{"id":"https://openalex.org/W4254352750","doi":"https://doi.org/10.1145/3041008","title":"Proceedings of the 3rd ACM on International Workshop on Security And Privacy Analytics","display_name":"Proceedings of the 3rd ACM on International Workshop on Security And Privacy Analytics","publication_year":2017,"publication_date":"2017-03-24","ids":{"openalex":"https://openalex.org/W4254352750","doi":"https://doi.org/10.1145/3041008"},"language":"en","primary_location":{"id":"doi:10.1145/3041008","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3041008","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":null,"raw_type":"proceedings"},"type":"paratext","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":0,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":null,"has_fulltext":false,"cited_by_count":23,"citation_normalized_percentile":null,"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":true,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.7939000129699707,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.7939000129699707,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.7145000100135803,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11045","display_name":"Privacy, Security, and Data Protection","score":0.6952999830245972,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/analytics","display_name":"Analytics","score":0.7578705549240112},{"id":"https://openalex.org/keywords/presentation","display_name":"Presentation (obstetrics)","score":0.5947990417480469},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5573585629463196},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.4501327872276306},{"id":"https://openalex.org/keywords/data-science","display_name":"Data science","score":0.38034194707870483},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.3651672601699829},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.34374910593032837}],"concepts":[{"id":"https://openalex.org/C79158427","wikidata":"https://www.wikidata.org/wiki/Q485396","display_name":"Analytics","level":2,"score":0.7578705549240112},{"id":"https://openalex.org/C2777601897","wikidata":"https://www.wikidata.org/wiki/Q3409113","display_name":"Presentation (obstetrics)","level":2,"score":0.5947990417480469},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5573585629463196},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.4501327872276306},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.38034194707870483},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.3651672601699829},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.34374910593032837},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C126838900","wikidata":"https://www.wikidata.org/wiki/Q77604","display_name":"Radiology","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3041008","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3041008","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":null,"raw_type":"proceedings"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.46000000834465027,"id":"https://metadata.un.org/sdg/4","display_name":"Quality Education"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W2584827882","https://openalex.org/W3195097297","https://openalex.org/W4225340788","https://openalex.org/W3038106605","https://openalex.org/W4390482427","https://openalex.org/W2513267613","https://openalex.org/W3049084372","https://openalex.org/W2528109871","https://openalex.org/W2940702331","https://openalex.org/W2905822832"],"abstract_inverted_index":{"It":[0],"is":[1,25,109,248,261],"our":[2],"great":[3],"pleasure":[4],"to":[5,8,73,110,123,149,210,298],"welcome":[6],"you":[7],"the":[9,26,29,33,37,89,125,129,176,212,232,271,296,300,309,322,330],"2017":[10],"ACM":[11],"International":[12],"Workshop":[13],"on":[14,48,83,94,303,316,324],"Security":[15,304,325],"and":[16,31,45,52,69,96,103,119,122,142,196,228,236,290,305,326],"Privacy":[17,306,327],"Analytics":[18,307,328],"--":[19],"IWSPA":[20,108,274],"'17.":[21],"This":[22],"year's":[23],"workshop":[24],"third":[27],"in":[28,101,128,230,281],"series":[30],"continues":[32],"tradition":[34],"of":[35,42,54,77,86,107,160,175,234,266],"being":[36],"premier":[38],"forum":[39,113],"for":[40,114,134,156,188,222,224],"presentation":[41,189],"research":[43,323],"results":[44],"experience":[46],"reports":[47],"leading":[49],"edge":[50],"issues":[51],"applications":[53],"data":[55,64,78,117],"analytics":[56,79,98,118],"(by":[57],"which":[58],"we":[59],"mean":[60],"techniques":[61],"drawn":[62],"from":[63,139],"mining,":[65],"machine":[66],"learning,":[67],"statistics":[68],"natural":[70],"language":[71],"processing)":[72],"security":[74,95,235],"challenges.":[75],"Use":[76],"also":[80,207,294],"has":[81],"implications":[82],"privacy.":[84],"Because":[85],"these":[87],"reasons,":[88],"first":[90,272],"two":[91,213],"international":[92],"workshops":[93],"privacy":[97,237],"were":[99,163,186,198],"organized":[100],"2015":[102],"2016.":[104],"The":[105,132,173],"mission":[106],"create":[111],"a":[112,158],"interaction":[115],"between":[116],"security/privacy":[120],"experts":[121],"examine":[124],"questions":[126],"raised":[127],"previous":[130],"workshops.":[131],"call":[133],"papers":[135,185,192,202],"attracted":[136],"14":[137],"submissions":[138,177],"Asia,":[140],"Europe,":[141],"North":[143],"America.":[144],"Each":[145],"paper":[146,167],"was":[147,178],"assigned":[148],"at":[150,250,263,308,329],"least":[151],"three":[152,171],"program":[153],"committee":[154],"members":[155],"review,":[157],"total":[159],"47":[161],"reviews":[162],"obtained":[164],"with":[165,321],"no":[166],"having":[168],"fewer":[169],"than":[170],"reviews.":[172],"quality":[174],"very":[179],"high":[180],"this":[181],"year.":[182],"Consequently,":[183],"four":[184],"accepted":[187,199],"as":[190,200],"full":[191],"(9":[193],"page":[194,204],"limit)":[195],"five":[197],"short":[201],"(6":[203],"limit).":[205],"We":[206,293],"encourage":[208,295],"attendees":[209,297],"attend":[211],"keynotes.":[214],"These":[215],"insightful":[216],"talks":[217],"should":[218],"provide":[219],"rich":[220],"food":[221],"thought":[223],"your":[225],"own":[226],"investigations":[227],"help":[229],"shaping":[231],"future":[233],"analytics.":[238],"Exploring":[239],"August":[240],"Detection":[241],"via":[242],"Forensic":[243],"Information,":[244],"Patrick":[245,288],"McDaniel":[246,289],"(who":[247,260],"currently":[249,262],"Pennsylvania":[251],"State":[252,264],"University)Continuous":[253],"Authentication":[254],"Using":[255],"Behavioral":[256],"Biometrics,":[257],"Shambhu":[258],"Upadhyaya":[259],"University":[265],"New":[267],"York,":[268],"Buffalo)":[269],"For":[270],"time,":[273],"includes":[275],"an":[276],"invited":[277],"paper,":[278],"Feature":[279],"Cultivation":[280],"Privileged":[282],"Informationaugmented":[283],"Detection,":[284],"by":[285],"Berkay":[286],"Celik,":[287],"Rauf":[291],"Izmailov.":[292],"view":[299],"educational":[301],"materials":[302],"web":[310],"site:":[311],"http://capex.cs.uh.edu":[312],"so":[313],"that":[314],"discussions":[315],"education":[317],"can":[318],"be":[319],"combined":[320],"workshop.":[331]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":3},{"year":2022,"cited_by_count":7},{"year":2021,"cited_by_count":2},{"year":2020,"cited_by_count":2},{"year":2019,"cited_by_count":5},{"year":2018,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
