On the impact of warning interfaces for enabling the detection of Potentially Unwanted Applications Article Swipe
YOU?
·
· 2016
· Open Access
·
· DOI: https://doi.org/10.14722/eurousec.2016.23003
We conducted a large-scale online study with 26,000 software installations during which we asked user (participants) whether they wanted to enable or disable the detection of Potentially Unwanted Applications (PUAs -potentially malicious software, such as adware or spyware).PUAs are notoriously difficult to manage, e.g., legal challenges can preclude default options that could otherwise be set for PUAs detection or removal.Our study was performed with an IT security software provider (ESET) who gave us access to the participants (antivirus product beta users).We used a between-subjects design with 15 conditions (a starting-point control interface, and 14 new "warning" interfaces).Despite the fact that many software companies (e.g., Microsoft, AVAST, AVG, McAfee, Kaspersky Lab) are struggling with PUAs detection, there are few studies focused on this topic.Our results indicate a strong desire for PUAs detection by users.In particular, enabling PUAs detection was chosen by 74.5% of our participants for our initial control interface.Further, a modified interface in which the option to enable PUAs detection was presented first resulted in 89.8% of participants choosing to enable PUAs detection (a statistically significant increase from the control).
Related Topics
- Type
- article
- Language
- en
- Landing Page
- http://doi.org/10.14722/eurousec.2016.23003
- https://doi.org/10.14722/eurousec.2016.23003
- OA Status
- gold
- Cited By
- 3
- References
- 32
- Related Works
- 10
- OpenAlex ID
- https://openalex.org/W2587974508
Raw OpenAlex JSON
- OpenAlex ID
-
https://openalex.org/W2587974508Canonical identifier for this work in OpenAlex
- DOI
-
https://doi.org/10.14722/eurousec.2016.23003Digital Object Identifier
- Title
-
On the impact of warning interfaces for enabling the detection of Potentially Unwanted ApplicationsWork title
- Type
-
articleOpenAlex work type
- Language
-
enPrimary language
- Publication year
-
2016Year of publication
- Publication date
-
2016-01-01Full publication date if available
- Authors
-
Vlasta Šťavová, Vashek Matyáš, Mike JustList of authors in order
- Landing page
-
https://doi.org/10.14722/eurousec.2016.23003Publisher landing page
- PDF URL
-
https://doi.org/10.14722/eurousec.2016.23003Direct link to full text PDF
- Open access
-
YesWhether a free full text is available
- OA status
-
goldOpen access status per OpenAlex
- OA URL
-
https://doi.org/10.14722/eurousec.2016.23003Direct OA link when available
- Concepts
-
Software, Interface (matter), Computer science, Set (abstract data type), Computer security, Point (geometry), Control (management), Internet privacy, Human–computer interaction, Artificial intelligence, Operating system, Mathematics, Programming language, Geometry, Maximum bubble pressure method, BubbleTop concepts (fields/topics) attached by OpenAlex
- Cited by
-
3Total citation count in OpenAlex
- Citations by year (recent)
-
2019: 1, 2018: 2Per-year citation counts (last 5 years)
- References (count)
-
32Number of works referenced by this work
- Related works (count)
-
10Other works algorithmically related by OpenAlex
Full payload
| id | https://openalex.org/W2587974508 |
|---|---|
| doi | https://doi.org/10.14722/eurousec.2016.23003 |
| ids.doi | https://doi.org/10.14722/eurousec.2016.23003 |
| ids.mag | 2587974508 |
