Journal articles on the topic 'Anomaly Behavior Detection'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Anomaly Behavior Detection.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Zhang, Haiyan, Yonglong Luo, Qingying Yu, Liping Sun, Xuejing Li, and Zhenqiang Sun. "A Framework of Abnormal Behavior Detection and Classification Based on Big Trajectory Data for Mobile Networks." Security and Communication Networks 2020 (December 22, 2020): 1–15. http://dx.doi.org/10.1155/2020/8858444.
Full textGarcia, Olivia W., and James C. Brown. "LEVERAGING CONTEXT DISCOVERY FOR EFFECTIVE ANOMALY DETECTION IN COMPLEX SYSTEMS." Pinnacle Research Journal of Scientific and Management Sciences 2, no. 4 (2025): 1–7. https://doi.org/10.55640/tprjsms-v02i04-01.
Full textFeng, Wenying, Yu Cao, Yilu Chen, et al. "Multi-Granularity User Anomalous Behavior Detection." Applied Sciences 15, no. 1 (2024): 128. https://doi.org/10.3390/app15010128.
Full textParres-Peredo, Alvaro, Ivan Piza-Davila, and Francisco Cervantes. "Unexpected-Behavior Detection Using TopK Rankings for Cybersecurity." Applied Sciences 9, no. 20 (2019): 4381. http://dx.doi.org/10.3390/app9204381.
Full textAarthi, G., S. Sharon Priya, and W. Aisha Banu. "KRF-AD: Innovating anomaly detection with KDE-KL and random forest fusion." Intelligent Decision Technologies 18, no. 3 (2024): 2275–87. http://dx.doi.org/10.3233/idt-240628.
Full textShayegan, Mohammad Javad, Hamid Reza Sabor, Mueen Uddin, and Chin-Ling Chen. "A Collective Anomaly Detection Technique to Detect Crypto Wallet Frauds on Bitcoin Network." Symmetry 14, no. 2 (2022): 328. http://dx.doi.org/10.3390/sym14020328.
Full textTao Xiang and Shaogang Gong. "Video Behavior Profiling for Anomaly Detection." IEEE Transactions on Pattern Analysis and Machine Intelligence 30, no. 5 (2008): 893–908. http://dx.doi.org/10.1109/tpami.2007.70731.
Full textZhu, Xudong, and Zhijing Liu. "Human behavior clustering for anomaly detection." Frontiers of Computer Science in China 5, no. 3 (2011): 279–89. http://dx.doi.org/10.1007/s11704-011-0080-4.
Full textZhao, Ying, Junjun Chen, Di Wu, et al. "Network Anomaly Detection by Using a Time-Decay Closed Frequent Pattern." Information 10, no. 8 (2019): 262. http://dx.doi.org/10.3390/info10080262.
Full textKumar, Sandeep, Muhammad Badruddin Khan, Mozaherul Hoque Abul Hasanat, Abdul Khader Jilani Saudagar, Abdullah AlTameem, and Mohammed AlKhathami. "An Anomaly Detection Framework for Twitter Data." Applied Sciences 12, no. 21 (2022): 11059. http://dx.doi.org/10.3390/app122111059.
Full textMeng, Yongwei, Tao Qin, Shancang Li, and Pinghui Wang. "Behavior Pattern Mining from Traffic and Its Application to Network Anomaly Detection." Security and Communication Networks 2022 (June 29, 2022): 1–17. http://dx.doi.org/10.1155/2022/9139321.
Full textWen-Jen Ho, Wen-Jen Ho, Hsin-Yuan Hsieh Wen-Jen Ho, and Chia-Wei Tsai Hsin-Yuan Hsieh. "Anomaly Detection Model of Time Segment Power Usage Behavior Using Unsupervised Learning." 網際網路技術學刊 25, no. 3 (2024): 455–63. http://dx.doi.org/10.53106/160792642024052503011.
