Academic literature on the topic 'Suspicious Activity Detection'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Suspicious Activity Detection.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Suspicious Activity Detection"
Talekar, P. R. "Suspicious Activity Detection." International Journal of Advance and Applied Research 5, no. 17 (2024): 31–38. https://doi.org/10.5281/zenodo.12164825.
Full textGhosh, Sumon, Prasham Shah, Aditya Ghadge, and Vaibhav Sanghavi. "Suspicious Activity Detection." International Journal for Research in Applied Science and Engineering Technology 10, no. 11 (2022): 113–16. http://dx.doi.org/10.22214/ijraset.2022.47186.
Full textGaware, Rutik. "Suspicious Activity Detection." International Journal for Research in Applied Science and Engineering Technology 11, no. 12 (2023): 1632–35. http://dx.doi.org/10.22214/ijraset.2023.57711.
Full textAnsari, Dr Vaqar, Aditya Ghadge, Prasham Shah, Sumon Ghosh, and Vaibhav Sanghavi. "Suspicious Activity Detection Using Different Models." International Journal for Research in Applied Science and Engineering Technology 11, no. 4 (2023): 2668–77. http://dx.doi.org/10.22214/ijraset.2023.50729.
Full textBhambri, Pankaj, Sachin Bagga, Dhanuka Priya, Harnoor Singh, and Harleen Kaur Dhiman. "Suspicious Human Activity Detection System." December 2020 2, no. 4 (2020): 216–21. http://dx.doi.org/10.36548/jismac.2020.4.005.
Full textRenushe, Prof Mrs A. H., Miss Varsha Poojary, Miss Salonee Shirsat, Miss Sakshi Sonawale, and Miss Pratiksha Yadav. "Suspicious Activity Tracking." International Journal for Research in Applied Science and Engineering Technology 12, no. 2 (2024): 1105–7. http://dx.doi.org/10.22214/ijraset.2024.58499.
Full textKumbhar, Bhagyashri, Pranav Pisal, Kunal Kene, and Aditi Raut. "Suspicious Activity Detection Using Machine Learning." International Journal for Research in Applied Science and Engineering Technology 11, no. 5 (2023): 3745–48. http://dx.doi.org/10.22214/ijraset.2023.52486.
Full textSelvi, Esakky, Malaiyalathan Adimoolam, Govindharaju Karthi, et al. "Suspicious Actions Detection System Using Enhanced CNN and Surveillance Video." Electronics 11, no. 24 (2022): 4210. http://dx.doi.org/10.3390/electronics11244210.
Full textYasmeen, Bushra, Haslina Arshad, and Hameedur Rahman. "SUSPICIOUS ACTIVITY DETECTION USING CCTV SURVEILLANCE VIDEO." Journal of Information System and Technology Management 6, no. 22 (2021): 60–70. http://dx.doi.org/10.35631/jistm.622006.
Full textOuivirach, Kan, Shashi Gharti, and Matthew N. Dailey. "Incremental behavior modeling and suspicious activity detection." Pattern Recognition 46, no. 3 (2013): 671–80. http://dx.doi.org/10.1016/j.patcog.2012.10.008.
Full textDissertations / Theses on the topic "Suspicious Activity Detection"
Kalutarage, H. K. "Effective monitoring of slow suspicious activites on computer networks." Thesis, Coventry University, 2013. http://curve.coventry.ac.uk/open/items/afdbba5c-2c93-41a7-90c3-2f0f3261b794/1.
Full textBooks on the topic "Suspicious Activity Detection"
Book chapters on the topic "Suspicious Activity Detection"
Sarang, Shefali, Harshal Shinde, Vaishnavi Raut, Shubham Sonje, and Gargi Phadke. "Real-Time Suspicious Activity Detection." In Advances in Intelligent Systems and Computing. Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-2475-2_43.
Full textPawade, Ashutosh, Rohan Anjaria, and V. R. Satpute. "Suspicious Activity Detection for Security Cameras." In Algorithms for Intelligent Systems. Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-33-4862-2_22.
Full textParris, Matthew Marlon Gideon, Hisham Al Assam, and Mohammad Athar Ali. "Suspicious Activity Detection for Defence Applications." In Lecture Notes in Computer Science. Springer Nature Switzerland, 2024. https://doi.org/10.1007/978-3-031-72059-8_12.
Full textSaini, Anjali, Mushtaq Ahmed, and Kartikey Sharma. "Detection of Suspicious Activity in ATM Booth." In Intelligent Computing Techniques for Smart Energy Systems. Springer Singapore, 2019. http://dx.doi.org/10.1007/978-981-15-0214-9_97.
Full textSenthilkumar, T., and G. Narmatha. "Suspicious Human Activity Detection in Classroom Examination." In Advances in Intelligent Systems and Computing. Springer Singapore, 2015. http://dx.doi.org/10.1007/978-981-10-0251-9_11.
