{"id":"https://openalex.org/W4308411481","doi":"https://doi.org/10.1145/3548606.3563522","title":"Poster","display_name":"Poster","publication_year":2022,"publication_date":"2022-11-07","ids":{"openalex":"https://openalex.org/W4308411481","doi":"https://doi.org/10.1145/3548606.3563522"},"language":"en","primary_location":{"id":"doi:10.1145/3548606.3563522","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3548606.3563522","pdf_url":null,"source":{"id":"https://openalex.org/S4363608815","display_name":"Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5039131377","display_name":"Shadi Sadeghpour","orcid":"https://orcid.org/0000-0003-0045-657X"},"institutions":[{"id":"https://openalex.org/I192455969","display_name":"York University","ror":"https://ror.org/05fq50484","country_code":"CA","type":"education","lineage":["https://openalex.org/I192455969"]}],"countries":["CA"],"is_corresponding":true,"raw_author_name":"Shadi Sadeghpour","raw_affiliation_strings":["York University, Toronto, ON, Canada"],"affiliations":[{"raw_affiliation_string":"York University, Toronto, ON, Canada","institution_ids":["https://openalex.org/I192455969"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5079596413","display_name":"Natalija Vlajic","orcid":"https://orcid.org/0000-0001-9921-0128"},"institutions":[{"id":"https://openalex.org/I192455969","display_name":"York University","ror":"https://ror.org/05fq50484","country_code":"CA","type":"education","lineage":["https://openalex.org/I192455969"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Natalija Vlajic","raw_affiliation_strings":["York University, Toronto, ON, Canada"],"affiliations":[{"raw_affiliation_string":"York University, Toronto, ON, Canada","institution_ids":["https://openalex.org/I192455969"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5039131377"],"corresponding_institution_ids":["https://openalex.org/I192455969"],"apc_list":null,"apc_paid":null,"fwci":0.4909,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.6028436,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"3447","last_page":"3449"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.996999979019165,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12761","display_name":"Data Stream Mining Techniques","score":0.996999979019165,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/session","display_name":"Session (web analytics)","score":0.9478105902671814},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8362178802490234},{"id":"https://openalex.org/keywords/task","display_name":"Task (project management)","score":0.727220892906189},{"id":"https://openalex.org/keywords/relevance","display_name":"Relevance (law)","score":0.6873929500579834},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.5231334567070007},{"id":"https://openalex.org/keywords/multimedia","display_name":"Multimedia","score":0.3201490342617035}],"concepts":[{"id":"https://openalex.org/C2779182362","wikidata":"https://www.wikidata.org/wiki/Q17126187","display_name":"Session (web analytics)","level":2,"score":0.9478105902671814},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8362178802490234},{"id":"https://openalex.org/C2780451532","wikidata":"https://www.wikidata.org/wiki/Q759676","display_name":"Task (project management)","level":2,"score":0.727220892906189},{"id":"https://openalex.org/C158154518","wikidata":"https://www.wikidata.org/wiki/Q7310970","display_name":"Relevance (law)","level":2,"score":0.6873929500579834},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.5231334567070007},{"id":"https://openalex.org/C49774154","wikidata":"https://www.wikidata.org/wiki/Q131765","display_name":"Multimedia","level":1,"score":0.3201490342617035},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0},{"id":"https://openalex.org/C187736073","wikidata":"https://www.wikidata.org/wiki/Q2920921","display_name":"Management","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3548606.3563522","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3548606.3563522","pdf_url":null,"source":{"id":"https://openalex.org/S4363608815","display_name":"Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":2,"referenced_works":["https://openalex.org/W2250447163","https://openalex.org/W3091910685"],"related_works":["https://openalex.org/W2748952813","https://openalex.org/W4230197055","https://openalex.org/W4296749040","https://openalex.org/W621808327","https://openalex.org/W644007644","https://openalex.org/W2497198634","https://openalex.org/W3012257603","https://openalex.org/W1586784764","https://openalex.org/W4292264782","https://openalex.org/W1965155517"],"abstract_inverted_index":{"Session-replay":[0],"bots":[1,24],"are":[2,15,68,78,166,191],"believed":[3],"to":[4,19,62,90,169,193],"be":[5,194],"the":[6,36,44,71,91,122,143,176,182,187],"latest":[7],"and":[8,41,88,135],"most":[9],"advanced":[10],"generation":[11],"of":[12,132,137,145,155],"web-bots,":[13],"that":[14,31,159],"also":[16],"difficult":[17,61],"challenging":[18],"defend":[20],"against.":[21],"Combating":[22],"session-replay":[23,149],"is":[25,60,103,130,136],"particularly":[26],"problematic":[27],"in":[28,43,56,105],"online":[29,178],"domains":[30],"get":[32],"repeatedly":[33],"visited":[34],"by":[35,70,121,186],"same":[37,72,123,188],"genuine":[38],"human":[39,73,124,164,189],"user(s),":[40],"possibly":[42],"same/similar":[45,171,177],"way":[46],"-":[47],"such":[48,57],"as":[49],"news,":[50],"banking":[51],"or":[52,75],"gaming":[53],"sites.":[54],"Namely,":[55],"domains,":[58],"it":[59,117],"determine":[63],"whether":[64],"two":[65,162],"look-alike":[66],"sessions":[67,77,173,184],"produced":[69],"user":[74,190],"these":[76],"just":[79],"bot-generated":[80],"session":[81],"replays.":[82],"In":[83],"this":[84],"paper":[85],"we":[86],"introduce":[87],"provide":[89],"public":[92],"a":[93,106],"novel":[94],"real-world":[95],"mouse":[96,114],"dynamics":[97,115],"dataset":[98,102,129,157],"named":[99],"ReMouse.":[100],"ReMouse":[101,128,156],"collected":[104],"guided":[107],"environment":[108],"and,":[109],"unlike":[110],"other":[111],"publicly":[112],"available":[113],"dataset,":[116],"contains":[118],"repeat-sessions":[119],"generated":[120,185],"user(s).":[125],"As":[126],"such,":[127],"first":[131],"its":[133],"kind":[134],"particular":[138],"relevance":[139],"for":[140],"studies":[141],"on":[142],"development":[144],"effective":[146],"defenses":[147],"against":[148],"bots.":[150],"Our":[151],"own":[152],"statistical":[153],"analysis":[154],"shows":[158],"not":[160],"only":[161],"different":[163],"users":[165],"highly":[167],"unlikely":[168],"generate":[170],"looking":[172],"when":[174],"performing":[175],"task,":[179],"but":[180],"even":[181],"(repeat)":[183],"likely":[192],"sufficiently":[195],"distinguishable":[196],"from":[197],"one":[198],"another.":[199]},"counts_by_year":[{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2022-11-11T00:00:00"}
