Academic literature on the topic 'Anomaly Behavior Detection'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Anomaly Behavior Detection.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Anomaly Behavior Detection"
Zhang, Haiyan, Yonglong Luo, Qingying Yu, Liping Sun, Xuejing Li, and Zhenqiang Sun. "A Framework of Abnormal Behavior Detection and Classification Based on Big Trajectory Data for Mobile Networks." Security and Communication Networks 2020 (December 22, 2020): 1–15. http://dx.doi.org/10.1155/2020/8858444.
Full textGarcia, Olivia W., and James C. Brown. "LEVERAGING CONTEXT DISCOVERY FOR EFFECTIVE ANOMALY DETECTION IN COMPLEX SYSTEMS." Pinnacle Research Journal of Scientific and Management Sciences 2, no. 4 (2025): 1–7. https://doi.org/10.55640/tprjsms-v02i04-01.
Full textFeng, Wenying, Yu Cao, Yilu Chen, et al. "Multi-Granularity User Anomalous Behavior Detection." Applied Sciences 15, no. 1 (2024): 128. https://doi.org/10.3390/app15010128.
Full textParres-Peredo, Alvaro, Ivan Piza-Davila, and Francisco Cervantes. "Unexpected-Behavior Detection Using TopK Rankings for Cybersecurity." Applied Sciences 9, no. 20 (2019): 4381. http://dx.doi.org/10.3390/app9204381.
Full textAarthi, G., S. Sharon Priya, and W. Aisha Banu. "KRF-AD: Innovating anomaly detection with KDE-KL and random forest fusion." Intelligent Decision Technologies 18, no. 3 (2024): 2275–87. http://dx.doi.org/10.3233/idt-240628.
Full textShayegan, Mohammad Javad, Hamid Reza Sabor, Mueen Uddin, and Chin-Ling Chen. "A Collective Anomaly Detection Technique to Detect Crypto Wallet Frauds on Bitcoin Network." Symmetry 14, no. 2 (2022): 328. http://dx.doi.org/10.3390/sym14020328.
Full textZhao, Ying, Junjun Chen, Di Wu, et al. "Network Anomaly Detection by Using a Time-Decay Closed Frequent Pattern." Information 10, no. 8 (2019): 262. http://dx.doi.org/10.3390/info10080262.
Full textTao Xiang and Shaogang Gong. "Video Behavior Profiling for Anomaly Detection." IEEE Transactions on Pattern Analysis and Machine Intelligence 30, no. 5 (2008): 893–908. http://dx.doi.org/10.1109/tpami.2007.70731.
Full textZhu, Xudong, and Zhijing Liu. "Human behavior clustering for anomaly detection." Frontiers of Computer Science in China 5, no. 3 (2011): 279–89. http://dx.doi.org/10.1007/s11704-011-0080-4.
Full textKumar, Sandeep, Muhammad Badruddin Khan, Mozaherul Hoque Abul Hasanat, Abdul Khader Jilani Saudagar, Abdullah AlTameem, and Mohammed AlKhathami. "An Anomaly Detection Framework for Twitter Data." Applied Sciences 12, no. 21 (2022): 11059. http://dx.doi.org/10.3390/app122111059.
Full textDissertations / Theses on the topic "Anomaly Behavior Detection"
Buthpitiya, Senaka. "Modeling Mobile User Behavior for Anomaly Detection." Research Showcase @ CMU, 2014. http://repository.cmu.edu/dissertations/362.
Full textXu, Kui. "Anomaly Detection Through System and Program Behavior Modeling." Diss., Virginia Tech, 2014. http://hdl.handle.net/10919/51140.
Full textCarlsson, Oskar, and Daniel Nabhani. "User and Entity Behavior Anomaly Detection using Network Traffic." Thesis, Blekinge Tekniska Högskola, Institutionen för datalogi och datorsystemteknik, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-14636.
Full textUllah, Habib. "Crowd Motion Analysis: Segmentation, Anomaly Detection, and Behavior Classification." Doctoral thesis, Università degli studi di Trento, 2015. https://hdl.handle.net/11572/369001.
