Journal articles on the topic 'Network behavior detection'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Network behavior detection.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
BOBROVNIKOVA, K., and D. DENYSIUK. "METHOD FOR MALWARE DETECTION BASED ON THE NETWORK TRAFFIC ANALYSIS AND SOFTWARE BEHAVIOR IN COMPUTER SYSTEMS." Herald of Khmelnytskyi National University. Technical sciences 287, no. 4 (2020): 7–11. https://doi.org/10.31891/2307-5732-2020-287-4-7-11.
Full textZeng, Huiqun, and Huiqian Chen. "Network Intrusion Detection based on LSTM." Frontiers in Science and Engineering 4, no. 9 (2024): 131–37. http://dx.doi.org/10.54691/p4w71z56.
Full textRahman, Atta-ur, Maqsood Mahmud, Tahir Iqbal, et al. "Network Anomaly Detection in 5G Networks." Mathematical Modelling of Engineering Problems 9, no. 2 (2022): 397–404. http://dx.doi.org/10.18280/mmep.090213.
Full textWei-Yi Jing, Wei-Yi Jing, Zhong-Jie Zhu Wei-Yi Jing, Yong-Qiang Bai Zhong-Jie Zhu, Long Li Yong-Qiang Bai, Wei-Feng Cui Long Li, and Wen-Bo Yu Wei-Feng Cui. "Violation Behavior Detection for Non-motor Vehicles." 電腦學刊 34, no. 1 (2023): 175–86. http://dx.doi.org/10.53106/199115992023023401013.
Full textJasmin Salma, S., and B. Aysha Banu. "Revealing of Reducing Manners in Ad Hoc Networks with Crosslayer Approach Using SVM and FDA in Distributed Architecture." Asian Journal of Computer Science and Technology 1, no. 1 (2012): 76–79. http://dx.doi.org/10.51983/ajcst-2012.1.1.1666.
Full textQu, Zhe, Lizhen Cui, and Xiaohui Yang. "HAR-Net: An Hourglass Attention ResNet Network for Dangerous Driving Behavior Detection." Electronics 13, no. 6 (2024): 1019. http://dx.doi.org/10.3390/electronics13061019.
Full textShrikant, Vanve* Prof. Sarita Patil. "OGEDIDS: OPPOSITIONAL GENETIC PROGRAMMING ENSEMBLE FOR DISTRIBUTED INTRUSION DETECTION SYSTEMS." INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY 5, no. 7 (2016): 756–62. https://doi.org/10.5281/zenodo.57737.
Full textParres-Peredo, Alvaro, Ivan Piza-Davila, and Francisco Cervantes. "Unexpected-Behavior Detection Using TopK Rankings for Cybersecurity." Applied Sciences 9, no. 20 (2019): 4381. http://dx.doi.org/10.3390/app9204381.
Full textMohan, Mr B. "AN ADVANCED APPROACH FOR DETECTING BEHAVIOR BASED INTRANET ATTACKS BY MACHINE LEARNING." INTERNATIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 04 (2025): 1–9. https://doi.org/10.55041/ijsrem45158.
Full textMeng, Yongwei, Tao Qin, Shancang Li, and Pinghui Wang. "Behavior Pattern Mining from Traffic and Its Application to Network Anomaly Detection." Security and Communication Networks 2022 (June 29, 2022): 1–17. http://dx.doi.org/10.1155/2022/9139321.
Full textLi, Yinjia, Zeyuan Hu, Yixi Zhang, Jihang Liu, Wan Tu, and Hong Yu. "DDEYOLOv9: Network for Detecting and Counting Abnormal Fish Behaviors in Complex Water Environments." Fishes 9, no. 6 (2024): 242. http://dx.doi.org/10.3390/fishes9060242.
Full textXuan, Cho Do, Duc Duong, and Hoang Xuan Dau. "A multi-layer approach for advanced persistent threat detection using machine learning based on network traffic." Journal of Intelligent & Fuzzy Systems 40, no. 6 (2021): 11311–29. http://dx.doi.org/10.3233/jifs-202465.
