User Activity Analysis

Improving Network Threat Detection by Knowledge Graph, Large Language Model, and Imbalanced Learning

Authors: Lili Zhang, Quanyan Zhu, Herman Ray, Ying Xie | Published: 2025-01-26 | Updated: 2025-05-14
Network Threat Detection
User Activity Analysis
Improvement of Learning

Autonomous Identity-Based Threat Segmentation in Zero Trust Architectures

Authors: Sina Ahmadi | Published: 2025-01-10
Zero Trust
User Activity Analysis
Dynamic Access Control

Exploring User Privacy Awareness on GitHub: An Empirical Study

Authors: Costanza Alfieri, Juri Di Rocco, Paola Inverardi, Phuong T. Nguyen | Published: 2024-09-06 | Updated: 2024-09-10
Privacy Protection
Prompt Injection
User Activity Analysis

OverHear: Headphone based Multi-sensor Keystroke Inference

Authors: Raveen Wijewickrama, Maryam Abbasihafshejani, Anindya Maiti, Murtuza Jadliwala | Published: 2023-11-04
Framework
Headphone Usage
User Activity Analysis

The Anatomy of Deception: Technical and Human Perspectives on a Large-scale Phishing Campaign

Authors: Anargyros Chrysanthou, Yorgos Pantis, Constantinos Patsakis | Published: 2023-10-05
Data Collection
User Activity Analysis
Victim Statistics

Motion ID: Human Authentication Approach

Authors: Aleksei Gavron, Konstantin Belev, Konstantin Kudelkin, Vladislav Shikhov, Andrey Akushevich, Alexey Fartukov, Vladimir Paramonov, Dmitry Syromolotov, Artem Makoyan | Published: 2023-01-25
Data Collection
User Education
User Activity Analysis

COOKIEGRAPH: Understanding and Detecting First-Party Tracking Cookies

Authors: Shaoor Munir, Sandra Siby, Umar Iqbal, Steven Englehardt, Zubair Shafiq, Carmela Troncoso | Published: 2022-08-25 | Updated: 2023-11-27
Cybersecurity
Privacy Violation
User Activity Analysis

Mouse Dynamics Behavioral Biometrics: A Survey

Authors: Simon Khan, Charles Devlen, Michael Manno, Daqing Hou | Published: 2022-08-18 | Updated: 2024-05-01
User Activity Analysis
User Authentication System
User Behavior Analysis

Hide and Seek: on the Stealthiness of Attacks against Deep Learning Systems

Authors: Zeyan Liu, Fengjun Li, Jingqiang Lin, Zhu Li, Bo Luo | Published: 2022-05-31 | Updated: 2022-08-12
Attack Methods against DFL
Backdoor Attack
User Activity Analysis

Machine Learning Algorithms In User Authentication Schemes

Authors: Laura Pryor, Rushit Dave, Naeem Seliya, Evelyn R Sowells Boone | Published: 2021-10-15
User Activity Analysis
Performance Evaluation Metrics
Machine Learning Algorithm