{"id":"https://openalex.org/W2012673382","doi":"https://doi.org/10.1145/2382196.2382302","title":"Context-aware web security threat prevention","display_name":"Context-aware web security threat prevention","publication_year":2012,"publication_date":"2012-10-15","ids":{"openalex":"https://openalex.org/W2012673382","doi":"https://doi.org/10.1145/2382196.2382302","mag":"2012673382"},"language":"en","primary_location":{"id":"doi:10.1145/2382196.2382302","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2382196.2382302","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2012 ACM conference on Computer and communications security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5078362082","display_name":"Lung\u2010Hao Lee","orcid":"https://orcid.org/0000-0003-0472-7429"},"institutions":[{"id":"https://openalex.org/I16733864","display_name":"National Taiwan University","ror":"https://ror.org/05bqach95","country_code":"TW","type":"education","lineage":["https://openalex.org/I16733864"]}],"countries":["TW"],"is_corresponding":true,"raw_author_name":"Lung-Hao Lee","raw_affiliation_strings":["National Taiwan University, Taipei, Taiwan Roc","National Taiwan University, Taipei, Taiwan, ROC"],"affiliations":[{"raw_affiliation_string":"National Taiwan University, Taipei, Taiwan Roc","institution_ids":["https://openalex.org/I16733864"]},{"raw_affiliation_string":"National Taiwan University, Taipei, Taiwan, ROC","institution_ids":["https://openalex.org/I16733864"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5010097457","display_name":"Yen\u2010Cheng Juan","orcid":null},"institutions":[{"id":"https://openalex.org/I16733864","display_name":"National Taiwan University","ror":"https://ror.org/05bqach95","country_code":"TW","type":"education","lineage":["https://openalex.org/I16733864"]}],"countries":["TW"],"is_corresponding":false,"raw_author_name":"Yen-Cheng Juan","raw_affiliation_strings":["National Taiwan University, Taipei, Taiwan Roc","National Taiwan University, Taipei, Taiwan, ROC"],"affiliations":[{"raw_affiliation_string":"National Taiwan University, Taipei, Taiwan Roc","institution_ids":["https://openalex.org/I16733864"]},{"raw_affiliation_string":"National Taiwan University, Taipei, Taiwan, ROC","institution_ids":["https://openalex.org/I16733864"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5071520406","display_name":"Kuei-Ching Lee","orcid":null},"institutions":[{"id":"https://openalex.org/I16733864","display_name":"National Taiwan University","ror":"https://ror.org/05bqach95","country_code":"TW","type":"education","lineage":["https://openalex.org/I16733864"]}],"countries":["TW"],"is_corresponding":false,"raw_author_name":"Kuei-Ching Lee","raw_affiliation_strings":["National Taiwan University, Taipei, Taiwan Roc","National Taiwan University, Taipei, Taiwan, ROC"],"affiliations":[{"raw_affiliation_string":"National Taiwan University, Taipei, Taiwan Roc","institution_ids":["https://openalex.org/I16733864"]},{"raw_affiliation_string":"National Taiwan University, Taipei, Taiwan, ROC","institution_ids":["https://openalex.org/I16733864"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5036121499","display_name":"Wei\u2010Lin Tseng","orcid":null},"institutions":[{"id":"https://openalex.org/I16733864","display_name":"National Taiwan University","ror":"https://ror.org/05bqach95","country_code":"TW","type":"education","lineage":["https://openalex.org/I16733864"]}],"countries":["TW"],"is_corresponding":false,"raw_author_name":"Wei-Lin Tseng","raw_affiliation_strings":["National Taiwan University, Taipei, Taiwan Roc","National Taiwan University, Taipei, Taiwan, ROC"],"affiliations":[{"raw_affiliation_string":"National Taiwan University, Taipei, Taiwan Roc","institution_ids":["https://openalex.org/I16733864"]},{"raw_affiliation_string":"National Taiwan University, Taipei, Taiwan, ROC","institution_ids":["https://openalex.org/I16733864"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5000334344","display_name":"Hsin\u2010Hsi