| ids.openalex | https://openalex.org/W2587974508 |
| fwci | 0.71433316 |
| type | article |
| title | On the impact of warning interfaces for enabling the detection of Potentially Unwanted Applications |
| biblio.issue | |
| biblio.volume | |
| biblio.last_page | |
| biblio.first_page | |
| topics[0].id | https://openalex.org/T11241 |
| topics[0].field.id | https://openalex.org/fields/17 |
| topics[0].field.display_name | Computer Science |
| topics[0].score | 0.9998999834060669 |
| topics[0].domain.id | https://openalex.org/domains/3 |
| topics[0].domain.display_name | Physical Sciences |
| topics[0].subfield.id | https://openalex.org/subfields/1711 |
| topics[0].subfield.display_name | Signal Processing |
| topics[0].display_name | Advanced Malware Detection Techniques |
| topics[1].id | https://openalex.org/T10734 |
| topics[1].field.id | https://openalex.org/fields/17 |
| topics[1].field.display_name | Computer Science |
| topics[1].score | 0.9979000091552734 |
| topics[1].domain.id | https://openalex.org/domains/3 |
| topics[1].domain.display_name | Physical Sciences |
| topics[1].subfield.id | https://openalex.org/subfields/1710 |
| topics[1].subfield.display_name | Information Systems |
| topics[1].display_name | Information and Cyber Security |
| topics[2].id | https://openalex.org/T11800 |
| topics[2].field.id | https://openalex.org/fields/17 |
| topics[2].field.display_name | Computer Science |
| topics[2].score | 0.9970999956130981 |
| topics[2].domain.id | https://openalex.org/domains/3 |
| topics[2].domain.display_name | Physical Sciences |
| topics[2].subfield.id | https://openalex.org/subfields/1710 |
| topics[2].subfield.display_name | Information Systems |
| topics[2].display_name | User Authentication and Security Systems |
| is_xpac | False |
| apc_list | |
| apc_paid | |
| concepts[0].id | https://openalex.org/C2777904410 |
| concepts[0].level | 2 |
| concepts[0].score | 0.6517051458358765 |
| concepts[0].wikidata | https://www.wikidata.org/wiki/Q7397 |
| concepts[0].display_name | Software |
| concepts[1].id | https://openalex.org/C113843644 |
| concepts[1].level | 4 |
| concepts[1].score | 0.6512731909751892 |
| concepts[1].wikidata | https://www.wikidata.org/wiki/Q901882 |
| concepts[1].display_name | Interface (matter) |
| concepts[2].id | https://openalex.org/C41008148 |
| concepts[2].level | 0 |
| concepts[2].score | 0.6029995679855347 |
| concepts[2].wikidata | https://www.wikidata.org/wiki/Q21198 |
| concepts[2].display_name | Computer science |
| concepts[3].id | https://openalex.org/C177264268 |
| concepts[3].level | 2 |
| concepts[3].score | 0.5996696949005127 |
| concepts[3].wikidata | https://www.wikidata.org/wiki/Q1514741 |
| concepts[3].display_name | Set (abstract data type) |
| concepts[4].id | https://openalex.org/C38652104 |
| concepts[4].level | 1 |
| concepts[4].score | 0.5195720195770264 |
| concepts[4].wikidata | https://www.wikidata.org/wiki/Q3510521 |
| concepts[4].display_name | Computer security |
| concepts[5].id | https://openalex.org/C28719098 |
| concepts[5].level | 2 |
| concepts[5].score | 0.5067351460456848 |
| concepts[5].wikidata | https://www.wikidata.org/wiki/Q44946 |
| concepts[5].display_name | Point (geometry) |
| concepts[6].id | https://openalex.org/C2775924081 |
| concepts[6].level | 2 |
| concepts[6].score | 0.5031291842460632 |
| concepts[6].wikidata | https://www.wikidata.org/wiki/Q55608371 |
| concepts[6].display_name | Control (management) |
| concepts[7].id | https://openalex.org/C108827166 |
| concepts[7].level | 1 |
