An AI-Driven VM Threat Prediction Model for Multi-Risks Analysis-Based Cloud Cybersecurity Authors: Deepika Saxena, Ishu Gupta, Rishabh Gupta, Ashutosh Kumar Singh, Xiaoqing Wen | Published: 2023-08-18 VM Threat PredictionUser Behavior AnalysisRisk Prediction and Mitigation 2023.08.18 2025.05.28 Literature Database
mPSAuth: Privacy-Preserving and Scalable Authentication for Mobile Web Applications Authors: David Monschein, Oliver P. Waldhorst | Published: 2022-10-07 Privacy Enhancing TechnologyUser Behavior AnalysisThreat Model 2022.10.07 2025.05.28 Literature Database
Lateral Movement Detection Using User Behavioral Analysis Authors: Deepak Kushwaha, Dhruv Nandakumar, Akshay Kakkar, Sanvi Gupta, Kevin Choi, Christopher Redino, Abdul Rahman, Sabthagiri Saravanan Chandramohan, Edward Bowen, Matthew Weeks, Aaron Shaha, Joe Nehila | Published: 2022-08-29 User Behavior AnalysisMachine Learning TechnologyFeature Extraction Method 2022.08.29 2025.05.28 Literature Database
Mouse Dynamics Behavioral Biometrics: A Survey Authors: Simon Khan, Charles Devlen, Michael Manno, Daqing Hou | Published: 2022-08-18 | Updated: 2024-05-01 User Activity AnalysisUser Authentication SystemUser Behavior Analysis 2022.08.18 2025.05.28 Literature Database
To remove or not remove Mobile Apps? A data-driven predictive model approach Authors: Fadi Mohsen, Dimka Karastoyanova, George Azzopardi | Published: 2022-06-08 Data Management SystemUser Behavior AnalysisFeature Engineering 2022.06.08 2025.05.28 Literature Database
Exploration of Machine Learning Classification Models Used for Behavioral Biometrics Authentication Authors: Sara Kokal, Laura Pryor, Rushit Dave | Published: 2022-04-19 User Behavior AnalysisAttack TypeMachine Learning Method 2022.04.19 2025.05.28 Literature Database
PhishMatch: A Layered Approach for Effective Detection of Phishing URLs Authors: Harshal Tupsamudre, Sparsh Jain, Sachin Lodha | Published: 2021-12-04 Phishing DetectionMemory Management MethodUser Behavior Analysis 2021.12.04 2025.05.28 Literature Database
Revisiting IoT Device Identification Authors: Roman Kolcun, Diana Andreea Popescu, Vadim Safronov, Poonam Yadav, Anna Maria Mandalari, Richard Mortier, Hamed Haddadi | Published: 2021-07-16 User Behavior AnalysisMachine Learning MethodAdaptive Retraining Mechanism 2021.07.16 2025.05.28 Literature Database
Smartphone Impostor Detection with Behavioral Data Privacy and Minimalist Hardware Support Authors: Guangyuan Hu, Zecheng He, Ruby B. Lee | Published: 2021-03-11 | Updated: 2021-03-17 Model Performance EvaluationUser Behavior AnalysisDeep Learning Method 2021.03.11 2025.05.28 Literature Database
An Assessment of the Usability of Machine Learning Based Tools for the Security Operations Center Authors: Sean Oesch, Robert Bridges, Jared Smith, Justin Beaver, John Goodall, Kelly Huffer, Craig Miles, Dan Scofield | Published: 2020-12-16 User Behavior AnalysisAttack DetectionRole of Machine Learning 2020.12.16 2025.05.28 Literature Database