Tracing and Analyzing Web Access Paths Based on User-Side Data Collection: How Do Users Reach Malicious URLs?
Takeshi TakahashiChristopher KruegelGiovanni VignaKatsunari YoshiokaDaisuke InouePublished in: RAID (2020)
Keyphrases
- internet users
- data collection
- user experience
- website
- end users
- information overload
- user activities
- user centric
- access paths
- user interests
- user interaction
- social bookmarking
- web users
- user interface
- recommendation systems
- web pages
- malicious users
- user profiles
- recommender systems
- user activity
- web content
- relevant pages
- web logs
- information sources
- user generated content
- user behavior
- collaborative filtering
- web crawler
- web documents
- query logs
- web mining
- sensor networks
- relevant web pages
- social networking
- information retrieval
- database systems
- search engine