{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:08:01Z","timestamp":1750306081706,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":25,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,12,4]],"date-time":"2017-12-04T00:00:00Z","timestamp":1512345600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,12,4]]},"DOI":"10.1145\/3134600.3134617","type":"proceedings-article","created":{"date-parts":[[2017,12,4]],"date-time":"2017-12-04T19:18:32Z","timestamp":1512415112000},"page":"189-199","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["Predicting Cyber Threats with Virtual Security Products"],"prefix":"10.1145","author":[{"given":"Shang-Tse","family":"Chen","sequence":"first","affiliation":[{"name":"Georgia Tech"}]},{"given":"Yufei","family":"Han","sequence":"additional","affiliation":[{"name":"Symantec Research Labs"}]},{"given":"Duen Horng","family":"Chau","sequence":"additional","affiliation":[{"name":"Georgia Tech"}]},{"given":"Christopher","family":"Gates","sequence":"additional","affiliation":[{"name":"Symantec Research Labs"}]},{"given":"Michael","family":"Hart","sequence":"additional","affiliation":[{"name":"Symantec Research Labs"}]},{"given":"Kevin A.","family":"Roundy","sequence":"additional","affiliation":[{"name":"Symantec Research Labs"}]}],"member":"320","published-online":{"date-parts":[[2017,12,4]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Proceedings of the 12th AISTATS. 575--582","author":"Changhu Wang Lei Zhang","year":"2009","unstructured":"Lei Zhang Changhu Wang , Shuicheng Yan and Hongjiang Zhang . 2009 . Non-Negative Semi-Supervised Learning . In Proceedings of the 12th AISTATS. 575--582 . Lei Zhang Changhu Wang, Shuicheng Yan and Hongjiang Zhang. 2009. Non-Negative Semi-Supervised Learning. In Proceedings of the 12th AISTATS. 575--582."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611972818.12"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2013.6638293"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2010.231"},{"key":"e_1_3_2_1_5_1","volume-title":"Dhillon and Suvrit Sra","author":"Inderjit","year":"2005","unstructured":"Inderjit S. Dhillon and Suvrit Sra . 2005 . Generalized nonnegative matrix approximations with Bregman divergences. In Neural Information Processing Systems (NIPS) . 283--290. Inderjit S. Dhillon and Suvrit Sra. 2005. Generalized nonnegative matrix approximations with Bregman divergences. In Neural Information Processing Systems (NIPS). 283--290."},{"key":"e_1_3_2_1_6_1","volume-title":"Processings of the 21st AAAI Conference on Artificial Intelligence.","author":"Ding Chris Tao Li","year":"2006","unstructured":"Tao Li Ding Chris and Wei Peng . 2006 . Nonnegative Matrix Factorization and Probabilistic Latent Semantic Indexing: Equivalence Chi-Square Statistic and a Hybrid Method . In Processings of the 21st AAAI Conference on Artificial Intelligence. Tao Li Ding Chris and Wei Peng. 2006. Nonnegative Matrix Factorization and Probabilistic Latent Semantic Indexing: Equivalence Chi-Square Statistic and a Hybrid Method. In Processings of the 21st AAAI Conference on Artificial Intelligence."},{"key":"e_1_3_2_1_7_1","volume-title":"Efficient K-Nearest Neighbor Join Algorithms for High Dimensional Sparse Data. arXiv:1011.2807","author":"Jingjing Wang Zengyou He Ting Huang","year":"2010","unstructured":"Ting Huang Jingjing Wang Zengyou He Jijie Wang , Lei Lin . 2010. Efficient K-Nearest Neighbor Join Algorithms for High Dimensional Sparse Data. arXiv:1011.2807 ( 2010 ). Ting Huang Jingjing Wang Zengyou He Jijie Wang, Lei Lin. 2010. Efficient K-Nearest Neighbor Join Algorithms for High Dimensional Sparse Data. arXiv:1011.2807 (2010)."},{"key":"e_1_3_2_1_8_1","first-page":"2121","article-title":"Adaptive Subgradient Methods for Online Learning and Stochastic Optimization","volume":"12","author":"John Duchi Elad Hazan","year":"2011","unstructured":"Elad Hazan John Duchi and Yoram Singer . 2011 . Adaptive Subgradient Methods for Online Learning and Stochastic Optimization . Journal of Machine Learning Research 12 (2011), 2121 -- 2159 . Elad Hazan John Duchi and Yoram Singer. 2011. Adaptive Subgradient Methods for Online Learning and Stochastic Optimization. Journal of Machine Learning Research 12 (2011), 2121--2159.","journal-title":"Journal of Machine Learning Research"},{"key":"e_1_3_2_1_9_1","volume-title":"Proceedings of the 26th AAAI Confrerence on Artificial Intelligence. 928--934","author":"Josif Grabocka Alexandros Nanopoulos","year":"2012","unstructured":"Alexandros Nanopoulos Josif Grabocka and Lars Schmidt-Thieme . 2012 . Classification of Sparse Time Series via Supervised Matrix Factorization . In Proceedings of the 26th AAAI Confrerence on Artificial Intelligence. 928--934 . Alexandros Nanopoulos Josif Grabocka and Lars Schmidt-Thieme. 2012. Classification of Sparse Time Series via Supervised Matrix Factorization. In Proceedings of the 26th AAAI Confrerence on Artificial Intelligence. 928--934."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1080\/00401706.1979.10489819"},{"volume-title":"Neural Information Processing Systems (NIPS)","author":"Lee Daniel D.","key":"e_1_3_2_1_11_1","unstructured":"Daniel D. Lee and H. Sebastian Seung . 