Journal articles on the topic 'Behavior-based Detection'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Behavior-based Detection.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Wang, Yonghui, Mengjie Wang, and Qingquan Meng. "Video based behavior detection algorithm." Journal of Physics: Conference Series 2504, no. 1 (2023): 012024. http://dx.doi.org/10.1088/1742-6596/2504/1/012024.
Full textKwon, Hee-Yong, Taesic Kim, and Mun-Kyu Lee. "Advanced Intrusion Detection Combining Signature-Based and Behavior-Based Detection Methods." Electronics 11, no. 6 (2022): 867. http://dx.doi.org/10.3390/electronics11060867.
Full textCheoi, Kyung Joo. "Temporal Saliency-Based Suspicious Behavior Pattern Detection." Applied Sciences 10, no. 3 (2020): 1020. http://dx.doi.org/10.3390/app10031020.
Full textWang, Kuochen, Chun-Ying Huang, Li-Yang Tsai, and Ying-Dar Lin. "Behavior-based botnet detection in parallel." Security and Communication Networks 7, no. 11 (2013): 1849–59. http://dx.doi.org/10.1002/sec.898.
Full textBOBROVNIKOVA, K., and D. DENYSIUK. "METHOD FOR MALWARE DETECTION BASED ON THE NETWORK TRAFFIC ANALYSIS AND SOFTWARE BEHAVIOR IN COMPUTER SYSTEMS." Herald of Khmelnytskyi National University. Technical sciences 287, no. 4 (2020): 7–11. https://doi.org/10.31891/2307-5732-2020-287-4-7-11.
Full textNkiru, Ezefosie, and Ohemu Monday Fredrick. "A Data Driven Anomaly Based Behavior Detection Method for Advanced Persistent Threats (APT)." International Journal of Science and Research (IJSR) 10, no. 8 (2021): 663–67. https://doi.org/10.21275/sr21726172522.
Full textLU, Zhengqing, Jiajie Zhou, ChaoWei Wang, Zhihong Zhou, Guoliang Shi, and Ying Yin. "Delivery Garbage Behavior Detection Based on Deep Learning." International Journal of Information Technologies and Systems Approach 17, no. 1 (2024): 1–15. http://dx.doi.org/10.4018/ijitsa.343632.
Full textQi, Haixia, Zihong Chen, Guangsheng Liang, Riyao Chen, Jinzhuo Jiang, and Xiwen Luo. "Broiler Behavior Detection and Tracking Method Based on Lightweight Transformer." Applied Sciences 15, no. 6 (2025): 3333. https://doi.org/10.3390/app15063333.
Full textXu, Yalei, Jing Nie, Honglei Cen, et al. "Spatio-Temporal-Based Identification of Aggressive Behavior in Group Sheep." Animals 13, no. 16 (2023): 2636. http://dx.doi.org/10.3390/ani13162636.
Full textLiu, Yanbing, Shousheng Jia, and Congcong Xing. "A Novel Behavior-Based Virus Detection Method for Smart Mobile Terminals." Discrete Dynamics in Nature and Society 2012 (2012): 1–12. http://dx.doi.org/10.1155/2012/262193.
Full textChen, Haiwei, Guohui Zhou, and Huixin Jiang. "Student Behavior Detection in the Classroom Based on Improved YOLOv8." Sensors 23, no. 20 (2023): 8385. http://dx.doi.org/10.3390/s23208385.
Full textKumrashan, Indranil Iyer. "From Signatures to Behavior: Evolving Strategies for Next-Generation Intrusion Detection." European Journal of Advances in Engineering and Technology 8, no. 6 (2021): 165–71. https://doi.org/10.5281/zenodo.15223002.
Full textLi, Nige, Ziang Lu, Yuanyuan Ma, Yanjiao Chen, and Jiahan Dong. "A Malicious Program Behavior Detection Model Based on API Call Sequences." Electronics 13, no. 6 (2024): 1092. http://dx.doi.org/10.3390/electronics13061092.
Full textGao, Jerry, Jingwen Shi, Priyanka Balla, et al. "Camera-Based Crime Behavior Detection and Classification." Smart Cities 7, no. 3 (2024): 1169–98. http://dx.doi.org/10.3390/smartcities7030050.
Full textRen, Jun. "A Review of Anomalous Behavior Detection in Internet of Vehicles." International Journal of Computer Science and Information Technology 3, no. 1 (2024): 73–81. http://dx.doi.org/10.62051/ijcsit.v3n1.11.
Full textZhang, Xuguang, Qian Zhang, Shuo Hu, Chunsheng Guo, and Hui Yu. "Energy Level-Based Abnormal Crowd Behavior Detection." Sensors 18, no. 2 (2018): 423. http://dx.doi.org/10.3390/s18020423.
Full textShatalin, R. A., V. R. Fidelman, and P. E. Ovchinnikov. "Abnormal behavior detection based on dense trajectories." Computer Optics 42, no. 3 (2018): 476–82. http://dx.doi.org/10.18287/2412-6179-2018-42-3-476-482.
