Academic literature on the topic 'Network behavior detection'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Network behavior detection.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Network behavior detection"
BOBROVNIKOVA, K., and D. DENYSIUK. "METHOD FOR MALWARE DETECTION BASED ON THE NETWORK TRAFFIC ANALYSIS AND SOFTWARE BEHAVIOR IN COMPUTER SYSTEMS." Herald of Khmelnytskyi National University. Technical sciences 287, no. 4 (2020): 7–11. https://doi.org/10.31891/2307-5732-2020-287-4-7-11.
Full textZeng, Huiqun, and Huiqian Chen. "Network Intrusion Detection based on LSTM." Frontiers in Science and Engineering 4, no. 9 (2024): 131–37. http://dx.doi.org/10.54691/p4w71z56.
Full textRahman, Atta-ur, Maqsood Mahmud, Tahir Iqbal, et al. "Network Anomaly Detection in 5G Networks." Mathematical Modelling of Engineering Problems 9, no. 2 (2022): 397–404. http://dx.doi.org/10.18280/mmep.090213.
Full textWei-Yi Jing, Wei-Yi Jing, Zhong-Jie Zhu Wei-Yi Jing, Yong-Qiang Bai Zhong-Jie Zhu, Long Li Yong-Qiang Bai, Wei-Feng Cui Long Li, and Wen-Bo Yu Wei-Feng Cui. "Violation Behavior Detection for Non-motor Vehicles." 電腦學刊 34, no. 1 (2023): 175–86. http://dx.doi.org/10.53106/199115992023023401013.
Full textJasmin Salma, S., and B. Aysha Banu. "Revealing of Reducing Manners in Ad Hoc Networks with Crosslayer Approach Using SVM and FDA in Distributed Architecture." Asian Journal of Computer Science and Technology 1, no. 1 (2012): 76–79. http://dx.doi.org/10.51983/ajcst-2012.1.1.1666.
Full textQu, Zhe, Lizhen Cui, and Xiaohui Yang. "HAR-Net: An Hourglass Attention ResNet Network for Dangerous Driving Behavior Detection." Electronics 13, no. 6 (2024): 1019. http://dx.doi.org/10.3390/electronics13061019.
Full textShrikant, Vanve* Prof. Sarita Patil. "OGEDIDS: OPPOSITIONAL GENETIC PROGRAMMING ENSEMBLE FOR DISTRIBUTED INTRUSION DETECTION SYSTEMS." INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY 5, no. 7 (2016): 756–62. https://doi.org/10.5281/zenodo.57737.
Full textParres-Peredo, Alvaro, Ivan Piza-Davila, and Francisco Cervantes. "Unexpected-Behavior Detection Using TopK Rankings for Cybersecurity." Applied Sciences 9, no. 20 (2019): 4381. http://dx.doi.org/10.3390/app9204381.
Full textMohan, Mr B. "AN ADVANCED APPROACH FOR DETECTING BEHAVIOR BASED INTRANET ATTACKS BY MACHINE LEARNING." INTERNATIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 04 (2025): 1–9. https://doi.org/10.55041/ijsrem45158.
Full textMeng, Yongwei, Tao Qin, Shancang Li, and Pinghui Wang. "Behavior Pattern Mining from Traffic and Its Application to Network Anomaly Detection." Security and Communication Networks 2022 (June 29, 2022): 1–17. http://dx.doi.org/10.1155/2022/9139321.
Full textDissertations / Theses on the topic "Network behavior detection"
Carlsson, Oskar, and Daniel Nabhani. "User and Entity Behavior Anomaly Detection using Network Traffic." Thesis, Blekinge Tekniska Högskola, Institutionen för datalogi och datorsystemteknik, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-14636.
Full textZhou, Mian. "Network Intrusion Detection: Monitoring, Simulation and Visualization." Doctoral diss., University of Central Florida, 2005. http://digital.library.ucf.edu/cdm/ref/collection/ETD/id/4063.
Full textAlipour, Hamid Reza. "An Anomaly Behavior Analysis Methodology for Network Centric Systems." Diss., The University of Arizona, 2013. http://hdl.handle.net/10150/305804.
Full textSatam, Pratik. "An Anomaly Behavior Analysis Intrusion Detection System for Wireless Networks." Thesis, The University of Arizona, 2015. http://hdl.handle.net/10150/595654.
Full textGOMES, FERREIRA CARLOS HENRIQUE. "Modeling and Analyzing Collective Behavior Captured by Many-to-Many Networks." Doctoral thesis, Politecnico di Torino, 2022. http://hdl.handle.net/11583/2966351.
Full textKhasgiwala, Jitesh. "Analysis of Time-Based Approach for Detecting Anomalous Network Traffic." Ohio University / OhioLINK, 2005. http://www.ohiolink.edu/etd/view.cgi?ohiou1113583042.
Full textGhosh, Dastidar Samanwoy. "Models of EEG data mining and classification in temporal lobe epilepsy: wavelet-chaos-neural network methodology and spiking neural networks." Columbus, Ohio : Ohio State University, 2007. http://rave.ohiolink.edu/etdc/view?acc%5Fnum=osu1180459585.