Chen","orcid":"https://orcid.org/0000-0001-9757-9423"},"institutions":[{"id":"https://openalex.org/I16733864","display_name":"National Taiwan University","ror":"https://ror.org/05bqach95","country_code":"TW","type":"education","lineage":["https://openalex.org/I16733864"]}],"countries":["TW"],"is_corresponding":false,"raw_author_name":"Hsin-Hsi Chen","raw_affiliation_strings":["National Taiwan University, Taipei, Taiwan Roc","National Taiwan University, Taipei, Taiwan, ROC"],"affiliations":[{"raw_affiliation_string":"National Taiwan University, Taipei, Taiwan Roc","institution_ids":["https://openalex.org/I16733864"]},{"raw_affiliation_string":"National Taiwan University, Taipei, Taiwan, ROC","institution_ids":["https://openalex.org/I16733864"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5050118459","display_name":"Yuen\u2010Hsien Tseng","orcid":"https://orcid.org/0000-0001-8904-7902"},"institutions":[{"id":"https://openalex.org/I134161618","display_name":"National Taiwan Normal University","ror":"https://ror.org/059dkdx38","country_code":"TW","type":"education","lineage":["https://openalex.org/I134161618"]}],"countries":["TW"],"is_corresponding":false,"raw_author_name":"Yuen-Hsien Tseng","raw_affiliation_strings":["National Taiwan Normal University, Taipei, Taiwan Roc","National Taiwan Normal University, Taipei, Taiwan, ROC"],"affiliations":[{"raw_affiliation_string":"National Taiwan Normal University, Taipei, Taiwan Roc","institution_ids":["https://openalex.org/I134161618"]},{"raw_affiliation_string":"National Taiwan Normal University, Taipei, Taiwan, ROC","institution_ids":["https://openalex.org/I134161618"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5078362082"],"corresponding_institution_ids":["https://openalex.org/I16733864"],"apc_list":null,"apc_paid":null,"fwci":2.1316,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.89898145,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"992","last_page":"994"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9976999759674072,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8093410134315491},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.6585038900375366},{"id":"https://openalex.org/keywords/blocking","display_name":"Blocking (statistics)","score":0.6375067234039307},{"id":"https://openalex.org/keywords/hidden-markov-model","display_name":"Hidden Markov model","score":0.5768539309501648},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5447580814361572},{"id":"https://openalex.org/keywords/macro","display_name":"Macro","score":0.4461784362792969},{"id":"https://openalex.org/keywords/web-application-security","display_name":"Web application security","score":0.4122498333454132},{"id":"https://openalex.org/keywords/web-service","display_name":"Web service","score":0.3111531138420105},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.1740173101425171},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.17297294735908508},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.1479983627796173},{"id":"https://openalex.org/keywords/web-development","display_name":"Web development","score":0.0829351544380188}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8093410134315491},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.6585038900375366},{"id":"https://openalex.org/C144745244","wikidata":"https://www.wikidata.org/wiki/Q4927286","display_name":"Blocking (statistics)","level":2,"score":0.6375067234039307},{"id":"https://openalex.org/C23224414","wikidata":"https://www.wikidata.org/wiki/Q176769","display_name":"Hidden Markov model","level":2,"score":0.5768539309501648},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5447580814361572},{"id":"https://openalex.org/C166955791","wikidata":"https://www.wikidata.org/wiki/Q629579","display_name":"Macro","level":2,"score":0.4461784362792969},{"id":"https://openalex.org/C59241245","wikidata":"https://www.wikidata.org/wiki/Q4781497","display_name":"Web application security","level":4,"score":0.4122498333454132},{"id":"https://openalex.org/C35578498","wikidata":"https://www.wikidata.org/wiki/Q193424","display_name":"Web