{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T03:47:13Z","timestamp":1743047233564,"version":"3.40.3"},"publisher-location":"Cham","reference-count":26,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783031105357"},{"type":"electronic","value":"9783031105364"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-031-10536-4_44","type":"book-chapter","created":{"date-parts":[[2022,7,22]],"date-time":"2022-07-22T07:03:10Z","timestamp":1658473390000},"page":"667-683","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Mining Web User Behavior: A Systematic Mapping Study"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9001-0736","authenticated-orcid":false,"given":"Nail","family":"Ta\u015fgetiren","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7908-5067","authenticated-orcid":false,"given":"Mehmet S.","family":"Aktas","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,7,23]]},"reference":[{"key":"44_CR1","doi-asserted-by":"crossref","unstructured":"Ahn, J., et al.: Open user profiles for adaptive news systems: help or harm? In: Proceedings of the 16th international conference on World Wide Web, pp. 11\u201320 (2007)","DOI":"10.1145\/1242572.1242575"},{"key":"44_CR2","doi-asserted-by":"crossref","unstructured":"Anitha, V., Isakki, P.: A survey on predicting user behavior based on web server log files in a web usage mining. In: 2016 International Conference on Computing Technologies and Intelligent Data Engineering (ICCTIDE 2016), pp. 1\u20134. IEEE (2016)","DOI":"10.1109\/ICCTIDE.2016.7725340"},{"key":"44_CR3","doi-asserted-by":"crossref","unstructured":"Budgen, D., Brereton, P.: Performing systematic literature reviews in software engineering. In: Proceedings of the 28th International Conference on Software Engineering, pp. 1051\u20131052 (2006)","DOI":"10.1145\/1134285.1134500"},{"issue":"4","key":"44_CR4","doi-asserted-by":"publisher","first-page":"373","DOI":"10.1007\/s13198-014-0266-x","volume":"6","author":"VS Dixit","year":"2014","unstructured":"Dixit, V.S., Bhatia, S.K.: Refinement and evaluation of web session cluster quality. Int. J. Syst. Assurance Eng. Manage. 6(4), 373\u2013389 (2014). https:\/\/doi.org\/10.1007\/s13198-014-0266-x","journal-title":"Int. J. Syst. Assurance Eng. Manage."},{"key":"44_CR5","doi-asserted-by":"crossref","unstructured":"Erdem, I., et al.: Test script generation based on hidden markov models learning from user browsing behaviors. In: 2021 IEEE International Conference on Big Data (Big Data), pp. 2998\u20133005. IEEE (2021)","DOI":"10.1109\/BigData52589.2021.9671312"},{"key":"44_CR6","unstructured":"Kalaichelvi, S.: Web mining classification: a survey. Int. J. Eng. Res. Technol. (IJERT) 53(3), 1\u201315 (2014)"},{"key":"44_CR7","unstructured":"Keele, S., et al.: Guidelines for performing systematic literature reviews in software engineering. Technical report, Ver. 2.3 EBSE Technical Report. EBSE (2007)"},{"key":"44_CR8","doi-asserted-by":"crossref","unstructured":"Lei, X.: Modeling and intelligent analysis of web user behavior of web user behavior. In: 2018 International Conference on Engineering Simulation and Intelligent Control (ESAIC), pp. 192\u2013195. IEEE (2018)","DOI":"10.1109\/ESAIC.2018.00052"},{"issue":"12","key":"44_CR9","doi-asserted-by":"publisher","first-page":"3090","DOI":"10.1109\/TKDE.2014.2316794","volume":"26","author":"Z Liao","year":"2014","unstructured":"Liao, Z., et al.: Task trail: an effective segmentation of user search behavior. IEEE Trans. Knowl. Data Eng. 26(12), 3090\u20133102 (2014)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"44_CR10","doi-asserted-by":"crossref","unstructured":"Luo, X., et al.: User behavior analysis based on user interest by web log mining. In: 2017 27th International Telecommunication Networks and Applications Conference (ITNAC), pp. 1\u20135. IEEE (2017)","DOI":"10.1109\/ATNAC.2017.8215435"},{"issue":"1","key":"44_CR11","doi-asserted-by":"publisher","first-page":"123","DOI":"10.1007\/s10639-014-9312-1","volume":"21","author":"R Mahajan","year":"2016","unstructured":"Mahajan, R., et al.: Usage patterns discovery from a web log in an Indian e-learning site: a case study. Educ. Inf. Technol. 21(1), 123\u2013148 (2016)","journal-title":"Educ. Inf. Technol."},{"key":"44_CR12","doi-asserted-by":"crossref","unstructured":"Nguyen, S.T.: Efficient web usage mining process for sequential patterns. In: Proceedings of the 11th International Conference on Information Integration and Web-based Applications & Services, pp. 465\u2013469 (2009)","DOI":"10.1145\/1806338.1806425"},{"issue":"11","key":"44_CR13","doi-asserted-by":"publisher","first-page":"1860","DOI":"10.1016\/j.infsof.2013.05.008","volume":"55","author":"RL Novais","year":"2013","unstructured":"Novais, R.L., et al.: Software evolution visualization: a systematic mapping study. Inf. Softw. Technol. 55(11), 1860\u20131883 (2013)","journal-title":"Inf. Softw. Technol."},{"key":"44_CR14","doi-asserted-by":"crossref","unstructured":"Oguz, R., et al.: Extracting information from large scale graph data: Case study on automated ui testing (2021)","DOI":"10.1007\/978-3-031-06156-1_29"},{"key":"44_CR15","doi-asserted-by":"crossref","unstructured":"Olmezogullari, E., Aktas, M.S.: Representation of click-stream datasequences for learning user navigational behavior by using embeddings. In: 2020 IEEE International Conference on Big Data (Big Data), pp. 3173\u20133179. IEEE (2020)","DOI":"10.1109\/BigData50022.2020.9378437"},{"issue":"9","key":"44_CR16","volume":"34","author":"E Olmezogullari","year":"2022","unstructured":"Olmezogullari, E., Aktas, M.S.: Pattern2vec: representation of clickstream data sequences for learning user navigational behavior. Concurrency Comput. Practice Exp. 34(9), e6546 (2022)","journal-title":"Concurrency Comput. Practice Exp."