Full textUllah, Habib. "Crowd Motion Analysis: Segmentation, Anomaly Detection, and Behavior Classification." Doctoral thesis, University of Trento, 2015. http://eprints-phd.biblio.unitn.it/1406/1/PhD_Thesis_Habib.pdf.
Full textAlipour, Hamid Reza. "An Anomaly Behavior Analysis Methodology for Network Centric Systems." Diss., The University of Arizona, 2013. http://hdl.handle.net/10150/305804.
Full textSatam, Pratik. "An Anomaly Behavior Analysis Intrusion Detection System for Wireless Networks." Thesis, The University of Arizona, 2015. http://hdl.handle.net/10150/595654.
Full textLarsson, Frans. "Algorithmic trading surveillance : Identifying deviating behavior with unsupervised anomaly detection." Thesis, Uppsala universitet, Matematiska institutionen, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-389941.
Full textPan, Zhiwen, and Zhiwen Pan. "A Context Aware Anomaly Behavior Analysis Methodology for Building Automation Systems." Diss., The University of Arizona, 2017. http://hdl.handle.net/10150/625624.
Full textZhou, Mian. "Network Intrusion Detection: Monitoring, Simulation and Visualization." Doctoral diss., University of Central Florida, 2005. http://digital.library.ucf.edu/cdm/ref/collection/ETD/id/4063.
Full textBooks on the topic "Anomaly Behavior Detection"
Isupova, Olga. Machine Learning Methods for Behaviour Analysis and Anomaly Detection in Video. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-75508-3.
Full textIsupova, Olga. Machine Learning Methods for Behaviour Analysis and Anomaly Detection in Video. Springer, 2018.
Find full textIsupova, Olga. Machine Learning Methods for Behaviour Analysis and Anomaly Detection in Video. Springer, 2019.
Find full textBook chapters on the topic "Anomaly Behavior Detection"
Zhu, Xudong, Hui Li, and Zhijing Liu. "Behavior Clustering for Anomaly Detection." In Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering. Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-23602-0_2.
Full textSoukup, Dominik, Tomas Cejka, and Karel Hynek. "Behavior Anomaly Detection in IoT Networks." In Proceeding of the International Conference on Computer Networks, Big Data and IoT (ICCBI - 2019). Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-43192-1_53.
Full textAran, Oya, Dairazalia Sanchez-Cortes, Minh-Tri Do, and Daniel Gatica-Perez. "Anomaly Detection in Elderly Daily Behavior in Ambient Sensing Environments." In Human Behavior Understanding. Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-46843-3_4.
Full textWang, Cheng, and Hangyu Zhu. "Enhancing Data for Hard Anomaly Detection." In Universal Behavior Computing for Security and Safety. Springer Nature Singapore, 2024. http://dx.doi.org/10.1007/978-981-97-9014-2_2.
Full textKim, Misun, Minsoo Kim, and JaeHyun Seo. "Network Anomaly Behavior Detection Using an Adaptive Multiplex Detector." In Computational Science and Its Applications - ICCSA 2006. Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11751595_17.
Full textZhang, Yuanzhe, Qiqiang Jin, Maohan Liang, Ruixin Ma, and Ryan Wen Liu. "Vessel Behavior Anomaly Detection Using Graph Attention Network." In Neural Information Processing. Springer Nature Singapore, 2023. http://dx.doi.org/10.1007/978-981-99-8073-4_23.
Full textLi, Yuanyuan, Michael Thomason, and Lynne E. Parker. "Sequential Anomaly Detection Using Wireless Sensor Networks in Unknown Environment." In Human Behavior Understanding in Networked Sensing. Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-10807-0_5.
Full textWang, Sheng, Jiaming Song, and Ruixu Guo. "Char-Level Neural Network for Network Anomaly Behavior Detection." In Human Centered Computing. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-15127-0_6.
Full textSeleznyov, Alexandr, Oleksiy Mazhelis, and Seppo Puuronen. "Learning Temporal Regularities of User Behavior for Anomaly Detection." In Information Assurance in Computer Networks. Springer Berlin Heidelberg, 2001. http://dx.doi.org/10.1007/3-540-45116-1_16.
