Autonomy Matters: A Study on Personalization-Privacy Dilemma in LLM Agents Authors: Zhiping Zhang, Yi Evie Zhang, Freda Shi, Tianshi Li | Published: 2025-10-06 Indirect Prompt InjectionPrivacy-Preserving Machine LearningUser Activity Analysis 2025.10.06 2025.10.08 Literature Database
It’s not Easy: Applying Supervised Machine Learning to Detect Malicious Extensions in the Chrome Web Store Authors: Ben Rosenzweig, Valentino Dalla Valle, Giovanni Apruzzese, Aurore Fass | Published: 2025-09-25 | Updated: 2025-10-02 Program AnalysisUser Activity AnalysisMalicious Package Detection 2025.09.25 2025.10.04 Literature Database
Improving Network Threat Detection by Knowledge Graph, Large Language Model, and Imbalanced Learning Authors: Lili Zhang, Quanyan Zhu, Herman Ray, Ying Xie | Published: 2025-01-26 | Updated: 2025-05-14 Network Threat DetectionUser Activity AnalysisImprovement of Learning 2025.01.26 2025.05.27 Literature Database
Autonomous Identity-Based Threat Segmentation in Zero Trust Architectures Authors: Sina Ahmadi | Published: 2025-01-10 Zero TrustUser Activity AnalysisDynamic Access Control 2025.01.10 2025.05.27 Literature Database
Exploring User Privacy Awareness on GitHub: An Empirical Study Authors: Costanza Alfieri, Juri Di Rocco, Paola Inverardi, Phuong T. Nguyen | Published: 2024-09-06 | Updated: 2024-09-10 Privacy ProtectionPrompt InjectionUser Activity Analysis 2024.09.06 2025.05.27 Literature Database
OverHear: Headphone based Multi-sensor Keystroke Inference Authors: Raveen Wijewickrama, Maryam Abbasihafshejani, Anindya Maiti, Murtuza Jadliwala | Published: 2023-11-04 FrameworkHeadphone UsageUser Activity Analysis 2023.11.04 2025.05.28 Literature Database
The Anatomy of Deception: Technical and Human Perspectives on a Large-scale Phishing Campaign Authors: Anargyros Chrysanthou, Yorgos Pantis, Constantinos Patsakis | Published: 2023-10-05 Data CollectionUser Activity AnalysisVictim Statistics 2023.10.05 2025.05.28 Literature Database
Motion ID: Human Authentication Approach Authors: Aleksei Gavron, Konstantin Belev, Konstantin Kudelkin, Vladislav Shikhov, Andrey Akushevich, Alexey Fartukov, Vladimir Paramonov, Dmitry Syromolotov, Artem Makoyan | Published: 2023-01-25 Data CollectionUser EducationUser Activity Analysis 2023.01.25 2025.05.28 Literature Database
COOKIEGRAPH: Understanding and Detecting First-Party Tracking Cookies Authors: Shaoor Munir, Sandra Siby, Umar Iqbal, Steven Englehardt, Zubair Shafiq, Carmela Troncoso | Published: 2022-08-25 | Updated: 2023-11-27 CybersecurityPrivacy ViolationUser Activity Analysis 2022.08.25 2025.05.28 Literature Database
Mouse Dynamics Behavioral Biometrics: A Survey Authors: Simon Khan, Charles Devlen, Michael Manno, Daqing Hou | Published: 2022-08-18 | Updated: 2024-05-01 User Activity AnalysisUser Authentication SystemUser Behavior Analysis 2022.08.18 2025.05.28 Literature Database