6 papers:
ISSTA-2013-ParkHV #comprehension #concurrent #data access #debugging #named- Griffin: grouping suspicious memory-access patterns to improve understanding of concurrency bugs (SP, MJH, RWV), pp. 134–144.
WCRE-2011-CheathamR- Function Insight: Highlighting Suspicious Sections in Binary Run Traces (MC, JR), pp. 433–434.
RecSys-2010-WuGC #identification #multi- Merging multiple criteria to identify suspicious reviews (GW, DG, PC), pp. 241–244.
ICML-2009-MaSSV #identification #learning #online #scalability- Identifying suspicious URLs: an application of large-scale online learning (JM, LKS, SS, GMV), pp. 681–688.
KDD-2009-MaSSV #detection #learning #web- Beyond blacklists: learning to detect malicious web sites from suspicious URLs (JM, LKS, SS, GMV), pp. 1245–1254.
LCTES-2007-HuangCTC #automation #fault #locality #statistics- Automated fault localization with statistically suspicious program states (TYH, PCC, CHT, HAC), pp. 11–20.