Full textZhao, Zhijun, Chen Xu, and Bo Li. "A LSTM-Based Anomaly Detection Model for Log Analysis." Journal of Signal Processing Systems 93, no. 7 (2021): 745–51. http://dx.doi.org/10.1007/s11265-021-01644-4.
Full textTazerouti, A., and A. Ikram. "Imposters anomaly detection." Journal of Fundamental and Applied Sciences 13, no. 1 (2021): 243–63. http://dx.doi.org/10.4314/jfas.v13i1.14.
Full textGUEVARA, MALDONADO CESAR BYRON, Peñas Matilde Santos, and López Victoria. "Negative selection and Knuth Morris Pratt algorithm for anomaly detection." IEEE Latin America Transactions 14 (March 1, 2016): 1473–79. https://doi.org/10.1109/TLA.2016.7459637.
Full textKim, Hyun-Soo, Yu Sung Edward Kim, Fania Ardelia Devira, and Mun Yong Yi. "Application of Anomaly Detection to Identifying Aggressive Pig Behaviors Using Reconstruction Loss Inversion." AgriEngineering 6, no. 4 (2024): 4442–59. http://dx.doi.org/10.3390/agriengineering6040252.
Full textRahman, Fathu, Taufik Edy Sutanto, and Nina Fitriyati. "Web Traffic Anomaly Detection using Stacked Long Short-Term Memory." InPrime: Indonesian Journal of Pure and Applied Mathematics 3, no. 2 (2021): 112–21. http://dx.doi.org/10.15408/inprime.v3i2.21879.
Full textDolgachev, M. V., and V. A. Kostyunin. "COMPREHENSIVE ANALYSIS OF WINDOWS SYSTEM BEHAVIOR FOR CYBER THREAT DETECTION." Voprosy kiberbezopasnosti 2, no. 66 (2025): 71–77. https://doi.org/10.21681/2311-3456-2025-2-71-77.
Full textAl-Mazrawe, Amer, and Bahaa Al-Musawi. "Anomaly Detection in Cloud Network: A Review." BIO Web of Conferences 97 (2024): 00019. http://dx.doi.org/10.1051/bioconf/20249700019.
Full textSavran, Efe, Esin Karpat, and Fatih Karpat. "Energy-Efficient Anomaly Detection and Chaoticity in Electric Vehicle Driving Behavior." Sensors 24, no. 17 (2024): 5628. http://dx.doi.org/10.3390/s24175628.
Full textVincent, Vercruyssen, Meert Wannes, and Davis Jesse. "Transfer Learning for Anomaly Detection through Localized and Unsupervised Instance Selection." Proceedings of the AAAI Conference on Artificial Intelligence 34, no. 04 (2020): 6054–61. http://dx.doi.org/10.1609/aaai.v34i04.6068.
Full textSuo, Yongfeng, Yan Wang, and Lei Cui. "Ship Anomalous Behavior Detection Based on BPEF Mining and Text Similarity." Journal of Marine Science and Engineering 13, no. 2 (2025): 251. https://doi.org/10.3390/jmse13020251.
Full textBenzagouta, Mohamed-Lamine, Hasnaâ Aniss, Hacène Fouchal, and Nour-Eddin El Faouzi. "Road-Side Unit Anomaly Detection." Vehicles 5, no. 4 (2023): 1467–81. http://dx.doi.org/10.3390/vehicles5040080.
Full textSun, Fusheng, Jiahao Zhang, Xiaodong Wu, Zhong Zheng, and Xiaowen Yang. "Video Anomaly Detection Based on Global–Local Convolutional Autoencoder." Electronics 13, no. 22 (2024): 4415. http://dx.doi.org/10.3390/electronics13224415.
Full textLiao, Liping, Ke Zhu, Jianzhen Luo, and Jun Cai. "LogBASA: Log Anomaly Detection Based on System Behavior Analysis and Global Semantic Awareness." International Journal of Intelligent Systems 2023 (September 20, 2023): 1–18. http://dx.doi.org/10.1155/2023/3777826.