Full textStafford, John, and John Stafford. "Behavior-based Worm Detection." Thesis, University of Oregon, 2012. http://hdl.handle.net/1794/12341.
Full textFarrell, Alan D. (Alan Douglas) Carleton University Dissertation Engineering Electrical. "Detection of abnormal router behaviour in a Wide Area Network." Ottawa, 1993.
Find full textTeknős, Martin. "Rozšíření behaviorální analýzy síťové komunikace určené pro detekci útoků." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2015. http://www.nusl.cz/ntk/nusl-234931.
Full textBooks on the topic "Network behavior detection"
L, Commons Michael, and Symposium on Quantitative Analyses of Behavior., eds. Behavioral approaches to pattern recognition and concept formation. Erlbaum Associates, 1990.
Find full textL, Commons Michael, and Symposium on Quantitative Analyses of Behavior. (8th : 1985 : Harvard University), eds. Computational and clinical approaches to pattern recognition and concept formation. Lawrence Erlbaum Associates, 1990.
Find full text(Editor), Michael L. Commons, Stephen Grossberg (Editor), and John E.R. Staddon (Editor), eds. Neural Network Models of Conditioning and Action: Quantitative Analyses of Behavior (Quantitative Analysis of Behavior Series). Lawrence Erlbaum, 1991.
Find full text(Editor), Michael L. Commons, Stephen Grossberg (Editor), and John E.R. Staddon (Editor), eds. Neural Network Models of Conditioning and Action: Quantitative Analyses of Behavior. Lawrence Erlbaum, 1991.
Find full textRajchel, Brett. Unsupervised Learning of Network Traffic Behaviors for Insider Threat Detection. Independently Published, 2021.
Find full text(Editor), Michael L. Commons, John A. Nevin (Editor), Michael C. Davison (Editor), and Michael Davidson (Editor), eds. Signal Detection: Mechanisms, Models, and Applications (Quantitative Analyses of Behavior). Lawrence Erlbaum, 1991.
Find full textHosmer, Chet. Defending IoT Infrastructures with the Raspberry Pi: Monitoring and Detecting Nefarious Behavior in Real Time. Apress, 2018.
Find full text(Editor), Michael L. Commons, Richard J. Herrnstein (Editor), Stephen M. Kosslyn (Editor), and David B. Mumford (Editor), eds. Computational and Clinical Approaches to Pattern Recognition and Concept Formation: Quantitative Analyses of Behavior, Volume IX (Quantitative Analyses of Behavior). Lawrence Erlbaum, 1990.
Find full text(Editor), Michael L. Commons, James E. Mazur (Editor), John A. Nevin (Editor), and Howard Rachlin (Editor), eds. The Effect of Delay and of Intervening Events on Reinforcement Value: Quantitative Analyses of Behavior, Volume V (Quantitative Analyses of Behavior). Lawrence Erlbaum, 1986.
Find full textUfimtseva, Nataliya V., Iosif A. Sternin, and Elena Yu Myagkova. Russian psycholinguistics: results and prospects (1966–2021): a research monograph. Institute of Linguistics, Russian Academy of Sciences, 2021. http://dx.doi.org/10.30982/978-5-6045633-7-3.
Full textBook chapters on the topic "Network behavior detection"
Ko, Mon Mon, and Mie Mie Su Thwin. "Anomalous Behavior Detection in Mobile Network." In Advances in Intelligent Systems and Computing. Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-23207-2_15.
Full textChen, Wenwu, Su Yang, Xu An Wang, Wei Zhang, and Jindan Zhang. "Network Malicious Behavior Detection Using Bidirectional LSTM." In Advances in Intelligent Systems and Computing. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-93659-8_57.
Full textZhang, Pengyuan, and Baojiang Cui. "Network Scanning Detection Based on Spatiotemporal Behavior." In Advances in Internet, Data & Web Technologies. Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-53555-0_11.
Full textWang, Sheng, Jiaming Song, and Ruixu Guo. "Char-Level Neural Network for Network Anomaly Behavior Detection." In Human Centered Computing. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-15127-0_6.
Full textKim, Misun, Minsoo Kim, and JaeHyun Seo. "Network Anomaly Behavior Detection Using an Adaptive Multiplex Detector." In Computational Science and Its Applications - ICCSA 2006. Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11751595_17.
Full textTong, Yan, Jian Zhang, Wei Chen, Mingdi Xu, and Tao Qin. "Dynamic Group Behavior Analysis and Its Application in Network Abnormal Behavior Detection." In Communications and Networking. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-78139-6_30.
Full textZhang, Yuanzhe, Qiqiang Jin, Maohan Liang, Ruixin Ma, and Ryan Wen Liu. "Vessel Behavior Anomaly Detection Using Graph Attention Network." In Neural Information Processing. Springer Nature Singapore, 2023. http://dx.doi.org/10.1007/978-981-99-8073-4_23.
Full textAbu-Helo, Hamdi, and Huthaifa Ashqar. "Early Ransomware Detection System Based on Network Behavior." In Advanced Information Networking and Applications. Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-57931-8_43.