| concepts[7].score | 0.3838537633419037 |
| concepts[7].wikidata | https://www.wikidata.org/wiki/Q175975 |
| concepts[7].display_name | Internet privacy |
| concepts[8].id | https://openalex.org/C107457646 |
| concepts[8].level | 1 |
| concepts[8].score | 0.36026349663734436 |
| concepts[8].wikidata | https://www.wikidata.org/wiki/Q207434 |
| concepts[8].display_name | Human–computer interaction |
| concepts[9].id | https://openalex.org/C154945302 |
| concepts[9].level | 1 |
| concepts[9].score | 0.2751179337501526 |
| concepts[9].wikidata | https://www.wikidata.org/wiki/Q11660 |
| concepts[9].display_name | Artificial intelligence |
| concepts[10].id | https://openalex.org/C111919701 |
| concepts[10].level | 1 |
| concepts[10].score | 0.1378682255744934 |
| concepts[10].wikidata | https://www.wikidata.org/wiki/Q9135 |
| concepts[10].display_name | Operating system |
| concepts[11].id | https://openalex.org/C33923547 |
| concepts[11].level | 0 |
| concepts[11].score | 0.08542072772979736 |
| concepts[11].wikidata | https://www.wikidata.org/wiki/Q395 |
| concepts[11].display_name | Mathematics |
| concepts[12].id | https://openalex.org/C199360897 |
| concepts[12].level | 1 |
| concepts[12].score | 0.0 |
| concepts[12].wikidata | https://www.wikidata.org/wiki/Q9143 |
| concepts[12].display_name | Programming language |
| concepts[13].id | https://openalex.org/C2524010 |
| concepts[13].level | 1 |
| concepts[13].score | 0.0 |
| concepts[13].wikidata | https://www.wikidata.org/wiki/Q8087 |
| concepts[13].display_name | Geometry |
| concepts[14].id | https://openalex.org/C129307140 |
| concepts[14].level | 3 |
| concepts[14].score | 0.0 |
| concepts[14].wikidata | https://www.wikidata.org/wiki/Q6795880 |
| concepts[14].display_name | Maximum bubble pressure method |
| concepts[15].id | https://openalex.org/C157915830 |
| concepts[15].level | 2 |
| concepts[15].score | 0.0 |
| concepts[15].wikidata | https://www.wikidata.org/wiki/Q2928001 |
| concepts[15].display_name | Bubble |
| keywords[0].id | https://openalex.org/keywords/software |
| keywords[0].score | 0.6517051458358765 |
| keywords[0].display_name | Software |
| keywords[1].id | https://openalex.org/keywords/interface |
| keywords[1].score | 0.6512731909751892 |
| keywords[1].display_name | Interface (matter) |
| keywords[2].id | https://openalex.org/keywords/computer-science |
| keywords[2].score | 0.6029995679855347 |
| keywords[2].display_name | Computer science |
| keywords[3].id | https://openalex.org/keywords/set |
| keywords[3].score | 0.5996696949005127 |
| keywords[3].display_name | Set (abstract data type) |
| keywords[4].id | https://openalex.org/keywords/computer-security |
| keywords[4].score | 0.5195720195770264 |
| keywords[4].display_name | Computer security |
| keywords[5].id | https://openalex.org/keywords/point |
| keywords[5].score | 0.5067351460456848 |
| keywords[5].display_name | Point (geometry) |
| keywords[6].id | https://openalex.org/keywords/control |
| keywords[6].score | 0.5031291842460632 |
| keywords[6].display_name | Control (management) |
| keywords[7].id | https://openalex.org/keywords/internet-privacy |
| keywords[7].score | 0.3838537633419037 |
| keywords[7].display_name | Internet privacy |
| keywords[8].id | https://openalex.org/keywords/human–computer-interaction |
| keywords[8].score | 0.36026349663734436 |
| keywords[8].display_name | Human–computer interaction |
| keywords[9].id | https://openalex.org/keywords/artificial-intelligence |
| keywords[9].score | 0.2751179337501526 |
