User Behavior Analysis

When Handshakes Tell the Truth: Detecting Web Bad Bots via TLS Fingerprints

Authors: Ghalia Jarad, Kemal Bicakci | Published: 2026-02-10
TLSフィンガープリント
Indirect Prompt Injection
User Behavior Analysis

When Bots Take the Bait: Exposing and Mitigating the Emerging Social Engineering Attack in Web Automation Agent

Authors: Xinyi Wu, Geng Hong, Yueyue Chen, MingXuan Liu, Feier Jin, Xudong Pan, Jiarun Dai, Baojun Liu | Published: 2026-01-12
Indirect Prompt Injection
Prompt Injection
User Behavior Analysis

Chimera: Harnessing Multi-Agent LLMs for Automatic Insider Threat Simulation

Authors: Jiongchi Yu, Xiaofei Xie, Qiang Hu, Yuhan Ma, Ziming Zhao | Published: 2025-08-11
Indirect Prompt Injection
Data Collection
User Behavior Analysis

Leveraging large language models for SQL behavior-based database intrusion detection

Authors: Meital Shlezinger, Shay Akirav, Lei Zhou, Liang Guo, Avi Kessel, Guoliang Li | Published: 2025-08-06 | Updated: 2025-08-14
Ensemble Learning
Data Preprocessing
User Behavior Analysis

Unlocking User-oriented Pages: Intention-driven Black-box Scanner for Real-world Web Applications

Authors: Weizhe Wang, Yao Zhang, Kaitai Liang, Guangquan Xu, Hongpeng Bai, Qingyang Yan, Xi Zheng, Bin Wu | Published: 2025-04-29 | Updated: 2025-04-30
Content Compression Techniques
User Behavior Analysis
Vulnerability Assessment Method

The Evolution of Zero Trust Architecture (ZTA) from Concept to Implementation

Authors: Md Nasiruzzaman, Maaruf Ali, Iftekhar Salam, Mahdi H. Miraz | Published: 2025-04-16
Misuse of Security API
Data-Centric Security
User Behavior Analysis

The Obvious Invisible Threat: LLM-Powered GUI Agents’ Vulnerability to Fine-Print Injections

Authors: Chaoran Chen, Zhiping Zhang, Bingcan Guo, Shang Ma, Ibrahim Khalilov, Simret A Gebreegziabher, Yanfang Ye, Ziang Xiao, Yaxing Yao, Tianshi Li, Toby Jia-Jun Li | Published: 2025-04-15
Indirect Prompt Injection
Privacy Protection Mechanism
User Behavior Analysis

Training language models to follow instructions with human feedback

Authors: Long Ouyang, Jeff Wu, Xu Jiang, Diogo Almeida, Carroll L. Wainwright, Pamela Mishkin, Chong Zhang, Sandhini Agarwal, Katarina Slama, Alex Ray, John Schulman, Jacob Hilton, Fraser Kelton, Luke Miller, Maddie Simens, Amanda Askell, Peter Welinder, Paul Christiano, Jan Leike, Ryan Lowe | Published: 2022-03-04
Alignment
User Behavior Analysis
Performance Evaluation

Detection of Insider Threats using Artificial Intelligence and Visualisation

Authors: Vasileios Koutsouvelis, Stavros Shiaeles, Bogdan Ghita, Gueltoum Bendiab | Published: 2021-09-06
Cyber Threat
User Behavior Analysis
Log Analysis Method

Network Activities Recognition and Analysis Based on Supervised Machine Learning Classification Methods Using J48 and Naïve Bayes Algorithm

Authors: Fan Huang | Published: 2021-05-28
Data Preprocessing
Data Collection
User Behavior Analysis