Full textPark, Sang-Hyun, Hye-Wuk Jung, Tae-Bok Yoon, and Jee-Hyong Lee. "Behavior Pattern Modeling based Game Bot detection." Journal of Korean Institute of Intelligent Systems 20, no. 3 (2010): 422–27. http://dx.doi.org/10.5391/jkiis.2010.20.3.422.
Full textKoch, Robert, Mario Golling, and Gabi Dreo Rodosek. "Behavior-based intrusion detection in encrypted environments." IEEE Communications Magazine 52, no. 7 (2014): 124–31. http://dx.doi.org/10.1109/mcom.2014.6852093.
Full textAkrout, Belhassen, and Walid Mahdi. "Hypovigilance Detection Based on Eyelids Behavior Study." International Journal of Recent Contributions from Engineering, Science & IT (iJES) 1, no. 1 (2013): 39. http://dx.doi.org/10.3991/ijes.v1i1.2927.
Full textHan, Lansheng, Cai Fu, Deqing Zou, ChangHoon Lee, and Wenjing Jia. "Task-based behavior detection of illegal codes." Mathematical and Computer Modelling 55, no. 1-2 (2012): 80–86. http://dx.doi.org/10.1016/j.mcm.2011.01.052.
Full textSheng, Jinfang, Jie Hu, Zejun Sun, et al. "Community detection based on human social behavior." Physica A: Statistical Mechanics and its Applications 531 (October 2019): 121765. http://dx.doi.org/10.1016/j.physa.2019.121765.
Full textWang, M. S., N. T. Jeong, K. S. Kim, et al. "Drowsy behavior detection based on driving information." International Journal of Automotive Technology 17, no. 1 (2016): 165–73. http://dx.doi.org/10.1007/s12239-016-0016-y.
Full textQin, Heng, and Jin Hui Zhao. "Insider Threat Detection with Behavior-Based Attestation." Applied Mechanics and Materials 568-570 (June 2014): 1370–75. http://dx.doi.org/10.4028/www.scientific.net/amm.568-570.1370.
Full textGalal, Hisham Shehata, Yousef Bassyouni Mahdy, and Mohammed Ali Atiea. "Behavior-based features model for malware detection." Journal of Computer Virology and Hacking Techniques 12, no. 2 (2015): 59–67. http://dx.doi.org/10.1007/s11416-015-0244-0.
Full textLi, Jun, Wentao Jiang, Jianyi Zhang, Yanhua Shao, and Wei Zhu. "Fake User Detection Based on Multi-Model Joint Representation." Information 15, no. 5 (2024): 266. http://dx.doi.org/10.3390/info15050266.
Full textGao, Ronghua, Qihang Liu, Qifeng Li, et al. "Multi-Target Rumination Behavior Analysis Method of Cows Based on Target Detection and Optical Flow Algorithm." Sustainability 15, no. 18 (2023): 14015. http://dx.doi.org/10.3390/su151814015.
Full textMohan, Mr B. "AN ADVANCED APPROACH FOR DETECTING BEHAVIOR BASED INTRANET ATTACKS BY MACHINE LEARNING." INTERNATIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 04 (2025): 1–9. https://doi.org/10.55041/ijsrem45158.
Full textPeng, Shuyun, Xiaopei Zhang, Luoyu Zhou, and Peng Wang. "YOLO-CBD: Classroom Behavior Detection Method Based on Behavior Feature Extraction and Aggregation." Sensors 25, no. 10 (2025): 3073. https://doi.org/10.3390/s25103073.
Full textDongping, Zhang, Pan Qi, Ma Daobin, Mi Hongmei, and Lin Lili. "Temporally enhanced abnormal behavior detection based on multi-channel coupling." Scientific Insights and Discoveries Review 5 (October 14, 2024): 175–85. http://dx.doi.org/10.59782/sidr.v5i1.156.
Full textCai, Hao, Zhiguang Song, Jianlong Xu, Zhi Xiong, and Yuanquan Xie. "CUDM: A Combined UAV Detection Model Based on Video Abnormal Behavior." Sensors 22, no. 23 (2022): 9469. http://dx.doi.org/10.3390/s22239469.
Full textAnub, A., and S. Sreelekshmy. "Dynamic Threshold-Based Algorithm for Client-Based HTTP Proxy Attack Detection through Spatial and Temporal Behavior Pattern Analysis." Recent Trends in Androids and IOS Applications 6, no. 3 (2024): 48–53. https://doi.org/10.5281/zenodo.13626561.
Full textJiang, Zhenxiang, and Jinping He. "Detection Model for Seepage Behavior of Earth Dams Based on Data Mining." Mathematical Problems in Engineering 2018 (2018): 1–11. http://dx.doi.org/10.1155/2018/8191802.