2000. Algorithms for Non-negative Matrix Factorization . In Neural Information Processing Systems (NIPS) . MIT Press , 556--562. Daniel D. Lee and H. Sebastian Seung. 2000. Algorithms for Non-negative Matrix Factorization. In Neural Information Processing Systems (NIPS). MIT Press, 556--562."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1557019.1557153"},{"key":"e_1_3_2_1_13_1","unstructured":"Jason Rennie Nathan  Srebro Nati and Tommi Jaakkola. 2004. Maximum Margin Matrix Factorizations. In Proceesings of Advances in Neural Information Processing Systems (NIPS).   Jason Rennie Nathan Srebro Nati and Tommi Jaakkola. 2004. Maximum Margin Matrix Factorizations. In Proceesings of Advances in Neural Information Processing Systems (NIPS)."},{"key":"e_1_3_2_1_14_1","volume-title":"Weighted Low-Rank Approximations. In In 20th International Conference on Machine Learning. 720--727","author":"Nati Nathan Srebro","year":"2003","unstructured":"Nathan Srebro Nati and Tommi Jaakkola . 2003 . Weighted Low-Rank Approximations. In In 20th International Conference on Machine Learning. 720--727 . Nathan Srebro Nati and Tommi Jaakkola. 2003. Weighted Low-Rank Approximations. In In 20th International Conference on Machine Learning. 720--727."},{"key":"e_1_3_2_1_15_1","unstructured":"United States Department of Labor. 2017. Information Security Analysts. (2017). https:\/\/www.bls.gov\/ooh\/computer-and-information-technology\/information-security-analysts.htm  United States Department of Labor. 2017. Information Security Analysts. (2017). https:\/\/www.bls.gov\/ooh\/computer-and-information-technology\/information-security-analysts.htm"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1242572.1242600"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1143844.1143931"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1454008.1454047"},{"key":"e_1_3_2_1_19_1","volume-title":"Malicious URL Detection using Machine Learning: A Survey. arXiv preprint arXiv:1701.07179","author":"Sahoo Doyen","year":"2017","unstructured":"Doyen Sahoo , Chenghao Liu , and Steven CH Hoi . 2017. Malicious URL Detection using Machine Learning: A Survey. arXiv preprint arXiv:1701.07179 ( 2017 ). Doyen Sahoo, Chenghao Liu, and Steven CH Hoi. 2017. Malicious URL Detection using Machine Learning: A Survey. arXiv preprint arXiv:1701.07179 (2017)."},{"volume-title":"2001 IEEE Symposium on Security and Privacy. 38--49","author":"Schultz Matthew G.","key":"e_1_3_2_1_20_1","unstructured":"Matthew G. Schultz , Eleazar Eskin , Erez Zadok , and Salvatore J. Stolfo . 2001. Data mining methods for detection of new malicious executables . In 2001 IEEE Symposium on Security and Privacy. 38--49 . Matthew G. Schultz, Eleazar Eskin, Erez Zadok, and Salvatore J. Stolfo. 2001. Data mining methods for detection of new malicious executables. In 2001 IEEE Symposium on Security and Privacy. 38--49."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1401890.1401969"},{"volume-title":"Proceedings of the European Conference on Machine Learning and Knowledge Discovery in Databases. 358--373","author":"Ajit","key":"e_1_3_2_1_22_1","unstructured":"Ajit P. Singh and Geoffrey J. Gordon. 2008. A Unified View of Matrix Factorization Models . In Proceedings of the European Conference on Machine Learning and Knowledge Discovery in Databases. 358--373 . Ajit P. Singh and Geoffrey J. Gordon. 2008. A Unified View of Matrix Factorization Models. In Proceedings of the European Conference on Machine Learning and Knowledge Discovery in Databases. 358--373."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2623330.2623342"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1281192.1281308"},{"key":"e_1_3_2_1_25_1","volume-title":"Proceedings of International Joint Conference on Artificial Intelligence","author":"Peng Han Yulei Niu Songfang Huang","year":"2015","unstructured":"Songfang Huang Peng Han Yulei Niu , Zhiwu Lu and Ji-Rong Wen . 2015 . Weakly Supervised Matrix Factorization for Noisily Tagged Image Parsing . In Proceedings of International Joint Conference on Artificial Intelligence 2015. 3749--3755. Songfang Huang Peng Han Yulei Niu, Zhiwu Lu and Ji-Rong Wen. 2015. Weakly Supervised Matrix Factorization for Noisily Tagged Image Parsing. In Proceedings of International Joint Conference on Artificial Intelligence 2015. 3749--3755."}],"event":{"name":"ACSAC 2017: 2017 Annual Computer Security Applications Conference","acronym":"ACSAC 2017","location":"Orlando FL USA"},"container-title":["Proceedings of the 33rd Annual Computer Security Applications Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3134600.3134617","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3134600.3134617","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:30:11Z","timestamp":1750217411000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3134600.3134617"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,12,4]]},"references-count":25,"alternative-id":["10.1145\/3134600.3134617","10.1145\/3134600"],"URL":"https:\/\/doi.org\/10.1145\/3134600.3134617","relation":{},"subject":[],"published":{"date-parts":[[2017,12,4]]},"assertion":[{"value":"2017-12-04","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}