| keywords[9].display_name | Artificial intelligence |
| keywords[10].id | https://openalex.org/keywords/operating-system |
| keywords[10].score | 0.1378682255744934 |
| keywords[10].display_name | Operating system |
| keywords[11].id | https://openalex.org/keywords/mathematics |
| keywords[11].score | 0.08542072772979736 |
| keywords[11].display_name | Mathematics |
| language | en |
| locations[0].id | doi:10.14722/eurousec.2016.23003 |
| locations[0].is_oa | True |
| locations[0].source | |
| locations[0].license | |
| locations[0].pdf_url | https://doi.org/10.14722/eurousec.2016.23003 |
| locations[0].version | publishedVersion |
| locations[0].raw_type | proceedings-article |
| locations[0].license_id | |
| locations[0].is_accepted | True |
| locations[0].is_published | True |
| locations[0].raw_source_name | Proceedings 1st European Workshop on Usable Security |
| locations[0].landing_page_url | http://doi.org/10.14722/eurousec.2016.23003 |
| indexed_in | crossref |
| authorships[0].author.id | https://openalex.org/A5045179446 |
| authorships[0].author.orcid | |
| authorships[0].author.display_name | Vlasta Šťavová |
| authorships[0].countries | CZ |
| authorships[0].affiliations[0].institution_ids | https://openalex.org/I21449261 |
| authorships[0].affiliations[0].raw_affiliation_string | Faculty of Informatics Masaryk University, Czech Republic |
| authorships[0].institutions[0].id | https://openalex.org/I21449261 |
| authorships[0].institutions[0].ror | https://ror.org/02j46qs45 |
| authorships[0].institutions[0].type | education |
| authorships[0].institutions[0].lineage | https://openalex.org/I21449261 |
| authorships[0].institutions[0].country_code | CZ |
| authorships[0].institutions[0].display_name | Masaryk University |
| authorships[0].author_position | first |
| authorships[0].raw_author_name | Vlasta Stavova |
| authorships[0].is_corresponding | False |
| authorships[0].raw_affiliation_strings | Faculty of Informatics Masaryk University, Czech Republic |
| authorships[1].author.id | https://openalex.org/A5089620979 |
| authorships[1].author.orcid | https://orcid.org/0000-0001-7957-7694 |
| authorships[1].author.display_name | Vashek Matyáš |
| authorships[1].countries | CZ |
| authorships[1].affiliations[0].institution_ids | https://openalex.org/I21449261 |
| authorships[1].affiliations[0].raw_affiliation_string | Faculty of Informatics Masaryk University, Czech Republic |
| authorships[1].institutions[0].id | https://openalex.org/I21449261 |
| authorships[1].institutions[0].ror | https://ror.org/02j46qs45 |
| authorships[1].institutions[0].type | education |
| authorships[1].institutions[0].lineage | https://openalex.org/I21449261 |
| authorships[1].institutions[0].country_code | CZ |
| authorships[1].institutions[0].display_name | Masaryk University |
| authorships[1].author_position | middle |
| authorships[1].raw_author_name | Vashek Matyas |
| authorships[1].is_corresponding | False |
| authorships[1].raw_affiliation_strings | Faculty of Informatics Masaryk University, Czech Republic |
| authorships[2].author.id | https://openalex.org/A5037048837 |
| authorships[2].author.orcid | https://orcid.org/0000-0002-9669-5067 |
| authorships[2].author.display_name | Mike Just |
| authorships[2].countries | GB |
| authorships[2].affiliations[0].institution_ids | https://openalex.org/I32062511 |
| authorships[2].affiliations[0].raw_affiliation_string | School of Mathematical & Computer Sciences Heriot-Watt University, United Kingdom |
| authorships[2].institutions[0].id | https://openalex.org/I32062511 |
