Acar Tamersoy
Acar Tamersoy
Senior Research Scientist at NortonLifeLock Research Group
Verified email at - Homepage
Cited by
Cited by
Guilt by Association: Large Scale Malware Detection by Mining File-relation Graphs
A Tamersoy, K Roundy, DH Chau
Proceedings of the 20th ACM SIGKDD international conference on Knowledge …, 2014
Characterizing Smoking and Drinking Abstinence from Social Media
A Tamersoy, M De Choudhury, DH Chau
Proceedings of the 26th ACM Conference on Hypertext & Social Media, 139-148, 2015
Click traffic analysis of short url spam on twitter
D Wang, SB Navathe, L Liu, D Irani, A Tamersoy, C Pu
9th IEEE International Conference on Collaborative Computing: Networking …, 2013
Secure and utility-aware data collection with condensed local differential privacy
ME Gursoy, A Tamersoy, S Truex, W Wei, L Liu
IEEE Transactions on Dependable and Secure Computing 18 (5), 2365-2378, 2019
Systems and methods for using event-correlation graphs to detect attacks on computing systems
K Roundy, F Guo, S Bhatkar, T Cheng, J Fu, ZK Li, D Shou, S Sawhney, ...
US Patent 9,141,790, 2015
Anonymization of longitudinal electronic medical records
A Tamersoy, G Loukides, ME Nergiz, Y Saygin, B Malin
IEEE Transactions on Information Technology in Biomedicine 16 (3), 413-423, 2012
Vigor: Interactive visual exploration of graph query results
R Pienta, F Hohman, A Endert, A Tamersoy, K Roundy, C Gates, ...
IEEE transactions on visualization and computer graphics 24 (1), 215-225, 2017
Examining the Adoption and Abandonment of Security, Privacy, and Identity Theft Protection Practices
Y Zou, K Roundy, A Tamersoy, S Shintre, J Roturier, F Schaub
Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems …, 2020
Understanding variations in pediatric asthma care processes in the emergency department using visual analytics
RC Basole, ML Braunstein, V Kumar, H Park, M Kahng, DHP Chau, ...
Journal of the American Medical Informatics Association 22 (2), 318-323, 2015
Trauma-informed computing: Towards safer technology experiences for all
JX Chen, A McDonald, Y Zou, E Tseng, KA Roundy, A Tamersoy, ...
Proceedings of the 2022 CHI Conference on Human Factors in Computing Systems …, 2022
Mage: Matching approximate patterns in richly-attributed graphs
R Pienta, A Tamersoy, H Tong, DH Chau
2014 IEEE International Conference on Big Data (Big Data), 585-590, 2014
Generating Graph Snapshots from Streaming Edge Data
S Soundarajan, A Tamersoy, EB Khalil, T Eliassi-Rad, DH Chau, ...
Proceedings of the 25th International Conference Companion on World Wide Web …, 2016
The many kinds of creepware used for interpersonal attacks
KA Roundy, PB Mendelberg, N Dell, D McCoy, D Nissani, T Ristenpart, ...
2020 IEEE Symposium on Security and Privacy (SP), 626-643, 2020
VISAGE: Interactive Visual Graph Querying
R Pienta, A Tamersoy, A Endert, S Navathe, H Tong, DH Chau
Proceedings of the International Working Conference on Advanced Visual …, 2016
Systems and methods for adjusting suspiciousness scores in event-correlation graphs
A Tamersoy, K Roundy, S Bhatkar, E Khalil
US Patent 9,148,441, 2015
Systems and methods for preventing malicious network connections using correlation-based anomaly detection
A Tamersoy, K Roundy
US Patent 10,142,357, 2018
Visual Graph Query Construction and Refinement
R Pienta, F Hohman, A Tamersoy, A Endert, S Navathe, H Tong, DH Chau
Proceedings of the 2017 ACM International Conference on Management of Data …, 2017
Large-scale insider trading analysis: patterns and discoveries
A Tamersoy, E Khalil, B Xie, SL Lenkey, BR Routledge, DH Chau, ...
Social Network Analysis and Mining 4, 1-17, 2014
The role of computer security customer support in helping survivors of intimate partner violence
Y Zou, A McDonald, J Narakornpichit, N Dell, T Ristenpart, K Roundy, ...
30th USENIX security symposium (USENIX Security 21), 429-446, 2021
Exploring clinical care processes using visual and data analytics: challenges and opportunities
V Kumar, H Park, RC Basole, M Braunstein, M Kahng, DH Chau, ...
Proceedings of the 20th ACM SIGKDD conference on knowledge discovery and …, 2014
The system can't perform the operation now. Try again later.
Articles 1–20