On the Activity Privacy of Blockchain for IoT Authors: Ali Dorri, Clemence Roulin, Raja Jurdak, Salil Kanhere | Published: 2018-12-21 | Updated: 2019-03-14 IoT Traffic CharacteristicsUser Behavior AnalysisAttack Detection 2018.12.21 2025.05.28 Literature Database
IoTSense: Behavioral Fingerprinting of IoT Devices Authors: Bruhadeshwar Bezawada, Maalvika Bachani, Jordan Peterson, Hossein Shirazi, Indrakshi Ray, Indrajit Ray | Published: 2018-04-11 User Behavior AnalysisUser Behavior AnalysisCommunication Analysis 2018.04.11 2025.05.28 Literature Database
Recurrent Neural Network Attention Mechanisms for Interpretable System Log Anomaly Detection Authors: Andy Brown, Aaron Tuor, Brian Hutchinson, Nicole Nichols | Published: 2018-03-13 Data Generation MethodUser Behavior AnalysisMachine Learning Framework 2018.03.13 2025.05.28 Literature Database
Implicit Smartphone User Authentication with Sensors and Contextual Machine Learning Authors: Wei-Han Lee, Ruby B. Lee | Published: 2017-08-30 Sensor Information ManagementPrivacy Protection MethodUser Behavior Analysis 2017.08.30 2025.05.28 Literature Database
Knock Knock, Who’s There? Membership Inference on Aggregate Location Data Authors: Apostolos Pyrgelis, Carmela Troncoso, Emiliano De Cristofaro | Published: 2017-08-21 | Updated: 2017-11-29 Privacy Protection MethodPrivacy Loss AnalysisUser Behavior Analysis 2017.08.21 2025.05.28 Literature Database
Continuous User Authentication via Unlabeled Phone Movement Patterns Authors: Rajesh Kumar, Partha Pratim Kundu, Diksha Shukla, Vir V. Phoha | Published: 2017-08-15 Data Collection MethodModel Performance EvaluationUser Behavior Analysis 2017.08.15 2025.05.28 Literature Database
Fake News Detection on Social Media: A Data Mining Perspective Authors: Kai Shu, Amy Sliva, Suhang Wang, Jiliang Tang, Huan Liu | Published: 2017-08-07 | Updated: 2017-09-03 Dissemination of Misinformation on SNSUser Behavior AnalysisDetection of Misinformation 2017.08.07 2025.05.28 Literature Database
Robust Smartphone App Identification Via Encrypted Network Traffic Analysis Authors: Vincent F. Taylor, Riccardo Spolaor, Mauro conti, Ivan Martinovic | Published: 2017-04-20 Application Classification MethodUser Behavior AnalysisPerformance Evaluation Metrics 2017.04.20 2025.05.28 Literature Database