Full textSuo, Yongfeng, Yan Wang, and Lei Cui. "Ship Anomalous Behavior Detection Based on BPEF Mining and Text Similarity." Journal of Marine Science and Engineering 13, no. 2 (2025): 251. https://doi.org/10.3390/jmse13020251.
Full textWuchner, Tobias, Aleksander Cislak, Martin Ochoa, and Alexander Pretschner. "Leveraging Compression-Based Graph Mining for Behavior-Based Malware Detection." IEEE Transactions on Dependable and Secure Computing 16, no. 1 (2019): 99–112. http://dx.doi.org/10.1109/tdsc.2017.2675881.
Full textHuang, Chiao Ching, Yi Ting Tsao, and Jane Yung Jen Hsu. "Behavior-Based Detection of Abnormal Power Consumption for Power Saving." Applied Mechanics and Materials 291-294 (February 2013): 674–78. http://dx.doi.org/10.4028/www.scientific.net/amm.291-294.674.
Full textFang, Meng-ting, Zhong-ju Chen, Krzysztof Przystupa, Tao Li, Michal Majka, and Orest Kochan. "Examination of Abnormal Behavior Detection Based on Improved YOLOv3." Electronics 10, no. 2 (2021): 197. http://dx.doi.org/10.3390/electronics10020197.
Full textHuang, Jingui, Jingyi Li, and Wenya Wu. "A New Method of Pedestrian Abnormal Behavior Detection Based on Attention Guidance." Advances in Multimedia 2022 (December 20, 2022): 1–20. http://dx.doi.org/10.1155/2022/1038225.
Full textN, Nitha, Rahana, Rahana,, Rizwan M, and Sajitha A S. "Behavioral based threat detection." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 04 (2025): 1–9. https://doi.org/10.55041/ijsrem43633.
Full textGuo, Junbo, Jintao Li, Yongdong Zhang, Dongming Zhang, and Xiao Wu. "Video Copy Detection Based on Trajectory Behavior Pattern." Journal of Computer-Aided Design & Computer Graphics 22, no. 6 (2010): 943–48. http://dx.doi.org/10.3724/sp.j.1089.2010.10842.
Full textWu, Yin He, and Dai Ping Li. "Analysis Based on iOS Application Malicious Behavior Detection." Applied Mechanics and Materials 602-605 (August 2014): 2321–25. http://dx.doi.org/10.4028/www.scientific.net/amm.602-605.2321.
Full textMa, Xu Yan, Guo Mao Liang, Wei Yu, and Zhi Yi Qu. "Abnormal Behavior Detection Based on Global Motion Orientation." Advanced Materials Research 765-767 (September 2013): 2264–67. http://dx.doi.org/10.4028/www.scientific.net/amr.765-767.2264.
Full textZou, Mengsong, Lansheng Han, Ming Liu, and Qiwen Liu. "Virus Detection Method based on Behavior Resource Tree." Journal of Information Processing Systems 7, no. 1 (2011): 173–86. http://dx.doi.org/10.3745/jips.2011.7.1.173.
Full textShi, Yan, Cheng Long, Xuexi Yang, and Min Deng. "Abnormal Ship Behavior Detection Based on AIS Data." Applied Sciences 12, no. 9 (2022): 4635. http://dx.doi.org/10.3390/app12094635.
Full textIsohara, Takamasa, Keisuke Takemori, and Iwao Sasase. "Anomaly Detection on Mobile Phone Based Operational Behavior." IPSJ Digital Courier 4 (2008): 9–17. http://dx.doi.org/10.2197/ipsjdc.4.9.
Full textJebakumari, M. "Visualization and Detection based on User Behavior Typing." International Journal for Research in Applied Science and Engineering Technology 6, no. 4 (2018): 5087–89. http://dx.doi.org/10.22214/ijraset.2018.4830.
Full textSUN, Xiao-yan, Yue-fei ZHU, Qian HUANG, and Ning GUO. "Study of malware detection based on interactive behavior." Journal of Computer Applications 30, no. 6 (2010): 1489–92. http://dx.doi.org/10.3724/sp.j.1087.2010.01489.
Full text张, 树波. "Abnormal Vessel Behavior Detection Based on AIS Data." Artificial Intelligence and Robotics Research 04, no. 04 (2015): 23–31. http://dx.doi.org/10.12677/airr.2015.44004.
Full textZhang, Dongping, Huailiang Peng, Yu Haibin, and Yafei Lu. "Crowd Abnormal Behavior Detection Based on Machine Learning." Information Technology Journal 12, no. 6 (2013): 1199–205. http://dx.doi.org/10.3923/itj.2013.1199.1205.
Full textHu, Jie, Li Xu, Xin He, and Wuqiang Meng. "Abnormal Driving Detection Based on Normalized Driving Behavior." IEEE Transactions on Vehicular Technology 66, no. 8 (2017): 6645–52. http://dx.doi.org/10.1109/tvt.2017.2660497.
Full text