A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
Probabilistic Visitor Stitching on Cross-Device Web Logs
2017
Proceedings of the 26th International Conference on World Wide Web - WWW '17
However, the independence assumption of the browser features needs to be carefully handled [8] . Dasgupta et al. [8] introduced an alternate clustering method to address the cookie churn problem. ...
Since a cookie is unique to a browser instance (until it gets churned), it does not possess a signal to stitch multiple web logs from the same user. ...
doi:10.1145/3038912.3052711
dblp:conf/www/KimKPKG17
fatcat:4l44ewhv7ncnpc5mravpe6pna4
Tracking and Personalization
[chapter]
2021
Modern Socio-Technical Perspectives on Privacy
Further, they discussed the implications of cookie-churn on privacy and security, along with the utilization of host fingerprinting for improving security. ...
For this reason, LSOs are used to store copies of browser cookies or other unique identifiers. ...
doi:10.1007/978-3-030-82786-1_9
fatcat:au7bgwajqzeffb2cvtgn3ytasy
Digital Paywall Design: Implications for Content Demand and Subscriptions
2020
Management science
cookies, allowing them to consume content as a new user. ...
cookies and consuming content as new users at a higher rate than an average user. ...
doi:10.1287/mnsc.2020.3650
fatcat:3gzu2npfw5ei5aqb4dnqhf4eni
Clicktok: Click Fraud Detection using Traffic Analysis
[article]
2019
arXiv
pre-print
Defenses have matured to overcome some forms of click fraud but are inadequate against the threat of organic click fraud attacks. ...
Thus we can isolate fake-clicks by detecting patterns of click-reuse within ad-network clickstreams with historical behaviour serving as a baseline. ...
Cookies can help address churn issues where a pool of source IP addresses are cycled among many users. ...
arXiv:1903.00733v2
fatcat:erdstadsqfeavol75li5baciue
Clicktok
2019
Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks - WiSec '19
Modern defences have matured to overcome some forms of click fraud but measurement studies have reported that a third of clicks supplied by ad networks could be clickspam. ...
We propose two defences, mimicry and bait-click, which provide clickspam detection with substantially improved results over current approaches. ...
Cookies can help address churn issues where a pool of source IP addresses are cycled among many users. ...
doi:10.1145/3317549.3323407
dblp:conf/wisec/NagarajaS19
fatcat:omfr4yeqwncitdyevna2meapeu
Business Intelligence: Achieving Fineness through Data, Text and Web Mining
2015
International Journal of Computer Applications
Web structure mining WSM -Analyze the traffic flow and site maps of certain sites to explore the movement of the users. Web usage mining WUM -collects browser history, bookmarks, site logs, cookies ...
TM process helps in clustering historical data into predefined semantic categories [11] . ...
doi:10.5120/ijca2015906691
fatcat:2kmzbvfxizh2fdc4f5szyvypvm
Data, Text and Web Mining for Business Intelligence : A Survey
2013
International Journal of Data Mining & Knowledge Management Process
The Information and Communication Technologies revolution brought a digital world with huge amounts of data available. ...
Finally, WUM, which is the mining of log files of web servers, browser generated logs, cookies, bookmarks and scrolls. ...
Finally, WM intended for WUM can collect logs, cookies, bookmarks, and even browsers history and metadata of targeted users. WUM is also used for mining social networks, namely online blogs [33] . ...
doi:10.5121/ijdkp.2013.3201
fatcat:urjcxelt7vbvzfmt2ynmenlc5u
Vibes: A Platform-Centric Approach to Building Recommender Systems
2008
IEEE Data Engineering Bulletin
Finally the serving infrastructure uses REST based web services APIs to provide quick and easy integration with other Yahoo! properties. ...
Introduction Research into recommendation systems goes back more than a decade with several important classes of algorithms proposed [1] . ...
cookie sent by the browser. ...
dblp:journals/debu/Nag08
fatcat:pbrns55inffu3dkkszfthujnve
Preserving Privacy in Web Recommender Systems
[chapter]
2010
Chapman & Hall/CRC Data Mining and Knowledge Discovery Series
Such techniques range from cookies-related stuff to methods aimed at masking or scrambling the client IP address 1 . ...
