{"id":"https://openalex.org/W2128117690","doi":"https://doi.org/10.1109/cisda.2012.6291524","title":"Toward the attribution of Web behavior","display_name":"Toward the attribution of Web behavior","publication_year":2012,"publication_date":"2012-07-01","ids":{"openalex":"https://openalex.org/W2128117690","doi":"https://doi.org/10.1109/cisda.2012.6291524","mag":"2128117690"},"language":"en","primary_location":{"id":"doi:10.1109/cisda.2012.6291524","is_oa":false,"landing_page_url":"http://doi.org/10.1109/cisda.2012.6291524","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2012 IEEE Symposium on Computational Intelligence for Security and Defence Applications","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://doi.org/10.1109/cisda.2012.6291524","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5020868561","display_name":"Myriam Abramson","orcid":null},"institutions":[{"id":"https://openalex.org/I1288214837","display_name":"United States Naval Research Laboratory","ror":"https://ror.org/04d23a975","country_code":"US","type":"facility","lineage":["https://openalex.org/I1288214837","https://openalex.org/I1330347796","https://openalex.org/I175003984","https://openalex.org/I3130687028"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Myriam Abramson","raw_affiliation_strings":["[Naval Research Laboratory, Washington, DC]"],"affiliations":[{"raw_affiliation_string":"[Naval Research Laboratory, Washington, DC]","institution_ids":["https://openalex.org/I1288214837"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5020868561"],"corresponding_institution_ids":["https://openalex.org/I1288214837"],"apc_list":null,"apc_paid":null,"fwci":2.9691,"has_fulltext":false,"cited_by_count":8,"citation_normalized_percentile":{"value":0.92799852,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":"89","issue":null,"first_page":"1","last_page":"5"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12380","display_name":"Authorship Attribution and Profiling","score":0.996399998664856,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9918000102043152,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.807803213596344},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.5701153874397278},{"id":"https://openalex.org/keywords/web-navigation","display_name":"Web navigation","score":0.5311319231987},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.5206155776977539},{"id":"https://openalex.org/keywords/categorization","display_name":"Categorization","score":0.5092772245407104},{"id":"https://openalex.org/keywords/attribution","display_name":"Attribution","score":0.5022642612457275},{"id":"https://openalex.org/keywords/keystroke-logging","display_name":"Keystroke logging","score":0.4794858396053314},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.45231905579566956},{"id":"https://openalex.org/keywords/biometrics","display_name":"Biometrics","score":0.446432501077652},{"id":"https://openalex.org/keywords/web-intelligence","display_name":"Web intelligence","score":0.43993908166885376},{"id":"https://openalex.org/keywords/web-application","display_name":"Web application","score":0.43849942088127136},{"id":"https://openalex.org/keywords/web-modeling","display_name":"Web modeling","score":0.37062686681747437},{"id":"https://openalex.org/keywords/web-page","display_name":"Web page","score":0.3481591045856476},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.26907944679260254},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.22580432891845703},{"id":"https://openalex.org/keywords/psychology","display_name":"Psychology","score":0.07147139310836792}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.807803213596344},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.5701153874397278},{"id":"https://openalex.org/C61096286","wikidata":"https://www.wikidata.org/wiki/Q7978592","display_name":"Web navigation","level":3,"score":0.5311319231987},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.5206155776977539},{"id":"https://openalex.org/C94124525","wikidata":"https://www.wikidata.org/wiki/Q912550","display_name":"Categorization","level":2,"score":0.5092772245407104},{"id":"https://openalex.org/C143299363","wikidata":"https://www.wikidata.org/wiki/Q900584","display_name":"Attribution","level":2,"score":0.5022642612457275},{"id":"https://openalex.org/C161615301","wikidata":"https://www.wikidata.org/wiki/Q309396","display_name":"Keystroke logging","level":2,"score":0.4794858396053314},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.45231905579566956},{"id":"https://openalex.org/C184297639","wikidata":"https://www.wikidata.org/wiki/Q177765","display_name":"Biometrics","level":2,"score":0.446432501077652},{"id":"https://openalex.org/C544335954","wikidata":"https://www.wikidata.org/wiki/Q2553348","display_name":"Web intelligence","level":4,"score":0.43993908166885376},{"id":"https://openalex.org/C118643609","wikidata":"https://www.wikidata.org/wiki/Q189210","display_name":"Web