| authorships[2].institutions[0].ror | https://ror.org/04mghma93 |
| authorships[2].institutions[0].type | education |
| authorships[2].institutions[0].lineage | https://openalex.org/I32062511 |
| authorships[2].institutions[0].country_code | GB |
| authorships[2].institutions[0].display_name | Heriot-Watt University |
| authorships[2].author_position | last |
| authorships[2].raw_author_name | Mike Just |
| authorships[2].is_corresponding | False |
| authorships[2].raw_affiliation_strings | School of Mathematical & Computer Sciences Heriot-Watt University, United Kingdom |
| has_content.pdf | True |
| has_content.grobid_xml | True |
| is_paratext | False |
| open_access.is_oa | True |
| open_access.oa_url | https://doi.org/10.14722/eurousec.2016.23003 |
| open_access.oa_status | gold |
| open_access.any_repository_has_fulltext | False |
| created_date | 2025-10-10T00:00:00 |
| display_name | On the impact of warning interfaces for enabling the detection of Potentially Unwanted Applications |
| has_fulltext | True |
| is_retracted | False |
| updated_date | 2025-11-06T03:46:38.306776 |
| primary_topic.id | https://openalex.org/T11241 |
| primary_topic.field.id | https://openalex.org/fields/17 |
| primary_topic.field.display_name | Computer Science |
| primary_topic.score | 0.9998999834060669 |
| primary_topic.domain.id | https://openalex.org/domains/3 |
| primary_topic.domain.display_name | Physical Sciences |
| primary_topic.subfield.id | https://openalex.org/subfields/1711 |
| primary_topic.subfield.display_name | Signal Processing |
| primary_topic.display_name | Advanced Malware Detection Techniques |
| related_works | https://openalex.org/W2378005410, https://openalex.org/W2048876619, https://openalex.org/W2170435352, https://openalex.org/W1570606890, https://openalex.org/W2123397376, https://openalex.org/W365436934, https://openalex.org/W1967797047, https://openalex.org/W1987533665, https://openalex.org/W2381929017, https://openalex.org/W2369108811 |
| cited_by_count | 3 |
| counts_by_year[0].year | 2019 |
| counts_by_year[0].cited_by_count | 1 |
| counts_by_year[1].year | 2018 |
| counts_by_year[1].cited_by_count | 2 |
| locations_count | 1 |
| best_oa_location.id | doi:10.14722/eurousec.2016.23003 |
| best_oa_location.is_oa | True |
| best_oa_location.source | |
| best_oa_location.license | |
| best_oa_location.pdf_url | https://doi.org/10.14722/eurousec.2016.23003 |
| best_oa_location.version | publishedVersion |
| best_oa_location.raw_type | proceedings-article |
| best_oa_location.license_id | |
| best_oa_location.is_accepted | True |
| best_oa_location.is_published | True |
| best_oa_location.raw_source_name | Proceedings 1st European Workshop on Usable Security |
| best_oa_location.landing_page_url | http://doi.org/10.14722/eurousec.2016.23003 |
| primary_location.id | doi:10.14722/eurousec.2016.23003 |
| primary_location.is_oa | True |
| primary_location.source | |
| primary_location.license | |
| primary_location.pdf_url | https://doi.org/10.14722/eurousec.2016.23003 |
| primary_location.version | publishedVersion |
| primary_location.raw_type | proceedings-article |
| primary_location.license_id | |
| primary_location.is_accepted | True |
| primary_location.is_published | True |
| primary_location.raw_source_name | Proceedings 1st European Workshop on Usable Security |
| primary_location.landing_page_url | http://doi.org/10.14722/eurousec.2016.23003 |
| publication_date | 2016-01-01 |
| publication_year | 2016 |
