Conferences related to User Behavior Analytics

Back to Top

2020 IEEE Symposium on Security and Privacy (SP)

Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for presenting developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.

  • 2021 IEEE Symposium on Security and Privacy (SP)

    Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for presenting developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.

  • 2019 IEEE Symposium on Security and Privacy (SP)

    Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for presenting developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.

  • 2018 IEEE Symposium on Security and Privacy (SP)

    Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for presenting developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.

  • 2017 IEEE Symposium on Security and Privacy (SP)

    Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for the presentation of developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.Papers offer novel research contributions in any aspect of computer security or electronic privacy. Papers may represent advances in the theory, design, implementation, analysis, or empirical evaluation of secure systems, either for general use or for specific application domains.

  • 2016 IEEE Symposium on Security and Privacy (SP)

    Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for the presentation of developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.Papers offer novel research contributions in any aspect of computer security or electronic privacy. Papers may represent advances in the theory, design, implementation, analysis, or empirical evaluation of secure systems, either for general use or for specific application domains.

  • 2015 IEEE Symposium on Security and Privacy (SP)

    Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for the presentation of developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.Papers offer novel research contributions in any aspect of computer security or electronic privacy. Papers may represent advances in the theory, design, implementation, analysis, or empirical evaluation of secure systems, either for general use or for specific application domains.

  • 2014 IEEE Symposium on Security and Privacy (SP)

    IEEE Symposium on Security and Privacy has been the premier forum for computer security research, presenting the latest developments and bringing together researchers and practitioners.

  • 2013 IEEE Symposium on Security and Privacy (SP) Conference dates subject to change

    IEEE Symposium on Security and Privacy has been the premier forum for computer security research, presenting the latest developments and bringing together researchers and practitioners.

  • 2012 IEEE Symposium on Security and Privacy (SP) Conference dates subject to change

    IEEE Symposium on Security and Privacy has been the premier forum for computer security research, presenting the latest developments and bringing together researchers and practitioners.

  • 2011 IEEE Symposium on Security and Privacy (SP)

    Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for presenting developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.

  • 2010 IEEE Symposium on Security and Privacy (SP)

    S&P is interested in all aspects of computer security and privacy.

  • 2009 IEEE Symposium on Security and Privacy (SP)

    The IEEE Symposium on Security and Privacy has been the premier forum for presenting developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.

  • 2008 IEEE Symposium on Security and Privacy (SP)

    Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for presenting developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.

  • 2007 IEEE Symposium on Security and Privacy (SP)

    Research contributions in any aspect of computer security and electronic privacy including advances in the theory, design, implementation, analysis of empirical evaluation of secure systems.

  • 2006 IEEE Symposium on Security and Privacy (SP)

  • 2005 IEEE Symposium on Security and Privacy (SRSP)


2019 Winter Simulation Conference (WSC)

WSC is the premier international forum for disseminating recent advances in the field of system simulation. In addition to a technical program of unsurpassed scope and quality, WSC provides the central meeting for practitioners, researchers, and vendors.


2018 10th International Conference on Communication Systems & Networks (COMSNETS)

COMSNETS is a premier international conference dedicated to advances in networking and communications systems, and associated applications and services.

  • 2017 9th International Conference on Communication Systems and Networks (COMSNETS)

    Next generation communications networks and associated applications and services

  • 2016 8th International Conference on Communication Systems and Networks (COMSNETS)

    Next generation communications networks and associated applications and services

  • 2015 7th International Conference on Communication Systems and Networks (COMSNETS)

    Internet Architecture, Protocols and Applications; Video Distribution; Network Operations andManagement; Broadband and Cellular Networks; Mesh, Sensor and PAN Networks;Communication Software; Wireless Operating Systems and Mobile Platforms; Peer-to-peerNetworking; Cognitive Radios and White Space Networking; Network Economics; NetworkOptimization; Optical Networks; Network Security & Cyber Security Technologies; Cloud andUtility computing; Storage Area Networks; Next Generation Web Architectures; VehicularNetworking; Energy-Efficient Networking; Network Science and Emergent Behavior in Socio-Technical Networks; Social Networking Analysis, Middleware and Applications; NetworkingTechnologies for Smart Energy Grids; Disruption/Delay Tolerant Networking; and StochasticModels of Communication Networks.

