Follow
Acar Tamersoy
Acar Tamersoy
Senior Research Scientist at NortonLifeLock Research Group
Verified email at gatech.edu - Homepage
Title
Cited by
Cited by
Year
Guilt by Association: Large Scale Malware Detection by Mining File-relation Graphs
A Tamersoy, K Roundy, DH Chau
Proceedings of the 20th ACM SIGKDD international conference on Knowledge …, 2014
2072014
Click traffic analysis of short url spam on twitter
D Wang, SB Navathe, L Liu, D Irani, A Tamersoy, C Pu
9th IEEE International Conference on Collaborative Computing: Networking …, 2013
1052013
Characterizing Smoking and Drinking Abstinence from Social Media
A Tamersoy, M De Choudhury, DH Chau
Proceedings of the 26th ACM Conference on Hypertext & Social Media, 139-148, 2015
1042015
Secure and utility-aware data collection with condensed local differential privacy
ME Gursoy, A Tamersoy, S Truex, W Wei, L Liu
IEEE Transactions on Dependable and Secure Computing 18 (5), 2365-2378, 2019
872019
Systems and methods for using event-correlation graphs to detect attacks on computing systems
K Roundy, F Guo, S Bhatkar, T Cheng, J Fu, ZK Li, D Shou, S Sawhney, ...
US Patent 9,141,790, 2015
852015
Anonymization of longitudinal electronic medical records
A Tamersoy, G Loukides, ME Nergiz, Y Saygin, B Malin
IEEE Transactions on Information Technology in Biomedicine 16 (3), 413-423, 2012
792012
Vigor: Interactive visual exploration of graph query results
R Pienta, F Hohman, A Endert, A Tamersoy, K Roundy, C Gates, ...
IEEE transactions on visualization and computer graphics 24 (1), 215-225, 2017
672017
Understanding variations in pediatric asthma care processes in the emergency department using visual analytics
RC Basole, ML Braunstein, V Kumar, H Park, M Kahng, DHP Chau, ...
Journal of the American Medical Informatics Association 22 (2), 318-323, 2015
672015
Examining the Adoption and Abandonment of Security, Privacy, and Identity Theft Protection Practices
Y Zou, K Roundy, A Tamersoy, S Shintre, J Roturier, F Schaub
Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems …, 2020
642020
Trauma-informed computing: Towards safer technology experiences for all
JX Chen, A McDonald, Y Zou, E Tseng, KA Roundy, A Tamersoy, ...
Proceedings of the 2022 CHI Conference on Human Factors in Computing Systems …, 2022
612022
Mage: Matching approximate patterns in richly-attributed graphs
R Pienta, A Tamersoy, H Tong, DH Chau
2014 IEEE International Conference on Big Data (Big Data), 585-590, 2014
552014
Generating Graph Snapshots from Streaming Edge Data
S Soundarajan, A Tamersoy, EB Khalil, T Eliassi-Rad, DH Chau, ...
Proceedings of the 25th International Conference Companion on World Wide Web …, 2016
522016
The many kinds of creepware used for interpersonal attacks
KA Roundy, PB Mendelberg, N Dell, D McCoy, D Nissani, T Ristenpart, ...
2020 IEEE Symposium on Security and Privacy (SP), 626-643, 2020
442020
Systems and methods for adjusting suspiciousness scores in event-correlation graphs
A Tamersoy, K Roundy, S Bhatkar, E Khalil
US Patent 9,148,441, 2015
402015
Systems and methods for preventing malicious network connections using correlation-based anomaly detection
A Tamersoy, K Roundy
US Patent 10,142,357, 2018
392018
VISAGE: Interactive Visual Graph Querying
R Pienta, A Tamersoy, A Endert, S Navathe, H Tong, DH Chau
Proceedings of the International Working Conference on Advanced Visual …, 2016
392016
Visual Graph Query Construction and Refinement
R Pienta, F Hohman, A Tamersoy, A Endert, S Navathe, H Tong, DH Chau
Proceedings of the 2017 ACM International Conference on Management of Data …, 2017
292017
Large-scale insider trading analysis: patterns and discoveries
A Tamersoy, E Khalil, B Xie, SL Lenkey, BR Routledge, DH Chau, ...
Social Network Analysis and Mining 4, 1-17, 2014
262014
Exploring clinical care processes using visual and data analytics: challenges and opportunities
V Kumar, H Park, RC Basole, M Braunstein, M Kahng, DH Chau, ...
Proceedings of the 20th ACM SIGKDD conference on knowledge discovery and …, 2014
232014
The role of computer security customer support in helping survivors of intimate partner violence
Y Zou, A McDonald, J Narakornpichit, N Dell, T Ristenpart, K Roundy, ...
30th USENIX security symposium (USENIX Security 21), 429-446, 2021
222021
The system can't perform the operation now. Try again later.
Articles 1–20