Full textPeng, Shuyun, Xiaopei Zhang, Luoyu Zhou, and Peng Wang. "YOLO-CBD: Classroom Behavior Detection Method Based on Behavior Feature Extraction and Aggregation." Sensors 25, no. 10 (2025): 3073. https://doi.org/10.3390/s25103073.
Full textFeng, Yan, Zhihai Yang, Qindong Sun, and Yanxiao Liu. "SEDAT: A Stacked Ensemble Learning-Based Detection Model for Multiscale Network Attacks." Electronics 13, no. 15 (2024): 2953. http://dx.doi.org/10.3390/electronics13152953.
Full textGuo, Dajun. "Application of Big Data Analysis and Cloud Computing Technology." International Journal of Grid and High Performance Computing 16, no. 1 (2024): 1–19. http://dx.doi.org/10.4018/ijghpc.349891.
Full textS.Sankar Ganesh. "Next-Generation Threat Detection and Mitigation in 6G Wireless Networks Using IAM, ZTNA and Advanced Security Mechanisms." Journal of Electrical Systems 20, no. 5s (2024): 2078–85. http://dx.doi.org/10.52783/jes.2545.
Full textS.Sankar Ganesh. "Next-Generation Threat Detection and Mitigation in 6G Wireless Networks Using IAM, ZTNA and Advanced Security Mechanisms." Journal of Electrical Systems 20, no. 5s (2024): 2034–41. http://dx.doi.org/10.52783/jes.2540.
Full textXie, Bin, Xinyu Dong, and Changguang Wang. "An Improved K -Means Clustering Intrusion Detection Algorithm for Wireless Networks Based on Federated Learning." Wireless Communications and Mobile Computing 2021 (August 4, 2021): 1–15. http://dx.doi.org/10.1155/2021/9322368.
Full textWang, Zhifeng, Minghui Wang, Chunyan Zeng, and Longlong Li. "SBD-Net: Incorporating Multi-Level Features for an Efficient Detection Network of Student Behavior in Smart Classrooms." Applied Sciences 14, no. 18 (2024): 8357. http://dx.doi.org/10.3390/app14188357.
Full textHaseeb-ur-rehman, Rana M. Abdul, Azana Hafizah Mohd Aman, Mohammad Kamrul Hasan, et al. "High-Speed Network DDoS Attack Detection: A Survey." Sensors 23, no. 15 (2023): 6850. http://dx.doi.org/10.3390/s23156850.
Full textJayashree, Devasagayam, V. Uma Rani, and K. Soma Sundaram. "Trust Based Misbehavior Detection in Wireless Sensor Networks." Applied Mechanics and Materials 622 (August 2014): 191–98. http://dx.doi.org/10.4028/www.scientific.net/amm.622.191.
Full textQin, Zhi-Quan, Hong-Zuo Xu, Xing-Kong Ma, and Yong-Jun Wang. "Interaction Context-Aware Network Behavior Anomaly Detection for Discovering Unknown Attacks." Security and Communication Networks 2022 (April 11, 2022): 1–24. http://dx.doi.org/10.1155/2022/3595304.
Full textWang, Zhifeng, Jialong Yao, Chunyan Zeng, Longlong Li, and Cheng Tan. "Students’ Classroom Behavior Detection System Incorporating Deformable DETR with Swin Transformer and Light-Weight Feature Pyramid Network." Systems 11, no. 7 (2023): 372. http://dx.doi.org/10.3390/systems11070372.
Full textZhang, Shuzhuang, Yingjun Qiu, Hao Luo, and Zhigang Wu. "Application Communities Detection in Network." Applied Sciences 9, no. 1 (2018): 31. http://dx.doi.org/10.3390/app9010031.