  • 2014 Sixth International Conference on Communication Systems and Networks (COMSNETS)

    Internet Architecture, Protocols and Applications; Video Distribution; Network Operations and Management; Broadband and Cellular Networks; Mesh, Sensor and PAN Networks; Communication Software; Wireless Operating Systems and Mobile Platforms; Peer-to-peer Networking; Cognitive Radios and White Space Networking; Network Economics; Network Optimization; Optical Networks; Network Security & Cyber Security Technologies; Cloud and Utility computing; Storage Area Networks; Next Generation Web Architectures; Vehicular Networking; Energy-Efficient Networking; Network Science and Emergent Behavior in Socio-Technical Networks; Social Networking Analysis, Middleware and Applications; Networking Technologies for Smart Energy Grids; Disruption/Delay Tolerant Networking; and Stochastic Models of Communication Networks.

  • 2013 Fifth International Conference on Communication Systems and Networks (COMSNETS)

    COMSNETS is a premier international conference dedicated to addressing advances in Networking and Communications Systems, and Telecommunications services. The goal of the conference is to create a world-class gathering of researchers from academia and industry, practitioners, business leaders, intellectual property experts, and venture capitalists, providing a forum for discussing cutting edge research, and directions for new innovative business and technology.

  • 2012 Fourth International Conference on Communication Systems and Networks (COMSNETS)

    Internet Architecture, Protocols and Applications, Network Algorithms, Video Distribution (IPTV, Mobile Video, Video on Demand), Network Operations and Management, Broadband and Cellular Networks (3G/4G, WiMAX/LTE), Mesh, Sensor and PAN Networks, Communication Software (Cognitive Radios, DSA, SDR), Wireless Operating Systems and Mobile Platforms, Peer-to-peer Networking, Cognitive Radios and White Space Networking, Performance Analysis, Optical Networks, Cloud Computing, Security, Performance Modeling and Analysis.

  • 2011 Third International Conference on Communication Systems and Networks (COMSNETS)

    * Internet architecture and protocols * Network-based applications * Video Distribution (IPTV, Mobile video, Video on Demand) * Network Operations and Management * Local and Metro Area Networks, including Wireless * Broadband and Cellular Networks (3G/4G, WiMAX/LTE, UWB) * Mesh, Sensor and PAN Networks * Software in wireless communications (cognitive radios, dynamic spectrum access, SDR) * Wireless operating systems and mobile platforms

  • 2010 Second International Conference on COMmunication Systems and NETworkS (COMSNETS 2010)

    Internet architecture and protocols, Network-based applications, Video Distribution (IPTV, Mobile video, Video on Demand), Local and Metro Area Networks, Wireless Broadband and Cellular Networks, Mesh and Sensor Networks, Software in wireless communications, Wireless operating systems and mobile platforms, Optical Networks, Network Security, Cloud and Utility computing, Storage area networks, Next generation Web architectures, Vehicular Networking

  • 2009 First International Conference on COMmunication Systems and NETworkS (COMSNETS 2009)

    A premier international conference dedicated to addressing emerging topics and challenges in Networking and Communications Systems.


2018 15th IEEE International Conference on Advanced Video and Signal Based Surveillance (AVSS)

AVSS 2018 addresses underlying theory, methods, systems, and applications of video and signal based surveillance.


2018 IEEE 11th International Conference on Cloud Computing (CLOUD)

The resource sharing at various levels results in various cloud offerings such as infrastructure cloud (e.g., hardware, IT infrastructure management), software cloud (e.g. SaaS focusing on middleware as a service, or traditional CRM as a service), application cloud (e.g., Application as a Service, UML modeling tools as a service, social network as a service), and business cloud (e.g., business process as a service).

  • 2017 IEEE 10th International Conference on Cloud Computing (CLOUD)

    The resource sharing at various levels results in various cloud offerings such as infrastructure cloud (e.g., hardware, IT infrastructure management), software cloud (e.g. SaaS focusing on middleware as a service, or traditional CRM as a service), application cloud (e.g., Application as a Service, UML modeling tools as a service, social network as a service), and business cloud (e.g., business process as a service).