The two-tier architecture of πSUGGEST makes it possible to overcome both these two kinds of risks. ...
doi:10.1201/b10373-22
fatcat:ja73n4duv5gx5m3zsndo33kgvi
In this paper, we present Maygh, a system that builds a content distribution network from client web browsers, without the need for additional plug-ins or client-side software. ...
Previous approaches to offloading some of the distribution costs onto end users have relied on client-side software or web browser plug-ins, providing poor user incentives and dramatically limiting their ...
We also thank Avleen Vig for his assistance with the Etsy traces, David Blank-Edelman and Rajiv Shridhar for their assistance with the Northeastern traces, Bimal Viswanath for the use of MPI-SWS servers ...
doi:10.1145/2465351.2465379
dblp:conf/eurosys/ZhangZMS13
fatcat:envhzpqzxbddherljxnotyhbni
Web Runner 2049: Evaluating Third-Party Anti-bot Services
[chapter]
2020
Lecture Notes in Computer Science
On the positive side, our results show that by relying on browser fingerprinting, more than 75% of protected websites in our dataset, successfully defend against attacks by basic bots built with Python ...
We have responsibly disclosed our findings with the anti-bot service providers. ...
Another obstacle that we had to overcome is that, due to the churn of clients of the anti-bot services, we had to often repeat experiments with new randomly sampled websites, as some websites stopped being ...
doi:10.1007/978-3-030-52683-2_7
fatcat:mx47co33zvfyhchram4knsskta
HyRec offloads recommendation tasks onto the web browsers of users, while a server orchestrates the process and manages the relationships between user profiles. ...
We convey the ability of HyRec to reduce the operation costs of content providers by nearly 50% and to provide a 100-fold improvement in scalability with respect to a centralized (or cloud-based recommender ...
We measure the time spent by the widget within a browser with a profile size set to 100. ...
doi:10.1145/2663165.2663315
dblp:conf/middleware/BoutetFGKP14
fatcat:rm7h7fbehzcp5iazy5bqitlw7q
Marketing Information, Analytics, and Intelligence
2021
International Journal of Business Strategy and Automation
Companies use cookies and records of website usage stored on personal browsers to gather information about customers. ...
Companies turn to customer relationship management (CRM) to overcome such problems. ...
doi:10.4018/ijbsa.287618
fatcat:hhb3tlayn5ezdpdnhj3v57arqu
An Assessment of Overt Malicious Activity Manifest in Residential Networks
[chapter]
2011
Lecture Notes in Computer Science
We find that hygiene has little correlation with observed behavior, but risky behavior-which is quite prevalent-more than doubles the likelihood that a system will manifest security issues. ...
Acknowledgments We would like to thank Yahel Ben-David of AirJaldi for helping us with the AirJaldi network and the anonymous reviewers for their valuable comments. ...
However, due to the high IP address churn we experience (for example, due to DSL lines frequently changing their IP address [11] ), such blacklists do not provide us with a reliable metric. ...
doi:10.1007/978-3-642-22424-9_9
fatcat:sktncsua4ffr3ao4dlllunlc4m
Improving the sensitivity of online controlled experiments by utilizing pre-experiment data
2013
Proceedings of the sixth ACM international conference on Web search and data mining - WSDM '13
The results on Bing's experimentation system are very successful: we can reduce variance by about 50%, effectively achieving the same statistical power with only half of the users, or half the duration ...
With thousands of experiments being run annually, improving the sensitivity of experiments allows for more precise assessment of value, or equivalently running the experiments on smaller populations (supporting ...
In addition, users are identified by cookies, which are unreliable and can "churn" (i.e. change due to users clearing their cookies). ...
doi:10.1145/2433396.2433413
dblp:conf/wsdm/DengXKW13
fatcat:bwjxty2obzee5powz7lkjmxe3u
« Previous
Showing results 1 — 15 out of 70 results