User Behavior Analysis

Every Byte Matters: Traffic Analysis of Bluetooth Wearable Devices

Authors: Ludovic Barman, Alexandre Dumur, Apostolos Pyrgelis, Jean-Pierre Hubaux | Published: 2021-05-24
Data Collection
User Behavior Analysis
Classification Pattern Analysis

Twitter Spam Detection: A Systematic Review

Authors: Sepideh Bazzaz Abkenar, Mostafa Haghi Kashani, Mohammad Akbari, Ebrahim Mahdipour | Published: 2020-11-30 | Updated: 2020-12-01
Spam Detection Method
User Behavior Analysis
Research Methodology

Studying Ransomware Attacks Using Web Search Logs

Authors: Chetan Bansal, Pantazis Deligiannis, Chandra Maddila, Nikitha Rao | Published: 2020-05-01 | Updated: 2020-05-23
User Behavior Analysis
Ransomware Assessment
Information Gathering Methods

Predicting Malicious Insider Threat Scenarios Using Organizational Data and a Heterogeneous Stack-Classifier

Authors: Adam James Hall, Nikolaos Pitropakis, William J Buchanan, Naghmeh Moradpoor | Published: 2019-07-24
Cyber Threat
User Behavior Analysis
Malicious Prompt

Unsupervised Learning for Trustworthy IoT

Authors: Nikhil Banerjee, Thanassis Giannetsos, Emmanouil Panaousis, Clive Cheong Took | Published: 2018-05-25
Data-Driven Clustering
User Behavior Analysis
Adversarial Attack Detection

Gradient-Leaks: Understanding and Controlling Deanonymization in Federated Learning

Authors: Tribhuvanesh Orekondy, Seong Joon Oh, Yang Zhang, Bernt Schiele, Mario Fritz | Published: 2018-05-15 | Updated: 2020-09-13
Privacy-Preserving Machine Learning
Poisoning
User Behavior Analysis

Under the Underground: Predicting Private Interactions in Underground Forums

Authors: Rebekah Overdorf, Carmela Troncoso, Rachel Greenstadt, Damon McCoy | Published: 2018-05-11
Darknet Analysis
Membership Inference
User Behavior Analysis

IoTSense: Behavioral Fingerprinting of IoT Devices

Authors: Bruhadeshwar Bezawada, Maalvika Bachani, Jordan Peterson, Hossein Shirazi, Indrakshi Ray, Indrajit Ray | Published: 2018-04-11
User Behavior Analysis
User Behavior Analysis
Communication Analysis

Automatic Detection of Online Jihadist Hate Speech

Authors: Tom De Smedt, Guy De Pauw, Pieter Van Ostaeyen | Published: 2018-03-13
Content Moderation
Profile Characteristic Analysis
User Behavior Analysis

Data Science Methodology for Cybersecurity Projects

Authors: Farhad Foroughi, Peter Luksch | Published: 2018-03-12
Data Science Methodology
Model Selection
User Behavior Analysis