| referenced_works | https://openalex.org/W6653114100, https://openalex.org/W1480813933, https://openalex.org/W6686631123, https://openalex.org/W6680798542, https://openalex.org/W6664867985, https://openalex.org/W6688716199, https://openalex.org/W6639306757, https://openalex.org/W2117297156, https://openalex.org/W2413218663, https://openalex.org/W2075957209, https://openalex.org/W2092459821, https://openalex.org/W1984906108, https://openalex.org/W2087306070, https://openalex.org/W2123495254, https://openalex.org/W2276747357, https://openalex.org/W1600402038, https://openalex.org/W2013726449, https://openalex.org/W4299989282, https://openalex.org/W2057787526, https://openalex.org/W1860425661, https://openalex.org/W2142145056, https://openalex.org/W1512366833, https://openalex.org/W2797414521, https://openalex.org/W2551763599, https://openalex.org/W2139179587, https://openalex.org/W2144981153, https://openalex.org/W2216444195, https://openalex.org/W2185693257, https://openalex.org/W2169371034, https://openalex.org/W2157337727, https://openalex.org/W2011299700, https://openalex.org/W2312986000 |
| referenced_works_count | 32 |
| abstract_inverted_index.a | 2, 82, 125, 149 |
| abstract_inverted_index.(a | 88, 173 |
| abstract_inverted_index.14 | 93 |
| abstract_inverted_index.15 | 86 |
| abstract_inverted_index.IT | 65 |
| abstract_inverted_index.We | 0 |
| abstract_inverted_index.an | 64 |
| abstract_inverted_index.as | 34 |
| abstract_inverted_index.be | 53 |
| abstract_inverted_index.by | 131, 139 |
| abstract_inverted_index.in | 152, 164 |
| abstract_inverted_index.of | 25, 141, 166 |
| abstract_inverted_index.on | 120 |
| abstract_inverted_index.or | 21, 36, 58 |
| abstract_inverted_index.to | 19, 41, 74, 156, 169 |
| abstract_inverted_index.us | 72 |
| abstract_inverted_index.we | 12 |
| abstract_inverted_index.and | 92 |
| abstract_inverted_index.are | 38, 110, 116 |
| abstract_inverted_index.can | 46 |
| abstract_inverted_index.few | 117 |
| abstract_inverted_index.for | 55, 128, 144 |
| abstract_inverted_index.new | 94 |
| abstract_inverted_index.our | 142, 145 |
| abstract_inverted_index.set | 54 |
| abstract_inverted_index.the | 23, 75, 97, 154, 178 |
| abstract_inverted_index.was | 61, 137, 160 |
| abstract_inverted_index.who | 70 |
| abstract_inverted_index.AVG, | 106 |
| abstract_inverted_index.Lab) | 109 |
| abstract_inverted_index.PUAs | 56, 113, 129, 135, 158, 171 |
| abstract_inverted_index.beta | 79 |
| abstract_inverted_index.fact | 98 |
| abstract_inverted_index.from | 177 |
| abstract_inverted_index.gave | 71 |
| abstract_inverted_index.many | 100 |
| abstract_inverted_index.such | 33 |
| abstract_inverted_index.that | 50, 99 |
| abstract_inverted_index.they | 17 |
| abstract_inverted_index.this | 121 |
| abstract_inverted_index.used | 81 |
| abstract_inverted_index.user | 14 |
| abstract_inverted_index.with | 6, 63, 85, 112 |
| abstract_inverted_index.(PUAs | 29 |
| abstract_inverted_index.74.5% | 140 |
| abstract_inverted_index.89.8% | 165 |
| abstract_inverted_index.asked | 13 |
| abstract_inverted_index.could | 51 |
| abstract_inverted_index.e.g., | 43 |
| abstract_inverted_index.first | 162 |
| abstract_inverted_index.legal | 44 |
| abstract_inverted_index.study | 5, 60 |
| abstract_inverted_index.there | 115 |
| abstract_inverted_index.which | 11, 153 |
| abstract_inverted_index.(ESET) | 69 |
| abstract_inverted_index.(e.g., | 103 |
| abstract_inverted_index.26,000 | 7 |
| abstract_inverted_index.AVAST, | 105 |
| abstract_inverted_index.access | 73 |
