User Activity Analysis

AI Total: Analyzing Security ML Models with Imperfect Data in Production

Authors: Awalin Sopan, Konstantin Berlin | Published: 2021-10-13
Data Management System
Model Selection
User Activity Analysis

Machine learning on knowledge graphs for context-aware security monitoring

Authors: Josep Soler Garrido, Dominik Dold, Johannes Frank | Published: 2021-05-18
ML-Based IDS
User Activity Analysis
Knowledge Graph

Identifying botnet IP address clusters using natural language processing techniques on honeypot command logs

Authors: Valentino Crespi, Wes Hardaker, Sami Abu-El-Haija, Aram Galstyan | Published: 2021-04-20
Command Analysis
User Activity Analysis
Time-Related Features

Machine Learning Based Cyber Attacks Targeting on Controlled Information: A Survey

Authors: Yuantian Miao, Chao Chen, Lei Pan, Qing-Long Han, Jun Zhang, Yang Xiang | Published: 2021-02-16 | Updated: 2021-11-15
Data Protection Method
Data Collection
User Activity Analysis

DYSAN: Dynamically sanitizing motion sensor data against sensitive inferences through adversarial networks

Authors: Claude Rosin Ngueveu, Antoine Boutet, Carole Frindel, Sébastien Gambs, Théo Jourdan, Claude Rosin | Published: 2020-03-23 | Updated: 2020-10-08
Training Method
Privacy Protection Method
User Activity Analysis

WebEye – Automated Collection of Malicious HTTP Traffic

Authors: Johann Vierthaler, Roman Kruszelnicki, Julian Schütte | Published: 2018-02-16
Data Collection
User Activity Analysis
Malicious Website Detection

Generative Models for Spear Phishing Posts on Social Media

Authors: John Seymour, Philip Tully | Published: 2018-02-14
Data Collection
User Activity Analysis
Machine Learning Method

PerfWeb: How to Violate Web Privacy with Hardware Performance Events

Authors: Berk Gulmezoglu, Andreas Zankl, Thomas Eisenbarth, Berk Sunar | Published: 2017-05-12
Performance Evaluation
Model Performance Evaluation
User Activity Analysis

Hate is not Binary: Studying Abusive Behavior of #GamerGate on Twitter

Authors: Despoina Chatzakou, Nicolas Kourtellis, Jeremy Blackburn, Emiliano De Cristofaro, Gianluca Stringhini, Athena Vakali | Published: 2017-05-09
Spam User Detection
User Activity Analysis
Sentiment Analysis