service","level":2,"score":0.3111531138420105},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.1740173101425171},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.17297294735908508},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.1479983627796173},{"id":"https://openalex.org/C79373723","wikidata":"https://www.wikidata.org/wiki/Q386275","display_name":"Web development","level":3,"score":0.0829351544380188},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/2382196.2382302","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2382196.2382302","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2012 ACM conference on Computer and communications security","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.4699999988079071,"display_name":"Responsible consumption and production","id":"https://metadata.un.org/sdg/12"}],"awards":[],"funders":[{"id":"https://openalex.org/F4320321040","display_name":"National Science Council","ror":"https://ror.org/02kv4zf79"},{"id":"https://openalex.org/F4320323837","display_name":"National Taiwan Normal University","ror":"https://ror.org/059dkdx38"},{"id":"https://openalex.org/F4320323900","display_name":"National Taiwan University","ror":"https://ror.org/05bqach95"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":7,"referenced_works":["https://openalex.org/W1990188874","https://openalex.org/W2002079460","https://openalex.org/W2102475112","https://openalex.org/W2124929753","https://openalex.org/W2144768538","https://openalex.org/W2146729596","https://openalex.org/W2160289821"],"related_works":["https://openalex.org/W2156201195","https://openalex.org/W2613374639","https://openalex.org/W2187625726","https://openalex.org/W2371044121","https://openalex.org/W1967778478","https://openalex.org/W2045248154","https://openalex.org/W4313139008","https://openalex.org/W99446231","https://openalex.org/W186778346","https://openalex.org/W2027150799"],"abstract_inverted_index":{"This":[0],"paper":[1],"studies":[2],"the":[3,14,46,65,94,100,112,134,144],"feasibility":[4],"of":[5,68,114,146,156],"an":[6],"early":[7,101],"warning":[8],"system":[9],"that":[10,56,89,143],"prevents":[11],"users":[12,124],"from":[13],"dangerous":[15],"situations":[16],"they":[17],"may":[18],"fall":[19],"into":[20],"during":[21],"web":[22,49,86],"surfing.":[23],"Our":[24,140],"approach":[25],"adopts":[26],"behavioral":[27,118],"Hidden":[28],"Markov":[29],"Models":[30],"to":[31,48,84,122,152],"explore":[32],"collective":[33],"intelligence":[34],"embedded":[35],"in":[36],"users'":[37,69],"browsing":[38],"behaviors":[39],"for":[40,63,125],"context-aware":[41],"category":[42],"prediction,":[43],"and":[44],"applies":[45],"results":[47],"security":[50,87,96,127,157],"threat":[51],"prevention.":[52],"Large-scale":[53],"experiments":[54],"show":[55,142],"our":[57,76],"proposed":[58],"method":[59,77],"performs":[60],"accuracy":[61],"0.463":[62],"predicting":[64],"fine-grained":[66],"categories":[67],"next":[70],"accesses.":[71],"In":[72,116],"real-life":[73],"filtering":[74,137],"simulations,":[75],"can":[78],"achieve":[79],"macro-averaging":[80,107],"blocking":[81],"rate":[82,109],"0.4293":[83],"find":[85],"threats":[88,128],"cannot":[90],"be":[91],"detected":[92],"by":[93,129],"existing":[95],"protection":[97],"solutions":[98],"at":[99],"stage,":[102],"while":[103],"accomplishes":[104],"a":[105],"low":[106],"over-blocking":[108],"0.0005":[110],"with":[111],"passage":[113],"time.":[115],"addition,":[117],"HMM":[119],"is":[120,150],"able":[121],"alert":[123],"avoiding":[126],"8.4":[130],"hours":[131],"earlier":[132],"than":[133],"current":[135],"URL":[136],"engine":[138],"does.":[139],"simulations":[141],"shortening":[145],"this":[147],"lag":[148],"time":[149],"critical":[151],"avoid":[153],"severe":[154],"diffusions":[155],"threats.":[158]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2016,"cited_by_count":1},{"year":2015,"cited_by_count":1},{"year":2014,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