},{"key":"44_CR17","doi-asserted-by":"crossref","unstructured":"Omar, R., et al.: Web usage mining: a review of recent works. In: The 5th International Conference on Information and Communication Technology for The Muslim World (ICT4M), pp. 1\u20135. IEEE (2014)","DOI":"10.1109\/ICT4M.2014.7020638"},{"issue":"10","key":"44_CR18","doi-asserted-by":"publisher","first-page":"1447","DOI":"10.1142\/S0218194021500480","volume":"31","author":"M Oz","year":"2021","unstructured":"Oz, M., et al.: On the use of generative deep learning approaches for generating hidden test scripts. Int. J. Software Eng. Knowl. Eng. 31(10), 1447\u20131468 (2021)","journal-title":"Int. J. Software Eng. Knowl. Eng."},{"key":"44_CR19","unstructured":"Petersen, K., et al.: Systematic mapping studies in software engineering. In: 12th International Conference on Evaluation and Assessment in Software Engineering (EASE) 12, pp. 1\u201310 (2008)"},{"issue":"2","key":"44_CR20","doi-asserted-by":"publisher","first-page":"117","DOI":"10.1016\/S0167-9236(01)00106-3","volume":"32","author":"T Raghu","year":"2001","unstructured":"Raghu, T., et al.: Dynamic profiling of consumers for customized offerings over the internet: a model and analysis. Decis. Support Syst. 32(2), 117\u2013134 (2001)","journal-title":"Decis. Support Syst."},{"issue":"3","key":"44_CR21","doi-asserted-by":"publisher","first-page":"828","DOI":"10.1016\/j.compedu.2009.05.003","volume":"53","author":"C Romero","year":"2009","unstructured":"Romero, C., et al.: Applying web usage mining for personalizing hyperlinks in web-based adaptive educational systems. Comput. Educ. 53(3), 828\u2013840 (2009)","journal-title":"Comput. Educ."},{"key":"44_CR22","doi-asserted-by":"crossref","unstructured":"S\u0131lahtaro\u011flu, G., D\u00f6nerta\u015fli, H.: Analysis and prediction of e-customers\u2019 behavior by mining clickstream data. In: 2015 IEEE International Conference on Big Data (Big Data), pp. 1466\u20131472. Ieee (2015)","DOI":"10.1109\/BigData.2015.7363908"},{"issue":"2","key":"44_CR23","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1145\/846183.846188","volume":"1","author":"J Srivastava","year":"2000","unstructured":"Srivastava, J., et al.: Web usage mining: discovery and applications of usage patterns from web data. ACM SIGKDD Explorations Newsl. 1(2), 12\u201323 (2000)","journal-title":"ACM SIGKDD Explorations Newsl."},{"key":"44_CR24","doi-asserted-by":"crossref","unstructured":"Uygun, Y., et al.: On the large-scale graph data processing for user interface testing in big data science projects. In: 2020 IEEE International Conference on Big Data (Big Data), pp. 2049\u20132056. IEEE (2020)","DOI":"10.1109\/BigData50022.2020.9378153"},{"key":"44_CR25","doi-asserted-by":"crossref","unstructured":"Wang, G., et al.: Unsupervised clickstream clustering for user behavior analysis. In: Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, pp. 225\u2013236 (2016)","DOI":"10.1145\/2858036.2858107"},{"key":"44_CR26","doi-asserted-by":"crossref","unstructured":"Yin, B., et al.: Research and application of data mining technology used in the analysis of smart home user behavior. In: 2014 Sixth International Conference on Measuring Technology and Mechatronics Automation, pp. 476\u2013479. IEEE (2014)","DOI":"10.1109\/ICMTMA.2014.117"}],"container-title":["Lecture Notes in Computer Science","Computational Science and Its Applications \u2013 ICCSA 2022 Workshops"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-10536-4_44","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,29]],"date-time":"2024-09-29T17:15:36Z","timestamp":1727630136000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-10536-4_44"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783031105357","9783031105364"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-10536-4_44","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"23 July 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICCSA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Computational Science and Its Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Malaga","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Spain","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4 July 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7 July 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iccsa2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/iccsa.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"CyberChair 4","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"279","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"57","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"24","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"20% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2.6","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"8.7","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"285 Workshop submission accepted out of 815 submissions","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}