Full textQi, Haixia, Zihong Chen, Guangsheng Liang, Riyao Chen, Jinzhuo Jiang, and Xiwen Luo. "Broiler Behavior Detection and Tracking Method Based on Lightweight Transformer." Applied Sciences 15, no. 6 (2025): 3333. https://doi.org/10.3390/app15063333.
Full textRustamiy, Dr Salima, Nargis Kurbanazarova, Gulbakhor Atayeva, et al. "Multi-Scale Attention-based Wireless Network Algorithm for Enhancing Language Learning Outcomes." Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications 16, no. 1 (2025): 94–103. https://doi.org/10.58346/jowua.2025.i1.005.
Full textChugh, Neeraj, Geetam Singh Tomar, Robin Singh Bhadoria, and Neetesh Saxena. "A Novel Anomaly Behavior Detection Scheme for Mobile Ad Hoc Networks." Electronics 10, no. 14 (2021): 1635. http://dx.doi.org/10.3390/electronics10141635.
Full textKudrekar, Sheelavathy Veerabhadrappa, and Udaya Rani Vinayakamurthy. "Classification of malware using multinomial linked latent modular double q learning." Indonesian Journal of Electrical Engineering and Computer Science 28, no. 1 (2022): 577. http://dx.doi.org/10.11591/ijeecs.v28.i1.pp577-586.
Full textKudrekar, Sheelavathy Veerabhadrappa, and Udaya Rani Vinayaka Murthy. "Classification of malware using multinomial linked latent modular double q learning." Indonesian Journal of Electrical Engineering and Computer Science 28, no. 1 (2022): 577–86. https://doi.org/10.11591/ijeecs.v28.i1.pp577-586.
Full textK, Rajesh Kumar. "DETECTION OF WIRELESS NETWORK ATTACKS USING SUPERVISED MACHINE LEARNING TECHNIQUE." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 05 (2024): 1–5. http://dx.doi.org/10.55041/ijsrem33590.
Full textLi, Tao, Wenzhe Dong, Aiqun Hu, and Jinguang Han. "Task-Oriented Network Abnormal Behavior Detection Method." Security and Communication Networks 2022 (June 30, 2022): 1–13. http://dx.doi.org/10.1155/2022/3105291.
Full textHe, Yukun, Qiang Li, Jian Cao, Yuede Ji, and Dong Guo. "Understanding socialbot behavior on end hosts." International Journal of Distributed Sensor Networks 13, no. 2 (2017): 155014771769417. http://dx.doi.org/10.1177/1550147717694170.
Full textWang, Yonghui, Mengjie Wang, and Qingquan Meng. "Video based behavior detection algorithm." Journal of Physics: Conference Series 2504, no. 1 (2023): 012024. http://dx.doi.org/10.1088/1742-6596/2504/1/012024.
Full textHong, Ni, Xuefeng Wang, and Zhonghua Wang. "Abnormal Access Behavior Detection of Ideological and Political MOOCs in Colleges and Universities." Mobile Information Systems 2021 (April 21, 2021): 1–9. http://dx.doi.org/10.1155/2021/9977736.
Full textMaulana, Asep, and Martin Atzmueller. "Many-Objective Optimization for Anomaly Detection on Multi-Layer Complex Interaction Networks." Applied Sciences 11, no. 9 (2021): 4005. http://dx.doi.org/10.3390/app11094005.
Full textTatarnikova, Tatiana, and Pavel Bogdanov. "Intrusion detection in internet of things networks based on machine learning methods." Information and Control Systems, no. 6 (December 16, 2021): 42–52. http://dx.doi.org/10.31799/1684-8853-2021-6-42-52.
Full textLiu, Shida, Xuyun Wang, Honghai Ji, Li Wang, and Zhongsheng Hou. "A Novel Driver Abnormal Behavior Recognition and Analysis Strategy and Its Application in a Practical Vehicle." Symmetry 14, no. 10 (2022): 1956. http://dx.doi.org/10.3390/sym14101956.