Full textMazzariello, Claudio, Paolo De Lutiis, and Dario Lombardo. "Clustering NGN user behavior for anomaly detection." Information Security Technical Report 16, no. 1 (2011): 20–28. http://dx.doi.org/10.1016/j.istr.2010.10.011.
Full textHua, Caijian, Kun Luo, Yadong Wu, and Rui Shi. "YOLO-ABD: A Multi-Scale Detection Model for Pedestrian Anomaly Behavior Detection." Symmetry 16, no. 8 (2024): 1003. http://dx.doi.org/10.3390/sym16081003.
Full textHu, Huimin, Wenping Ma, and Wei Luo. "A Method for Detecting Large-scale Network Anomaly Behavior." ITM Web of Conferences 17 (2018): 01012. http://dx.doi.org/10.1051/itmconf/20181701012.
Full textA, Nandini. "Anomaly Detection Using CNN with I3D Feature Extraction." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 03 (2024): 1–5. http://dx.doi.org/10.55041/ijsrem29371.
Full textTkach, Volodymyr, Anton Kudin, Victor R. Kebande, Oleksii Baranovskyi, and Ivan Kudin. "Non-Pattern-Based Anomaly Detection in Time-Series." Electronics 12, no. 3 (2023): 721. http://dx.doi.org/10.3390/electronics12030721.
Full textHe, Ruifeng, Mingtian Xie, and Aixing He. "Video anomaly detection based on hybrid attention mechanism." Applied and Computational Engineering 57, no. 1 (2024): 212–17. http://dx.doi.org/10.54254/2755-2721/57/20241336.
Full textKim, Donghyun, Sangbong Lee, and Jihwan Lee. "An Ensemble-Based Approach to Anomaly Detection in Marine Engine Sensor Streams for Efficient Condition Monitoring and Analysis." Sensors 20, no. 24 (2020): 7285. http://dx.doi.org/10.3390/s20247285.
Full textZhou, Xiaojun, Zhen Xu, Liming Wang, Kai Chen, Cong Chen, and Wei Zhang. "Behavior Based Anomaly Detection Model in SCADA System." MATEC Web of Conferences 173 (2018): 01011. http://dx.doi.org/10.1051/matecconf/201817301011.
Full textEdelen, Jonathan P., and Christopher C. Hall. "Autoencoder Based Analysis of RF Parameters in the Fermilab Low Energy Linac." Information 12, no. 6 (2021): 238. http://dx.doi.org/10.3390/info12060238.
Full textZoppi, Tommaso, Andrea Ceccarelli, Tommaso Capecchi, and Andrea Bondavalli. "Unsupervised Anomaly Detectors to Detect Intrusions in the Current Threat Landscape." ACM/IMS Transactions on Data Science 2, no. 2 (2021): 1–26. http://dx.doi.org/10.1145/3441140.
Full textZhang, Lixiang, Yian Zhu, Jie Ren, Wei Lu, and Ye Yao. "A method for detecting abnormal behavior of ships based on multi-dimensional density distance and an abnormal isolation mechanism." Mathematical Biosciences and Engineering 20, no. 8 (2023): 13921–46. http://dx.doi.org/10.3934/mbe.2023620.
Full textNkiru, Ezefosie, and Ohemu Monday Fredrick. "A Data Driven Anomaly Based Behavior Detection Method for Advanced Persistent Threats (APT)." International Journal of Science and Research (IJSR) 10, no. 8 (2021): 663–67. https://doi.org/10.21275/sr21726172522.
Full textNeha, Sharma, Kumar D. Pradeep, Kumar Rohit, and Dutt Tripathi Shiv. "Anomaly Detection in Human Behavior using Video Surveillance." International Journal of Engineering and Advanced Technology (IJEAT) 9, no. 2 (2019): 328–32. https://doi.org/10.35940/ijeat.B3133.129219.