  • 2016 IEEE 8th International Conference on Cloud Computing (CLOUD)

    The goal of Cloud Computing is to share resources among the cloud service consumers, cloud partners, and cloud vendors in the cloud value chain. The resource sharing at various levels results in various cloud offerings such as infrastructure cloud (e.g., hardware, IT infrastructure management), software cloud (e.g. SaaS focusing on middleware as a service, or traditional CRM as a service), application cloud (e.g., Application as a Service, UML modeling tools as a service, social network as a service), and business cloud (e.g., business process as a service).

  • 2015 IEEE 8th International Conference on Cloud Computing (CLOUD)

    Cloud Computing has become a scalable services consumption and delivery platform in the field of Services Computing. The technical foundations of Cloud Computing include Service-Oriented Architecture (SOA) and Virtualizations of hardware and software. The goal of Cloud Computing is to share resources among the cloud service consumers, cloud partners, and cloud vendors in the cloud value chain. The resource sharing at various levels results in various cloud offerings such as infrastructure cloud (e.g., hardware, IT infrastructure management), software cloud (e.g. SaaS focusing on middleware as a service, or traditional CRM as a service), application cloud (e.g., Application as a Service, UML modeling tools as a service, social network as a service), and business cloud (e.g., business process as a service).

  • 2014 IEEE 7th International Conference on Cloud Computing (CLOUD)

    Cloud Computing has become a scalable services consumption and delivery platform in the field of Services Computing. The technical foundations of Cloud Computing include Service-Oriented Architecture (SOA) and Virtualizations of hardware and software. The goal of Cloud Computing is to share resources among the cloud service consumers, cloud partners, and cloud vendors in the cloud value chain. The resource sharing at various levels results in various cloud offerings such as infrastructure cloud (e.g. hardware, IT infrastructure management), software cloud (e.g. SaaS focusing on middleware as a service, or traditional CRM as a service), application cloud (e.g. Application as a Service, UML modeling tools as a service, social network as a service), and business cloud (e.g. business process as a service).

  • 2013 IEEE 6th International Conference on Cloud Computing (CLOUD)

    CLOUD 2013 is a premier international forum for researchers and practitioners to share modeling, developing, publishing, monitoring, managing, delivering XaaS (everything as a service) in the context of various types of cloud environments.

  • 2012 IEEE 5th International Conference on Cloud Computing (CLOUD)

    Modeling, developing, publishing, monitoring, managing, delivering XaaS (everything as a service) in the context of various types of cloud environments.

  • 2011 IEEE 4th International Conference on Cloud Computing (CLOUD)

    Change we are leading is the theme of CLOUD 2011. The technical foundations of Cloud Computing include Service-Oriented Architecture (SOA) and Virtualizations of hardware and software.

  • 2010 IEEE International Conference on Cloud Computing (CLOUD)

    The resource sharing at various levels results in various cloud offerings such as infrastructure cloud (e.g. hardware, IT infrastructure management), software cloud (e.g. SaaS focusing on middleware as a service, or traditional CRM as a service), application cloud (e.g. Application as a Service, UML modeling tools as a service, social network as a service), and business cloud (e.g. business process as a service).

  • 2009 IEEE International Conference on Cloud Computing (CLOUD)

    Infrastructure Cloud Software Cloud Application Cloud Business Cloud Service-Oriented Architecture in Cloud Computing Vituralization of Hardware Resources Virtualization of Software Resources Cloud Computing Consulting Methods Design Tool for Cloud Computing Maintenance and Management of Cloud Computing Cloud Computing Architecture Cloud Applications in Vertical Industries


More Conferences

Periodicals related to User Behavior Analytics

Back to Top

Communications, IEEE Transactions on

Telephone, telegraphy, facsimile, and point-to-point television, by electromagnetic propagation, including radio; wire; aerial, underground, coaxial, and submarine cables; waveguides, communication satellites, and lasers; in marine, aeronautical, space and fixed station services; repeaters, radio relaying, signal storage, and regeneration; telecommunication error detection and correction; multiplexing and carrier techniques; communication switching systems; data communications; and communication theory. In addition to the above, ...


