{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T22:11:20Z","timestamp":1729635080731,"version":"3.28.0"},"reference-count":25,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,7]]},"DOI":"10.1109\/cisda.2012.6291524","type":"proceedings-article","created":{"date-parts":[[2012,9,7]],"date-time":"2012-09-07T19:58:22Z","timestamp":1347047902000},"page":"1-5","source":"Crossref","is-referenced-by-count":2,"title":["Toward the attribution of Web behavior"],"prefix":"10.1109","author":[{"given":"Myriam","family":"Abramson","sequence":"first","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1109\/ROBOT.1997.606886"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1007\/s10994-009-5140-8"},{"journal-title":"Log-linear Models and Conditional Random Fields","year":"0","author":"elkan","key":"18"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/5.18626"},{"key":"16","article-title":"Conditional random fields: Probabilistic models for segmenting and labeling sequence data","author":"lafferty","year":"0","journal-title":"International Conference on Machine Learning ICML 2001"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1145\/1102351.1102373"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1007\/s10994-009-5106-x"},{"key":"11","article-title":"Webwatcher: A learning apprentice for the world wide web","author":"armstrong","year":"0","journal-title":"Working Notes of the 1995 AAAI Spring Symp Information Gathering from Heterogeneous Distributed Environments"},{"key":"12","article-title":"Fewer clicks adn less frustration: Reducing the cost of reaching the right folder","author":"bao","year":"0","journal-title":"International Conference on Intelligent User Interfaces 2006"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1007\/s10994-009-5110-1"},{"key":"20","first-page":"663","article-title":"Algorithms for inverse reinforcement learning","author":"ng","year":"2000","journal-title":"Proc Seventh Int Conf Machine Learning"},{"journal-title":"EMCL\/PKDD 2007 Discovery Challenge","year":"0","key":"22"},{"key":"23","first-page":"189","article-title":"Effective prediction of web user behaviour with user-level models","volume":"89","author":"dembczyn?ski","year":"2008","journal-title":"Fundamenta Informaticae"},{"journal-title":"Jahmm An Implementation of Hidden Markov Models in Java","year":"2010","author":"francois","key":"24"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1145\/1656274.1656278"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1145\/371920.372097"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1145\/1242572.1242576"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.46"},{"journal-title":"The Purloined Letter","year":"1844","author":"poe","key":"1"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.21"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1145\/1772690.1772748"},{"key":"5","doi-asserted-by":"crossref","first-page":"49","DOI":"10.3233\/FI-2010-216","article-title":"Predicting website audience demographics for Web advertising targeting using multi-website clickstream data","volume":"98","author":"de bock","year":"2010","journal-title":"Fundamenta Informaticae"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1145\/1135777.1135811"},{"journal-title":"Clickprints on the Web Are There Signatures in Web Browsing Data?","year":"2006","author":"padmanabhan","key":"9"},{"key":"8","first-page":"333","article-title":"Replacing personally-identifying information in medical records, the scrub system","author":"sweeney","year":"1996","journal-title":"Proceedings of the AMIA Annual Fall Symposium"}],"event":{"name":"2012 IEEE Symposium on Computational Intelligence for Security and Defense Applications (CISDA)","start":{"date-parts":[[2012,7,11]]},"location":"Ottawa, ON, Canada","end":{"date-parts":[[2012,7,13]]}},"container-title":["2012 IEEE Symposium on Computational Intelligence for Security and Defence Applications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6279634\/6291498\/06291524.pdf?arnumber=6291524","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,7,13]],"date-time":"2020-07-13T10:06:20Z","timestamp":1594634780000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6291524\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,7]]},"references-count":25,"URL":"https:\/\/doi.org\/10.1109\/cisda.2012.6291524","relation":{},"subject":[],"published":{"date-parts":[[2012,7]]}}}