Full textWang, Yunge, Lingling Zhang, Tong Si, Graham Bishop, and Haijun Gong. "Anomaly Detection in High-Dimensional Time Series Data with Scaled Bregman Divergence." Algorithms 18, no. 2 (2025): 62. https://doi.org/10.3390/a18020062.
Full textSarpate, Dikshendra, Isha Tadas, Radhesh Khaire, Mokshad Antapurkar, and Amisha Sonone. "Unveiling Anomaly : Empowering Video Surveillance through Intelligent Anomaly Detection." International Journal of Scientific Research in Science, Engineering and Technology 11, no. 2 (2024): 312–20. http://dx.doi.org/10.32628/ijsrset2411248.
Full textMa, Yangfeifei, Xinyun Zhu, Jilong Lu, Pan Yang, and Jianzhong Sun. "Construction of Data-Driven Performance Digital Twin for a Real-World Gas Turbine Anomaly Detection Considering Uncertainty." Sensors 23, no. 15 (2023): 6660. http://dx.doi.org/10.3390/s23156660.
Full textKim, Tae Hoon, Stephen Ojo, Moez Krichen, and Meznah A. Alamro. "Single and Mixed Sensory Anomaly Detection in Connected and Automated Vehicle Sensor Networks." Electronics 13, no. 10 (2024): 1885. http://dx.doi.org/10.3390/electronics13101885.
Full textBasheer, Muhammad Yunus Iqbal, Azliza Mohd Ali, Rozianawaty Osman, et al. "Empowering anomaly detection algorithm: a review." IAES International Journal of Artificial Intelligence (IJ-AI) 13, no. 1 (2024): 9–22. https://doi.org/10.11591/ijai.v13.i1.pp9-22.
Full textYin, Yong, Qiannan Liu, and Shibiao Mao. "Global Anomaly Crowd Behavior Detection Using Crowd Behavior Feature Vector." International Journal of Smart Home 9, no. 12 (2015): 149–60. http://dx.doi.org/10.14257/ijsh.2015.9.12.16.
Full textIqbal Basheer, Muhammad Yunus, Azliza Mohd Ali, Rozianawaty Osman, et al. "Empowering anomaly detection algorithm: a review." IAES International Journal of Artificial Intelligence (IJ-AI) 13, no. 1 (2024): 9. http://dx.doi.org/10.11591/ijai.v13.i1.pp9-22.
Full textNazat, Sazid, Osvaldo Arreche, and Mustafa Abdallah. "On Evaluating Black-Box Explainable AI Methods for Enhancing Anomaly Detection in Autonomous Driving Systems." Sensors 24, no. 11 (2024): 3515. http://dx.doi.org/10.3390/s24113515.
Full textPrasath, V., K. Deepak, and S. Chandrakala. "Traffic Anomalies in Surveillance Videos: Recent Trends." Journal of Computational and Theoretical Nanoscience 17, no. 1 (2020): 13–20. http://dx.doi.org/10.1166/jctn.2020.8622.
Full textTian, Yu, Haihua Liao, Jing Xu, Ya Wang, Shuai Yuan, and Naijin Liu. "Unsupervised Spectrum Anomaly Detection Method for Unauthorized Bands." Space: Science & Technology 2022 (February 21, 2022): 1–10. http://dx.doi.org/10.34133/2022/9865016.
Full textLi, Xiaoshan, and Mingming Chen. "RT-Cabi: an Internet of Things based framework for anomaly behavior detection with data correction through edge collaboration and dynamic feature fusion." PeerJ Computer Science 10 (October 21, 2024): e2306. http://dx.doi.org/10.7717/peerj-cs.2306.
Full textSagade, Omkar Dhananjay, Atharva Dnyaneshwar Ubhe, and Prof Prerna Siddharth Patil. "Host Based-Intrusion Detection System (Anomaly Detection System)." IOSR Journal of Computer Engineering 26, no. 6 (2024): 08–13. http://dx.doi.org/10.9790/0661-2606010813.
Full text