Full textGarg, Shree, Anil K. Sarje, and Sateesh Kumar Peddoju. "Improved Detection of P2P Botnets through Network Behavior Analysis." In Communications in Computer and Information Science. Springer Berlin Heidelberg, 2014. http://dx.doi.org/10.1007/978-3-642-54525-2_30.
Full textChen, Junjie, Shaoyong Guo, Wencui Li, Jing Shen, Xuesong Qiu, and Sujie Shao. "Network Abnormal Behavior Detection Method Based on Affinity Propagation." In Communications in Computer and Information Science. Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-8086-4_55.
Full textConference papers on the topic "Network behavior detection"
Dalal, Harshita, Gunjan Thakkar, Himanshu Naik, Kamlesh Kalbande, Asakti Rautkar, and Nekita Chavhan Morris. "Phishing Detection in Dynamic Environments Using Network Behavior." In 2025 3rd International Conference on Advancement in Computation & Computer Technologies (InCACCT). IEEE, 2025. https://doi.org/10.1109/incacct65424.2025.11011414.
Full textZhang, Hua. "Dangerous Behavior Detection Based on Convolutional Neural Network Algorithm." In 2024 4th International Signal Processing, Communications and Engineering Management Conference (ISPCEM). IEEE, 2024. https://doi.org/10.1109/ispcem64498.2024.00055.
Full textShe, Xiangyang, and Zhiqi Xu. "Human Abnormal Behavior Detection Based on Multimodal Data Fusion." In 2024 International Conference on Data Science and Network Security (ICDSNS). IEEE, 2024. http://dx.doi.org/10.1109/icdsns62112.2024.10691026.
Full textTong, Xiaochun, and Mary Jane C. Samonte. "Research on dangerous driving behavior recognition method based on convolutional neural network." In 3rd International Conference on Image Processing, Object Detection and Tracking (IPODT24), edited by Bin Liu and Lu Leng. SPIE, 2024. http://dx.doi.org/10.1117/12.3050403.
Full textKoyama, Yusuke, Hideaki Miyaji, and Hiroshi Yamamoto. "Abnormal Behavior Detection Network System Using 3D LiDAR for Station Platforms." In 2025 IEEE International Conference on Consumer Electronics (ICCE). IEEE, 2025. https://doi.org/10.1109/icce63647.2025.10929963.
Full textMa, Tianfu, Jian Bao, Hao Yang, Xuejiao Zhao, Qingwang Zhang, and Wanting Lv. "Network Anomaly Behavior Detection and Security Protection based on Clustering Algorithm." In 2025 International Conference on Intelligent Systems and Computational Networks (ICISCN). IEEE, 2025. https://doi.org/10.1109/iciscn64258.2025.10934590.
Full textAi-Fen Sui, Dai-Fei Guo, Tao Guo, and Ming-zhu Li. "Network behavior based mobile virus detection." In 2012 IEEE 14th International Conference on Communication Technology (ICCT). IEEE, 2012. http://dx.doi.org/10.1109/icct.2012.6511430.
Full textCao, Jin, Lawrence Drabeck, and Ran He. "Statistical network behavior based threat detection." In 2017 IEEE Conference on Computer Communications: Workshops (INFOCOM WKSHPS). IEEE, 2017. http://dx.doi.org/10.1109/infcomw.2017.8116413.
Full textDonetti, Luca. "Improved spectral algorithm for the detection of network communities." In MODELING COOPERATIVE BEHAVIOR IN THE SOCIAL SCIENCES. AIP, 2005. http://dx.doi.org/10.1063/1.2008598.
Full textWighneswara, Alifiannisa Alyahasna, Anita Sjahrunnisa, Yasinta Romadhona, et al. "Network Behavior Anomaly Detection using Decision Tree." In 2023 IEEE 12th International Conference on Communication Systems and Network Technologies (CSNT). IEEE, 2023. http://dx.doi.org/10.1109/csnt57126.2023.10134589.
Full textReports on the topic "Network behavior detection"
Alonso-Robisco, Andrés, Andrés Alonso-Robisco, José Manuel Carbó, et al. Empowering financial supervision: a SupTech experiment using machine learning in an early warning system. Banco de España, 2025. https://doi.org/10.53479/39320.
Full textGraham, Timothy, and Katherine M. FitzGerald. Bots, Fake News and Election Conspiracies: Disinformation During the Republican Primary Debate and the Trump Interview. Queensland University of Technology, 2023. http://dx.doi.org/10.5204/rep.eprints.242533.
Full textSeginer, Ido, Louis D. Albright, and Robert W. Langhans. On-line Fault Detection and Diagnosis for Greenhouse Environmental Control. United States Department of Agriculture, 2001. http://dx.doi.org/10.32747/2001.7575271.bard.
Full textSmit, Amelia, Kate Dunlop, Nehal Singh, Diona Damian, Kylie Vuong, and Anne Cust. Primary prevention of skin cancer in primary care settings. The Sax Institute, 2022. http://dx.doi.org/10.57022/qpsm1481.
Full text