Improving Network Threat Detection by Knowledge Graph, Large Language Model, and Imbalanced Learning Authors: Lili Zhang, Quanyan Zhu, Herman Ray, Ying Xie | Published: 2025-01-26 | Updated: 2025-05-14 Network Threat DetectionUser Activity AnalysisImprovement of Learning 2025.01.26 2025.05.27 Literature Database
Autonomous Identity-Based Threat Segmentation in Zero Trust Architectures Authors: Sina Ahmadi | Published: 2025-01-10 Zero TrustUser Activity AnalysisDynamic Access Control 2025.01.10 2025.05.27 Literature Database
Exploring User Privacy Awareness on GitHub: An Empirical Study Authors: Costanza Alfieri, Juri Di Rocco, Paola Inverardi, Phuong T. Nguyen | Published: 2024-09-06 | Updated: 2024-09-10 Privacy ProtectionPrompt InjectionUser Activity Analysis 2024.09.06 2025.05.27 Literature Database
OverHear: Headphone based Multi-sensor Keystroke Inference Authors: Raveen Wijewickrama, Maryam Abbasihafshejani, Anindya Maiti, Murtuza Jadliwala | Published: 2023-11-04 FrameworkHeadphone UsageUser Activity Analysis 2023.11.04 2025.05.28 Literature Database
The Anatomy of Deception: Technical and Human Perspectives on a Large-scale Phishing Campaign Authors: Anargyros Chrysanthou, Yorgos Pantis, Constantinos Patsakis | Published: 2023-10-05 Data CollectionUser Activity AnalysisVictim Statistics 2023.10.05 2025.05.28 Literature Database
Motion ID: Human Authentication Approach Authors: Aleksei Gavron, Konstantin Belev, Konstantin Kudelkin, Vladislav Shikhov, Andrey Akushevich, Alexey Fartukov, Vladimir Paramonov, Dmitry Syromolotov, Artem Makoyan | Published: 2023-01-25 Data CollectionUser EducationUser Activity Analysis 2023.01.25 2025.05.28 Literature Database
COOKIEGRAPH: Understanding and Detecting First-Party Tracking Cookies Authors: Shaoor Munir, Sandra Siby, Umar Iqbal, Steven Englehardt, Zubair Shafiq, Carmela Troncoso | Published: 2022-08-25 | Updated: 2023-11-27 CybersecurityPrivacy ViolationUser Activity Analysis 2022.08.25 2025.05.28 Literature Database
Mouse Dynamics Behavioral Biometrics: A Survey Authors: Simon Khan, Charles Devlen, Michael Manno, Daqing Hou | Published: 2022-08-18 | Updated: 2024-05-01 User Activity AnalysisUser Authentication SystemUser Behavior Analysis 2022.08.18 2025.05.28 Literature Database
Hide and Seek: on the Stealthiness of Attacks against Deep Learning Systems Authors: Zeyan Liu, Fengjun Li, Jingqiang Lin, Zhu Li, Bo Luo | Published: 2022-05-31 | Updated: 2022-08-12 Attack Methods against DFLBackdoor AttackUser Activity Analysis 2022.05.31 2025.05.28 Literature Database
Machine Learning Algorithms In User Authentication Schemes Authors: Laura Pryor, Rushit Dave, Naeem Seliya, Evelyn R Sowells Boone | Published: 2021-10-15 User Activity AnalysisPerformance Evaluation MetricsMachine Learning Algorithm 2021.10.15 2025.05.28 Literature Database