![]() | Up a level |
This graph maps the connections between all the collaborators of {}'s publications listed on this page.
Each link represents a collaboration on the same publication. The thickness of the link represents the number of collaborations.
Use the mouse wheel or scroll gestures to zoom into the graph.
You can click on the nodes and links to highlight them and move the nodes by dragging them.
Hold down the "Ctrl" key or the "⌘" key while clicking on the nodes to open the list of this person's publications.
A word cloud is a visual representation of the most frequently used words in a text or a set of texts. The words appear in different sizes, with the size of each word being proportional to its frequency of occurrence in the text. The more frequently a word is used, the larger it appears in the word cloud. This technique allows for a quick visualization of the most important themes and concepts in a text.
In the context of this page, the word cloud was generated from the publications of the author {}. The words in this cloud come from the titles, abstracts, and keywords of the author's articles and research papers. By analyzing this word cloud, you can get an overview of the most recurring and significant topics and research areas in the author's work.
The word cloud is a useful tool for identifying trends and main themes in a corpus of texts, thus facilitating the understanding and analysis of content in a visual and intuitive way.
Barrera, D., Kayacic, H. G., Oorschot, P. C., & Somayaji, A. (2010, October). A methodology for empirical analysis of permission-based security models and its application to android [Paper]. 17th ACM Conference on Computer and Communications Security (CCS 2010), Chicago, Illinois. External link
Calvet, J., Davis, C. R., Fernandez, J. M., Marion, J.-Y., St-Onge, P.-L., Guizani, W., Bureau, P.-M., & Somayaji, A. (2010, December). The case for in-the-lab botnet experimentation: creating and taking down a 3000-node botnet [Paper]. 26th Annual Computer Security Applications Conference, Austin, TX, USA. External link
Lalonde Lévesque, F., Chiasson, S., Somayaji, A., & Fernandez, J. M. (2018). Technological and Human Factors of Malware Attacks: A Computer Security Clinical Trial Approach. ACM Transactions on Privacy and Security (TOPS), 21(4), 1-30. External link
Lalonde Lévesque, F., Fernandez, J. M., Somayaji, A., & Batchelder, D. (2016, June). National-level risk assessment : a multi-country study of malware infections [Paper]. 15th Annual Workshop on the Economics of Information Security (WEIS 2016), Berkeley, CA (30 pages). External link
Lalonde Lévesque, F., Somayaji, A., Batchelder, D., & Fernandez, J. M. (2015, October). Measuring the health of antivirus ecosystems [Paper]. 10th International Conference on Malicious and Unwanted Software (MALWARE 2015), Fajardo, PR, USA. External link
Lalonde Lévesque, F., Fernandez, J. M., & Somayaji, A. (2014, October). Risk prediction of malware victimization based on user behavior [Paper]. 9th International Conference on Malicious and Unwanted Software: The Americas, MALWARE 2014, Fajardo, Puerto Rico, USA. External link
Lalonde Lévesque, F., Nsiempba, J. J., Fernandez, J. M., Chiasson, S., & Somayaji, A. (2013, November). A clinical study of risk factors related to malware infections [Paper]. ACM SIGSAC Conference on Computer and Communications Security (CCS 2013), Berlin, Germany. External link
Lalonde Lévesque, F., Davis, C. R., Fernandez, J. M., & Somayaji, A. (2012, September). Evaluating anti-virus products with field studies [Paper]. 22nd Virus Bulletin International Conference, Dallas, TX, USA. External link
Lalonde Lévesque, F., Davis, C. R., Fernandez, J. M., Chiasson, S., & Somayaji, A. (2012, March). Methodology for a field study of anti-malware software [Paper]. 16th International Conference on Financial Cryptography and Data Security : FC 2012 Workshops, USEC and WECSR 2012, Kralendijk, Bonaire, Netherlands. External link
Somayaji, A., Li, Y., Inoue, H., Fernandez, J. M., & Ford, R. (2009, August). Evaluating Security Products with Clinical Trials [Paper]. 2nd Workshop on Cyber security Experimentation and Test (CSET 2009), Montréal, Québec. External link