User Behavior Analysis

An AI-Driven VM Threat Prediction Model for Multi-Risks Analysis-Based Cloud Cybersecurity

Authors: Deepika Saxena, Ishu Gupta, Rishabh Gupta, Ashutosh Kumar Singh, Xiaoqing Wen | Published: 2023-08-18
VM Threat Prediction
User Behavior Analysis
Risk Prediction and Mitigation

mPSAuth: Privacy-Preserving and Scalable Authentication for Mobile Web Applications

Authors: David Monschein, Oliver P. Waldhorst | Published: 2022-10-07
Privacy Enhancing Technology
User Behavior Analysis
Threat Model

Lateral Movement Detection Using User Behavioral Analysis

Authors: Deepak Kushwaha, Dhruv Nandakumar, Akshay Kakkar, Sanvi Gupta, Kevin Choi, Christopher Redino, Abdul Rahman, Sabthagiri Saravanan Chandramohan, Edward Bowen, Matthew Weeks, Aaron Shaha, Joe Nehila | Published: 2022-08-29
User Behavior Analysis
Machine Learning Technology
Feature Extraction Method

Mouse Dynamics Behavioral Biometrics: A Survey

Authors: Simon Khan, Charles Devlen, Michael Manno, Daqing Hou | Published: 2022-08-18 | Updated: 2024-05-01
User Activity Analysis
User Authentication System
User Behavior Analysis

To remove or not remove Mobile Apps? A data-driven predictive model approach

Authors: Fadi Mohsen, Dimka Karastoyanova, George Azzopardi | Published: 2022-06-08
Data Management System
User Behavior Analysis
Feature Engineering

Exploration of Machine Learning Classification Models Used for Behavioral Biometrics Authentication

Authors: Sara Kokal, Laura Pryor, Rushit Dave | Published: 2022-04-19
User Behavior Analysis
Attack Type
Machine Learning Method

PhishMatch: A Layered Approach for Effective Detection of Phishing URLs

Authors: Harshal Tupsamudre, Sparsh Jain, Sachin Lodha | Published: 2021-12-04
Phishing Detection
Memory Management Method
User Behavior Analysis

Revisiting IoT Device Identification

Authors: Roman Kolcun, Diana Andreea Popescu, Vadim Safronov, Poonam Yadav, Anna Maria Mandalari, Richard Mortier, Hamed Haddadi | Published: 2021-07-16
User Behavior Analysis
Machine Learning Method
Adaptive Retraining Mechanism

Smartphone Impostor Detection with Behavioral Data Privacy and Minimalist Hardware Support

Authors: Guangyuan Hu, Zecheng He, Ruby B. Lee | Published: 2021-03-11 | Updated: 2021-03-17
Model Performance Evaluation
User Behavior Analysis
Deep Learning Method

An Assessment of the Usability of Machine Learning Based Tools for the Security Operations Center

Authors: Sean Oesch, Robert Bridges, Jared Smith, Justin Beaver, John Goodall, Kelly Huffer, Craig Miles, Dan Scofield | Published: 2020-12-16
User Behavior Analysis
Attack Detection
Role of Machine Learning