Computer Graphics and Applications, IEEE

IEEE Computer Graphics and Applications (CG&A) bridges the theory and practice of computer graphics. From specific algorithms to full system implementations, CG&A offers a strong combination of peer-reviewed feature articles and refereed departments, including news and product announcements. Special Applications sidebars relate research stories to commercial development. Cover stories focus on creative applications of the technology by an artist or ...


Industrial Informatics, IEEE Transactions on

IEEE Transactions on Industrial Informatics focuses on knowledge-based factory automation as a means to enhance industrial fabrication and manufacturing processes. This embraces a collection of techniques that use information analysis, manipulation, and distribution to achieve higher efficiency, effectiveness, reliability, and/or security within the industrial environment. The scope of the Transaction includes reporting, defining, providing a forum for discourse, and informing ...


Intelligent Systems, IEEE

IEEE Intelligent Systems, a bimonthly publication of the IEEE Computer Society, provides peer-reviewed, cutting-edge articles on the theory and applications of systems that perceive, reason, learn, and act intelligently. The editorial staff collaborates with authors to produce technically accurate, timely, useful, and readable articles as part of a consistent and consistently valuable editorial product. The magazine serves software engineers, systems ...


Intelligent Transportation Systems, IEEE Transactions on

The theoretical, experimental and operational aspects of electrical and electronics engineering and information technologies as applied to Intelligent Transportation Systems (ITS). Intelligent Transportation Systems are defined as those systems utilizing synergistic technologies and systems engineering concepts to develop and improve transportation systems of all kinds. The scope of this interdisciplinary activity includes the promotion, consolidation and coordination of ITS technical ...


More Periodicals

Most published Xplore authors for User Behavior Analytics

Back to Top

Xplore Articles related to User Behavior Analytics

Back to Top

Reducing False Positives of User-to-Entity First-Access Alerts for User Behavior Analytics

2017 IEEE International Conference on Data Mining Workshops (ICDMW), 2017

Detecting security threats from compromised account or malicious insider by leveraging enterprise traffic logs is the goal of user behavior-based analytics. For its ease of interpretation, a common analytic indicator used in the industry for user behavior analytics is whether a user accesses a network entity, such as a machine or process, for the first time. While this popular indicator ...


User Behavior Analytics in Virtual Training Environments for Sensory Substitution Devices

2018 Zooming Innovation in Consumer Technologies Conference (ZINC), 2018

Virtual Training Environments (VTE) are crucial for the testing and development of Sensory Substitution Devices (SSD) in a safe, controlled manner. User Analytics serve to collect and analyze user behavior, to provide clear design decisions for improving SSdev development and implementation. We implemented an analytics framework capable of tracking user behavior, map real-time paths and aggregate data over multiple nominal ...


Performance Analysis of Hadoop Cluster for User Behavior Analysis

2018 IEEE 20th International Conference on High Performance Computing and Communications; IEEE 16th International Conference on Smart City; IEEE 4th International Conference on Data Science and Systems (HPCC/SmartCity/DSS), 2018

User activities produce an enormous amount of data when using popular devices such as smartphones. These data can be used to develop behavioral models in several areas including fraud detection, finance, recommendation systems, and marketing. However, enabling fast analysis of such a large volume of data using traditional data analytics tools may not be applicable. As a result, many organizations ...


User Behavior Analysis with Machine Learning Techniques in Cloud Computing Architectures

2018 International Conference on Applied Smart Systems (ICASS), 2018

This paper presents the use of machine learning algorithms to analyze the behaviors of users working in a distributed computer environment. The objective consists in discriminating groups of close users. These groups are composed of users with similar behaviors. Event related to the user's behaviors are recorded and transferred to a database. An approach is developed to determine the groups ...