Full textWang, Jinfeng, and Xiongshen Xie. "Anomaly Behavior Detection in Crowd via Lightweight 3D Convolution." In Lecture Notes in Computer Science. Springer Nature Singapore, 2024. http://dx.doi.org/10.1007/978-981-97-5615-5_11.
Full textConference papers on the topic "Anomaly Behavior Detection"
Ahmad, Intekhab, Sandhya Rani Sahoo, and Ratnakar Dash. "Anomaly Detection in Video Surveillance for Unusual Behavior Identification." In 2024 2nd World Conference on Communication & Computing (WCONF). IEEE, 2024. http://dx.doi.org/10.1109/wconf61366.2024.10692100.
Full textGao, Dongying, Caiwei Guo, Wen Ji, et al. "Anomaly Detection System for Terminal-Level Data Access Behavior." In 2024 9th International Conference on Signal and Image Processing (ICSIP). IEEE, 2024. http://dx.doi.org/10.1109/icsip61881.2024.10671411.
Full textGuo, Jinglong, Yanyun Xu, Meng Zhang, Weiqing Huang, and Huadong Guo. "Behavior Recognition and Anomaly Detection Utilizing Memory Electromagnetic Emanation." In MILCOM 2024 - 2024 IEEE Military Communications Conference (MILCOM). IEEE, 2024. https://doi.org/10.1109/milcom61039.2024.10773719.
Full textMa, Tianfu, Jian Bao, Hao Yang, Xuejiao Zhao, Qingwang Zhang, and Wanting Lv. "Network Anomaly Behavior Detection and Security Protection based on Clustering Algorithm." In 2025 International Conference on Intelligent Systems and Computational Networks (ICISCN). IEEE, 2025. https://doi.org/10.1109/iciscn64258.2025.10934590.
Full textGupta, Swati, Snehal Borji, and Prof Pallavi Thakur. "Behavior Prediction and Anomaly Detection: Leveraging ML for Online Child Safety." In 2025 International Conference on Emerging Smart Computing and Informatics (ESCI). IEEE, 2025. https://doi.org/10.1109/esci63694.2025.10988020.
Full textWang, Jiayu, Yun Chen, Ran Geng, et al. "An Efficient Anomaly Detection Model of Power Consumption Behavior for Industrial Customers." In 2024 11th International Conference on Behavioural and Social Computing (BESC). IEEE, 2024. https://doi.org/10.1109/besc64747.2024.10780628.
Full textLiu, Zhen, Changzhen Hu, Chun Shan, and Junkai Yi. "BedIDS: An Effective Network Anomaly Detection Method by Fusing Behavior Evolution characteristics." In 2024 IEEE 23rd International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom). IEEE, 2024. https://doi.org/10.1109/trustcom63139.2024.00212.
Full textFeizi, A., A. Aghagolzadeh, and H. Seyedarabi. "Behavior recognition and anomaly behavior detection using clustering." In 2012 Sixth International Symposium on Telecommunications (IST). IEEE, 2012. http://dx.doi.org/10.1109/istel.2012.6483112.
Full textSmith, I. F. C. "Anomaly Detection without Structural Behavior Models." In Structures Congress 2011. American Society of Civil Engineers, 2011. http://dx.doi.org/10.1061/41171(401)5.
Full textZhang, Facun, Weiwei Xue, Lijun Cui, and Guangrui Zhu. "A Crowd Anomaly Behavior Detection Algorithm." In 2018 International Conference on Audio, Language and Image Processing (ICALIP). IEEE, 2018. http://dx.doi.org/10.1109/icalip.2018.8455412.
Full textReports on the topic "Anomaly Behavior Detection"
Christopher, Lauren, Stanley Chien, Yaobin Chen, Mei Qiu, William Reindl, and Liya Koshy. Anomaly Detection in Traffic Patterns Using the INDOT Camera System. Purdue University, 2025. https://doi.org/10.5703/1288284317778.
Full textAlonso-Robisco, Andrés, Andrés Alonso-Robisco, José Manuel Carbó, et al. Empowering financial supervision: a SupTech experiment using machine learning in an early warning system. Banco de España, 2025. https://doi.org/10.53479/39320.
Full text