application","level":2,"score":0.43849942088127136},{"id":"https://openalex.org/C130436687","wikidata":"https://www.wikidata.org/wiki/Q7978591","display_name":"Web modeling","level":3,"score":0.37062686681747437},{"id":"https://openalex.org/C21959979","wikidata":"https://www.wikidata.org/wiki/Q36774","display_name":"Web page","level":2,"score":0.3481591045856476},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.26907944679260254},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.22580432891845703},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.07147139310836792},{"id":"https://openalex.org/C77805123","wikidata":"https://www.wikidata.org/wiki/Q161272","display_name":"Social psychology","level":1,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/cisda.2012.6291524","is_oa":false,"landing_page_url":"http://doi.org/10.1109/cisda.2012.6291524","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2012 IEEE Symposium on Computational Intelligence for Security and Defence Applications","raw_type":"proceedings-article"},{"id":"pmh:oai:zenodo.org:1266359","is_oa":true,"landing_page_url":"https://doi.org/10.1109/cisda.2012.6291524","pdf_url":null,"source":{"id":"https://openalex.org/S4306400562","display_name":"Zenodo (CERN European Organization for Nuclear Research)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I67311998","host_organization_name":"European Organization for Nuclear Research","host_organization_lineage":["https://openalex.org/I67311998"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"info:eu-repo/semantics/conferencePaper"}],"best_oa_location":{"id":"pmh:oai:zenodo.org:1266359","is_oa":true,"landing_page_url":"https://doi.org/10.1109/cisda.2012.6291524","pdf_url":null,"source":{"id":"https://openalex.org/S4306400562","display_name":"Zenodo (CERN European Organization for Nuclear Research)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I67311998","host_organization_name":"European Organization for Nuclear Research","host_organization_lineage":["https://openalex.org/I67311998"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"info:eu-repo/semantics/conferencePaper"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":26,"referenced_works":["https://openalex.org/W40914139","https://openalex.org/W1262131959","https://openalex.org/W1984592021","https://openalex.org/W1989799721","https://openalex.org/W2010624529","https://openalex.org/W2059166475","https://openalex.org/W2061562262","https://openalex.org/W2067257553","https://openalex.org/W2077414053","https://openalex.org/W2095319500","https://openalex.org/W2098037070","https://openalex.org/W2099504385","https://openalex.org/W2117629901","https://openalex.org/W2119785746","https://openalex.org/W2125838338","https://openalex.org/W2128282242","https://openalex.org/W2133990480","https://openalex.org/W2143445293","https://openalex.org/W2147880316","https://openalex.org/W2158349948","https://openalex.org/W2158450083","https://openalex.org/W2164968305","https://openalex.org/W2541794668","https://openalex.org/W6601712661","https://openalex.org/W6628254273","https://openalex.org/W6682082992"],"related_works":["https://openalex.org/W2415191659","https://openalex.org/W2404573736","https://openalex.org/W2744329849","https://openalex.org/W1563693146","https://openalex.org/W2184421161","https://openalex.org/W30838716","https://openalex.org/W2183616052","https://openalex.org/W2548494779","https://openalex.org/W132269582","https://openalex.org/W3139873369"],"abstract_inverted_index":{"As":[0],"more":[1,54],"people":[2],"browse":[3],"the":[4,25,100],"Web":[5,10,43,57,67,103],"to":[6,99],"gather":[7],"information,":[8],"recognizing":[9],"browsing":[11,58,104],"behavior":[12,68,105],"signatures":[13],"can":[14,46],"replace":[15],"or":[16],"complement":[17],"keystroke":[18,63],"authentication":[19,21],"where":[20],"is":[22,69],"defined":[23],"as":[24,77],"capability":[26],"of":[27,34,42,51,66,94,102],"identifying":[28],"an":[29,49],"individual":[30,50],"within":[31],"a":[32,78],"set":[33],"individuals.":[35],"We":[36],"claim":[37],"that":[38],"recurring":[39],"temporal":[40],"patterns":[41],"site":[44],"visits":[45],"help":[47],"identify":[48],"interest":[52],"and,":[53],"generally,":[55],"categorize":[56],"behavior.":[59],"Furthermore,":[60],"just":[61],"like":[62],"authentication,":[64],"attribution":[65,101],"not":[70],"obtrusive":[71],"and":[72,90],"has":[73],"applications":[74],"in":[75],"cyberwarfare":[76],"new":[79],"biometric":[80],"technique.":[81],"In":[82],"this":[83],"paper":[84],"we":[85],"describe":[86],"some":[87],"exploratory":[88],"work":[89],"preliminary":[91],"comparative":[92],"results":[93],"machine":[95],"learning":[96],"techniques":[97],"applicable":[98],"problem.":[106]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":1},{"year":2017,"cited_by_count":1},{"year":2016,"cited_by_count":1},{"year":2015,"cited_by_count":1},{"year":2013,"cited_by_count":2},{"year":2012,"cited_by_count":1}],"updated_date":"2026-03-20T23:20:44.827607","created_date":"2025-10-10T00:00:00"}