| abstract_inverted_index.adware | 35 |
| abstract_inverted_index.chosen | 138 |
| abstract_inverted_index.design | 84 |
| abstract_inverted_index.desire | 127 |
| abstract_inverted_index.during | 10 |
| abstract_inverted_index.enable | 20, 157, 170 |
| abstract_inverted_index.online | 4 |
| abstract_inverted_index.option | 155 |
| abstract_inverted_index.strong | 126 |
| abstract_inverted_index.wanted | 18 |
| abstract_inverted_index.McAfee, | 107 |
| abstract_inverted_index.control | 90, 147 |
| abstract_inverted_index.default | 48 |
| abstract_inverted_index.disable | 22 |
| abstract_inverted_index.focused | 119 |
| abstract_inverted_index.initial | 146 |
| abstract_inverted_index.manage, | 42 |
| abstract_inverted_index.options | 49 |
| abstract_inverted_index.product | 78 |
| abstract_inverted_index.results | 123 |
| abstract_inverted_index.studies | 118 |
| abstract_inverted_index.whether | 16 |
| abstract_inverted_index.Unwanted | 27 |
| abstract_inverted_index.choosing | 168 |
| abstract_inverted_index.enabling | 134 |
| abstract_inverted_index.increase | 176 |
| abstract_inverted_index.indicate | 124 |
| abstract_inverted_index.modified | 150 |
| abstract_inverted_index.preclude | 47 |
| abstract_inverted_index.provider | 68 |
| abstract_inverted_index.resulted | 163 |
| abstract_inverted_index.security | 66 |
| abstract_inverted_index.software | 8, 67, 101 |
| abstract_inverted_index.users.In | 132 |
| abstract_inverted_index."warning" | 95 |
| abstract_inverted_index.Kaspersky | 108 |
| abstract_inverted_index.companies | 102 |
| abstract_inverted_index.conducted | 1 |
| abstract_inverted_index.control). | 179 |
| abstract_inverted_index.detection | 24, 57, 130, 136, 159, 172 |
| abstract_inverted_index.difficult | 40 |
| abstract_inverted_index.interface | 151 |
| abstract_inverted_index.malicious | 31 |
| abstract_inverted_index.otherwise | 52 |
| abstract_inverted_index.performed | 62 |
| abstract_inverted_index.presented | 161 |
| abstract_inverted_index.software, | 32 |
| abstract_inverted_index.topic.Our | 122 |
| abstract_inverted_index.users).We | 80 |
| abstract_inverted_index.(antivirus | 77 |
| abstract_inverted_index.Microsoft, | 104 |
| abstract_inverted_index.challenges | 45 |
| abstract_inverted_index.conditions | 87 |
| abstract_inverted_index.detection, | 114 |
| abstract_inverted_index.interface, | 91 |
| abstract_inverted_index.struggling | 111 |
| abstract_inverted_index.Potentially | 26 |
| abstract_inverted_index.large-scale | 3 |
| abstract_inverted_index.notoriously | 39 |
| abstract_inverted_index.particular, | 133 |
| abstract_inverted_index.removal.Our | 59 |
| abstract_inverted_index.significant | 175 |
| abstract_inverted_index.-potentially | 30 |
| abstract_inverted_index.Applications | 28 |
| abstract_inverted_index.participants | 76, 143, 167 |
| abstract_inverted_index.installations | 9 |
| abstract_inverted_index.spyware).PUAs | 37 |
| abstract_inverted_index.statistically | 174 |
| abstract_inverted_index.(participants) | 15 |
| abstract_inverted_index.starting-point | 89 |
| abstract_inverted_index.between-subjects | 83 |
| abstract_inverted_index.interface.Further, | 148 |
| abstract_inverted_index.interfaces).Despite | 96 |
| cited_by_percentile_year.max | 96 |
| cited_by_percentile_year.min | 90 |
| countries_distinct_count | 2 |
| institutions_distinct_count | 3 |
| citation_normalized_percentile.value | 0.75826355 |
| citation_normalized_percentile.is_in_top_1_percent | False |
| citation_normalized_percentile.is_in_top_10_percent | False |