Følg
Acar Tamersoy
Acar Tamersoy
Principal Applied Scientist at Microsoft
Verifisert e-postadresse på gatech.edu - Startside
Tittel
Sitert av
Sitert av
År
Guilt by Association: Large Scale Malware Detection by Mining File-relation Graphs
A Tamersoy, K Roundy, DH Chau
Proceedings of the 20th ACM SIGKDD international conference on Knowledge …, 2014
2152014
Characterizing Smoking and Drinking Abstinence from Social Media
A Tamersoy, M De Choudhury, DH Chau
Proceedings of the 26th ACM Conference on Hypertext & Social Media, 139-148, 2015
1062015
Click traffic analysis of short url spam on twitter
D Wang, SB Navathe, L Liu, D Irani, A Tamersoy, C Pu
9th IEEE International Conference on Collaborative Computing: Networking …, 2013
1062013
Secure and utility-aware data collection with condensed local differential privacy
ME Gursoy, A Tamersoy, S Truex, W Wei, L Liu
IEEE Transactions on Dependable and Secure Computing 18 (5), 2365-2378, 2019
992019
Trauma-informed computing: Towards safer technology experiences for all
JX Chen, A McDonald, Y Zou, E Tseng, KA Roundy, A Tamersoy, ...
Proceedings of the 2022 CHI Conference on Human Factors in Computing Systems …, 2022
972022
Systems and methods for using event-correlation graphs to detect attacks on computing systems
K Roundy, F Guo, S Bhatkar, T Cheng, J Fu, ZK Li, D Shou, S Sawhney, ...
US Patent 9,141,790, 2015
942015
Examining the Adoption and Abandonment of Security, Privacy, and Identity Theft Protection Practices
Y Zou, K Roundy, A Tamersoy, S Shintre, J Roturier, F Schaub
Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems …, 2020
832020
Anonymization of longitudinal electronic medical records
A Tamersoy, G Loukides, ME Nergiz, Y Saygin, B Malin
IEEE Transactions on Information Technology in Biomedicine 16 (3), 413-423, 2012
822012
Vigor: Interactive visual exploration of graph query results
R Pienta, F Hohman, A Endert, A Tamersoy, K Roundy, C Gates, ...
IEEE transactions on visualization and computer graphics 24 (1), 215-225, 2017
722017
Understanding variations in pediatric asthma care processes in the emergency department using visual analytics
RC Basole, ML Braunstein, V Kumar, H Park, M Kahng, DHP Chau, ...
Journal of the American Medical Informatics Association 22 (2), 318-323, 2015
692015
Mage: Matching approximate patterns in richly-attributed graphs
R Pienta, A Tamersoy, H Tong, DH Chau
2014 IEEE International Conference on Big Data (Big Data), 585-590, 2014
582014
Generating Graph Snapshots from Streaming Edge Data
S Soundarajan, A Tamersoy, EB Khalil, T Eliassi-Rad, DH Chau, ...
Proceedings of the 25th International Conference Companion on World Wide Web …, 2016
532016
The many kinds of creepware used for interpersonal attacks
KA Roundy, PB Mendelberg, N Dell, D McCoy, D Nissani, T Ristenpart, ...
2020 IEEE Symposium on Security and Privacy (SP), 626-643, 2020
512020
Systems and methods for preventing malicious network connections using correlation-based anomaly detection
A Tamersoy, K Roundy
US Patent 10,142,357, 2018
492018
Systems and methods for adjusting suspiciousness scores in event-correlation graphs
A Tamersoy, K Roundy, S Bhatkar, E Khalil
US Patent 9,148,441, 2015
442015
VISAGE: Interactive Visual Graph Querying
R Pienta, A Tamersoy, A Endert, S Navathe, H Tong, DH Chau
Proceedings of the International Working Conference on Advanced Visual …, 2016
432016
The role of computer security customer support in helping survivors of intimate partner violence
Y Zou, A McDonald, J Narakornpichit, N Dell, T Ristenpart, K Roundy, ...
30th USENIX security symposium (USENIX Security 21), 429-446, 2021
292021
Visual Graph Query Construction and Refinement
R Pienta, F Hohman, A Tamersoy, A Endert, S Navathe, H Tong, DH Chau
Proceedings of the 2017 ACM International Conference on Management of Data …, 2017
292017
Large-scale insider trading analysis: patterns and discoveries
A Tamersoy, E Khalil, B Xie, SL Lenkey, BR Routledge, DH Chau, ...
Social Network Analysis and Mining 4, 1-17, 2014
262014
Identifying and protecting against computer security threats while preserving privacy of individual client devices using condensed local differential privacy (CLDP)
ME Gursoy, A Tamersoy
US Patent 10,789,363, 2020
242020
Systemet kan ikke utføre handlingen. Prøv på nytt senere.
Artikler 1–20