Full textHe, Mingshu, Xiaojuan Wang, Junhua Zhou, Yuanyuan Xi, Lei Jin, and Xinlei Wang. "Deep-Feature-Based Autoencoder Network for Few-Shot Malicious Traffic Detection." Security and Communication Networks 2021 (March 26, 2021): 1–13. http://dx.doi.org/10.1155/2021/6659022.
Full textHan, Zhen-Hui, Xing-Shu Chen, Xue-Mei Zeng, Yi Zhu, and Ming-Yong Yin. "Detecting Proxy User Based on Communication Behavior Portrait." Computer Journal 62, no. 12 (2019): 1777–92. http://dx.doi.org/10.1093/comjnl/bxz065.
Full textChen, Binbin, Xiuhui Wang, Qifu Bao, Bo Jia, Xuesheng Li, and Yaru Wang. "An Unsafe Behavior Detection Method Based on Improved YOLO Framework." Electronics 11, no. 12 (2022): 1912. http://dx.doi.org/10.3390/electronics11121912.
Full textHiba, Fathima K. P.* Anugraha P. P. "A Review on Network Intrusion Detection." International Journal of Scientific Research and Technology 2, no. 1 (2025): 60–66. https://doi.org/10.5281/zenodo.14598998.
Full textShou, Zhaoyu, Mingbang Yan, Hui Wen, Jinghua Liu, Jianwen Mo, and Huibing Zhang. "Research on Students’ Action Behavior Recognition Method Based on Classroom Time-Series Images." Applied Sciences 13, no. 18 (2023): 10426. http://dx.doi.org/10.3390/app131810426.
Full textR.Surya Prabha, S.Saraswathi. "Enhancing MANET Security: A Collaborative Dynamic Multi-Agent Approach for Wormhole Attack Detection and Mitigation (CDMA-Worm)." Journal of Information Systems Engineering and Management 10, no. 15s (2025): 528–43. https://doi.org/10.52783/jisem.v10i15s.2491.
Full textNamayanja, Josephine M., and Vandana P. Janeja. "Change Detection in Large Evolving Networks." International Journal of Data Warehousing and Mining 15, no. 2 (2019): 62–79. http://dx.doi.org/10.4018/ijdwm.2019040104.
Full textZhao, Ying, Junjun Chen, Di Wu, et al. "Network Anomaly Detection by Using a Time-Decay Closed Frequent Pattern." Information 10, no. 8 (2019): 262. http://dx.doi.org/10.3390/info10080262.
Full textLi, Jun, Wentao Jiang, Jianyi Zhang, Yanhua Shao, and Wei Zhu. "Fake User Detection Based on Multi-Model Joint Representation." Information 15, no. 5 (2024): 266. http://dx.doi.org/10.3390/info15050266.
Full textTang, Longyu, Tao Xie, Yunong Yang, and Hong Wang. "Classroom Behavior Detection Based on Improved YOLOv5 Algorithm Combining Multi-Scale Feature Fusion and Attention Mechanism." Applied Sciences 12, no. 13 (2022): 6790. http://dx.doi.org/10.3390/app12136790.
Full textZhang, Bing, Zhiyang Liu, Yanguo Jia, Jiadong Ren, and Xiaolin Zhao. "Network Intrusion Detection Method Based on PCA and Bayes Algorithm." Security and Communication Networks 2018 (November 13, 2018): 1–11. http://dx.doi.org/10.1155/2018/1914980.
Full textXu, Yalei, Jing Nie, Honglei Cen, et al. "An Image Detection Model for Aggressive Behavior of Group Sheep." Animals 13, no. 23 (2023): 3688. http://dx.doi.org/10.3390/ani13233688.
Full textTsai, Wen-Chia, Jhih-Sheng Lai, Kuan-Chou Chen, Vinay M.Shivanna, and Jiun-In Guo. "A Lightweight Motional Object Behavior Prediction System Harnessing Deep Learning Technology for Embedded ADAS Applications." Electronics 10, no. 6 (2021): 692. http://dx.doi.org/10.3390/electronics10060692.
Full text