1145/1526709.1526933 dblp:conf/www/AmitayCHOSYG09 fatcat:frhbqwahqze6raminwqkc6jude

Social search and discovery using a unified approach

Einat Amitay, David Carmel, Nadav Har'El, Shila Ofek-Koifman, Aya Soffer, Sivan Yogev, Nadav Golbandi
2009 Proceedings of the 20th ACM conference on Hypertext and hypermedia - HT '09  
We describe a social search engine positioned within a large enterprise, applied over social data gathered from several Web 2.0 applications.  ...  We address a novel solution based on multifaceted search which provides an efficient update mechanism for relations between objects, as well as efficient search over the heterogeneous data.  ...  This system leverages the information gathered from existing Web 2.0 applications in IBM to improve enterprise search.  ... 
doi:10.1145/1557914.1557950 dblp:conf/ht/AmitayCHOSYG09 fatcat:a42jmjttvvgxtey6w24ypu6qym

Detecting and Characterizing Lateral Phishing at Scale [article]

Grant Ho, Asaf Cidon, Lior Gavish, Marco Schweighauser, Vern Paxson, Stefan Savage, Geoffrey M. Voelker, David Wagner
2019 arXiv   pre-print
In a lateral phishing attack, adversaries leverage a compromised enterprise account to send phishing emails to other users, benefitting from both the implicit trust and the information in the hijacked  ...  Drawing on the attacks we detect, as well as a corpus of user-reported incidents, we quantify the scale of lateral phishing, identify several thematic content and recipient targeting strategies that attackers  ...  As a result, we treat all URLs on content hosting sites as if they reside on unranked domains.  ... 
arXiv:1910.00790v1 fatcat:tl3ixqmlojbutgdakmxqjou5km

"Failures" to be celebrated: an analysis of major pivots of software startups

Sohaib Shahid Bajwa, Xiaofeng Wang, Anh Nguyen Duc, Pekka Abrahamsson
2016 Empirical Software Engineering  
To achieve this, we conducted a case survey study based on the secondary data of the major pivots happened in 49 software startups. 10 pivot types and 14 triggering factors were identified.  ...  Meanwhile it provides practical knowledge to software startups, which they can utilize to guide their effective decisions on pivoting  ...  Apply inclusion/exclusion criteria to Search Results Collection A To select the webpages that contain relevant and reliable content for this study, we applied a set of inclusion/exclusion criteria to Search  ... 
doi:10.1007/s10664-016-9458-0 fatcat:cpyl3d4nkrfmnmucoh6dsykdta

Evolution of diversity and dominance of companies in online activity [article]

Paul X. McCarthy, Xian Gong, Sina Eghbal, Daniel S. Falster, Marian-Andrei Rizoiu
2021 arXiv   pre-print
Lastly, we showcase the linking between economic, financial and market data by exploring the relationships between online attention on social media and the growth in enterprise value in the electric carmaker  ...  dominate each functional market segment, such as search, retail and social media.  ...  We verify our samples' coverage by comparing them to the most popular sites on the web.  ... 
arXiv:2003.07049v2 fatcat:4zftsgdxlzeodpa2sf2pkqgnqy

WebProphet: Automating Performance Prediction for Web Services

Zhichun Li, Ming Zhang, Zhaosheng Zhu, Yan Chen, Albert G. Greenberg, Yi-Min Wang
2010 Symposium on Networked Systems Design and Implementation  
Today, large-scale web services run on complex systems, spanning multiple data centers and content distribution networks, with performance depending on diverse factors in end systems, networks, and infrastructure  ...  WebProphet employs a novel technique based on timing perturbation to extract web object dependencies, and then uses these dependencies to predict the performance impact of changes to the handling of the  ...  WebProphet leverages a novel technique based on timing perturbation to extract object dependencies of complex webpages.  ... 
dblp:conf/nsdi/LiZZCGW10 fatcat:qt7muciqwjah5iqvfbaez66tty

Comparing tagging vocabularies among four enterprise tag-based services

Michael J. Muller
2007 Proceedings of the 2007 international ACM conference on Conference on supporting group work - GROUP '07  
We compare four tagging-based enterprise services, which respectively stored bookmarks to webpages and documents, to people, to blog entries, and to hierarchically-structured activity records.  ...  These results suggest difficulties in combining exploratory searches across multiple social-tagging services.  ...  Some sites offer a list of popular tags; other sites provide type-ahead or auto-complete suggestions as the user is beginning to enter the first few letters of a tag; still other sites remind a user of  ... 
doi:10.1145/1316624.1316676 dblp:conf/group/Muller07 fatcat:atojw6uhdzcc7pzudmcwpxqpo4

Safe Internet Browsing Using a Transparent Virtual Browser

Jeffrey Bickford, Paul Giura
2015 2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing  
Our testing also shows that our prototype only incurs a small initial delay when browsing to a webpage while maintaining a seamless browsing experience for the rest of the browsing session.  ...  Though many organizations are beginning to invest significantly into securing their internal corporate network, users are typically given access to the Internet for web browsing purposes, leaving the enterprise  ...  Moreover, by leveraging the fact that VDI is always connected to the enterprise network, we can guarantee that all the Internet bound requests go through the network proxy regardless of the network that  ... 
doi:10.1109/cscloud.2015.58 dblp:conf/cscloud/BickfordG15 fatcat:xxzcmoxxzvf7phy6l33vk2ywpm

REAL-TIME BROWSING ASSISTANT ON WEB

Syed Tauhid Zuhori, James Miller
2018 IADIS International Journal on WWW/Internet  
To evaluate the system, we provide a user study, case studies and conduct experiments on two datasets to verify the effectiveness of our proposed system.  ...  This system builds a personalized browsing assistant based on the current user request submitted to a web server.  ...  Their approach is based on combined mining of web server logs and the content of the retrieved web pages. They capture the textual content of the web page by extracting the character of N-grams.  ... 
doi:10.33965/ijwi_2018161201 fatcat:kvwzgsyxljeujkxi3y32lhqdkm

Cross-Origin State Inference (COSI) Attacks: Leaking Web Site States through XS-Leaks [article]

Avinash Sudhodanan, Soheil Khodayari, Juan Caballero
2020 arXiv   pre-print
But, those attacks only consider two states (e.g., logged in or not) and focus on a specific browser leak method (or XS-Leak).  ...  We systematically apply our techniques to existing attacks, identifying 40 COSI attack classes. As part of this process, we discover a novel XS-Leak based on window.postMessage.  ...  For example, it may need to chain attack vectors to uniquely distinguish a state, e.g., one to identify if the victim is logged in, and another to identify if a logged victim has a premium account.  ... 
arXiv:1908.02204v2 fatcat:erxo5lnso5fb7l6mdyhfazyuqi

An Epidemiological Study of Malware Encounters in a Large Enterprise

Ting-Fang Yen, Victor Heorhiadi, Alina Oprea, Michael K. Reiter, Ari Juels
2014 Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security - CCS '14  
Our data sets allow us to observe or infer not only malware presence on enterprise computers, but also malware entry points, network locations of the computers (i.e., inside the enterprise network or outside  ...  of malware encounters for this enterprise.  ...  Acknowledgment We are grateful to the anonymous enterprise who permitted us access to their data for the purposes of this study.  ... 
doi:10.1145/2660267.2660330 dblp:conf/ccs/YenHORJ14 fatcat:jqilioqyunffbn3cq22x25zbbi
« Previous Showing results 1 — 15 out of 875 results