Anomalous User Activity Detection in Enterprise Multi-source Logs

2017 IEEE International Conference on Data Mining Workshops (ICDMW), 2017

Security is one of the top concerns of any enterprise. Most security practitioners in enterprises rely on correlation rules to detect potential threats. While the rules are intuitive to design, each rule is independently defined per log source, unable to collectively address heterogeneity of data from a myriad of enterprise networking and security logs. Furthermore, correlation rules do not look ...



Educational Resources on User Behavior Analytics

Back to Top

IEEE-USA E-Books

  • Reducing False Positives of User-to-Entity First-Access Alerts for User Behavior Analytics

    Detecting security threats from compromised account or malicious insider by leveraging enterprise traffic logs is the goal of user behavior-based analytics. For its ease of interpretation, a common analytic indicator used in the industry for user behavior analytics is whether a user accesses a network entity, such as a machine or process, for the first time. While this popular indicator does correlate well with the threat activities, it has the potential of generating volumes of false positives. This creates a problem for an analytic system of which the first-time access alerting capability is a part. We believe that the false positive rate from the indicator can be reduced by learning from users' historical entity access patterns and user context information. If the first-time access is expected, then its corresponding alert is suppressed. In this paper, we propose a user-to-entity prediction score which uses a recommender system for learning user data. In particular, we use factorization machines, along with necessary data normalization steps, to make predictions on real-world enterprise logs. We demonstrate this novel method is capable of reducing false positives of users' first-time entity access alerts in user behavior analytics applications.

  • User Behavior Analytics in Virtual Training Environments for Sensory Substitution Devices

    Virtual Training Environments (VTE) are crucial for the testing and development of Sensory Substitution Devices (SSD) in a safe, controlled manner. User Analytics serve to collect and analyze user behavior, to provide clear design decisions for improving SSdev development and implementation. We implemented an analytics framework capable of tracking user behavior, map real-time paths and aggregate data over multiple nominal testing sessions. Aggregated data is used to reveal patterns of use and match them to individual abilities and user groups.

  • Performance Analysis of Hadoop Cluster for User Behavior Analysis

    User activities produce an enormous amount of data when using popular devices such as smartphones. These data can be used to develop behavioral models in several areas including fraud detection, finance, recommendation systems, and marketing. However, enabling fast analysis of such a large volume of data using traditional data analytics tools may not be applicable. As a result, many organizations that are seeking to collect, process, and analyze big data have adopted a new class of technologies that includes Apache Hadoop and related tools. This paper reports on the feasibility and the performance of using a Hadoop cluster for user behavior analytics based on their activities in applications with a large number of users while using in-memory processing for faster querying and processing of data stored in computers memory rather than disk storage. In this paper, user behavior analysis is used as a base model for performance analysis because of its unique features and similarity with current problems in academia and industry, it includes performance analysis in two different areas: the performance of the cluster in data ingestion and its performance in analyzing the data.

  • User Behavior Analysis with Machine Learning Techniques in Cloud Computing Architectures

    This paper presents the use of machine learning algorithms to analyze the behaviors of users working in a distributed computer environment. The objective consists in discriminating groups of close users. These groups are composed of users with similar behaviors. Event related to the user's behaviors are recorded and transferred to a database. An approach is developed to determine the groups of the users. A non-parametric method of estimating a probability density is used to predict application launches and session openings in an individual way for each user. These algorithms have been implemented and demonstrated their effectiveness within a complete virtualization environment for workstations and applications under real conditions in a hospital.

  • Anomalous User Activity Detection in Enterprise Multi-source Logs

    Security is one of the top concerns of any enterprise. Most security practitioners in enterprises rely on correlation rules to detect potential threats. While the rules are intuitive to design, each rule is independently defined per log source, unable to collectively address heterogeneity of data from a myriad of enterprise networking and security logs. Furthermore, correlation rules do not look for data events beyond a short time range. To complement the conventional correlation rules-based system, we propose a user activity anomaly detection method. The method first addresses data heterogeneity of multi-source logs by designing a meta data extraction step for event normalization. It then builds user-specific models to flag alerts for users whose currently observed event patterns are sufficiently different from their own patterns in the past.



Standards related to User Behavior Analytics

Back to Top

No standards are currently tagged "User Behavior Analytics"


Jobs related to User Behavior Analytics

Back to Top