Full textGorave, Asmita, Srinibas Misra, Omkar Padir, Anirudha Patil, and Kshitij Ladole. "Suspicious Activity Detection Using Live Video Analysis." In Proceeding of International Conference on Computational Science and Applications. Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-0790-8_21.
Full textRaut, Aditi, Santosh Indulkar, Kaushik Panchal, Prajwal Upadhyay, and Sony Kurian. "Automated Suspicious Activity Detection from Surveillance Videos." In Advances in Intelligent Systems and Computing. Springer Nature Singapore, 2023. http://dx.doi.org/10.1007/978-981-99-3608-3_5.
Full textThombare, Puja, Vishal Gond, and V. R. Satpute. "Artificial Intelligence for Low Level Suspicious Activity Detection." In Algorithms for Intelligent Systems. Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-33-4862-2_23.
Full textLiu, Xuan, Pengzhu Zhang, and Dajun Zeng. "Sequence Matching for Suspicious Activity Detection in Anti-Money Laundering." In Intelligence and Security Informatics. Springer Berlin Heidelberg, 2008. http://dx.doi.org/10.1007/978-3-540-69304-8_6.
Full textGulhane, V. S., and A. M. Bhugul. "Darknet for Gun and Suspicious Activity Detection and Crime Prediction." In Deep Learning Applications in Operations Research. Auerbach Publications, 2024. http://dx.doi.org/10.1201/9781032725444-8.
Full textConference papers on the topic "Suspicious Activity Detection"
Manuel, Abejun Ranz A., Riley Sebastianne D. Bughaw, and Charmaine C. Paglinawan. "Application of Pose Recognition for Suspicious-Activity Detection Alarm System." In 2024 IEEE International Conference on Artificial Intelligence in Engineering and Technology (IICAIET). IEEE, 2024. http://dx.doi.org/10.1109/iicaiet62352.2024.10730643.
Full textRadhika, R., and A. Muthukumaravel. "Behavioral Analysis in Video Streams: Towards Automated Suspicious Activity Detection." In 2024 Asian Conference on Intelligent Technologies (ACOIT). IEEE, 2024. https://doi.org/10.1109/acoit62457.2024.10940053.
Full textRajpoot, Lucky, and Rosy Madaan. "Comprehensive Review for Video Surveillance Based Suspicious Human Activity Detection." In 2024 2nd International Conference on Advances in Computation, Communication and Information Technology (ICAICCIT). IEEE, 2024. https://doi.org/10.1109/icaiccit64383.2024.10912320.
Full textKumar, Prabhakar, Sahil Singh, Md Tahseen Raza, and Yojna Arora. "Comparative Analysis of Suspicious Activity Detection Techniques in Surveillance Videos." In 2025 3rd International Conference on Disruptive Technologies (ICDT). IEEE, 2025. https://doi.org/10.1109/icdt63985.2025.10986382.
Full textRadhika, R., and A. Muthukumaravel. "Video Surveillance and Deep Learning Enhancing Security through Suspicious Activity Detection." In 2024 International Conference on Intelligent Algorithms for Computational Intelligence Systems (IACIS). IEEE, 2024. http://dx.doi.org/10.1109/iacis61494.2024.10721938.
Full textR, Pavithra, Paul Steve Mithun B, Sofen T R, Shanmuga Prasath C, and Saravana V. "Real-Time Suspicious Activity Detection in Bank and ATM Environments Using Meta-Learning and Edge Computing." In 2025 International Conference on Data Science, Agents & Artificial Intelligence (ICDSAAI). IEEE, 2025. https://doi.org/10.1109/icdsaai65575.2025.11011591.
Full textA., Alavudeen Basha, Parthasarathy P., and Vivekanandan S. "Expression of Concern for: Detection of Suspicious Human Activity based on CNN-DBNN Algorithm for Video Surveillance Applications." In 2019 Innovations in Power and Advanced Computing Technologies (i-PACT). IEEE, 2019. http://dx.doi.org/10.1109/i-pact44901.2019.10702766.
Full textV, Benedict Vinusha, V. Indhuja, Medarametla Varshitha Reddy, Nagalla Nikhitha, and Priyanka Pramila. "Suspicious Activity Detection using LRCN." In 2023 5th International Conference on Smart Systems and Inventive Technology (ICSSIT). IEEE, 2023. http://dx.doi.org/10.1109/icssit55814.2023.10061045.
Full textLoganathan, Sathyajit, Gayashan Kariyawasam, and Prasanna Sumathipala. "Suspicious Activity Detection in Surveillance Footage." In 2019 International Conference on Electrical and Computing Technologies and Applications (ICECTA). IEEE, 2019. http://dx.doi.org/10.1109/icecta48151.2019.8959600.
Full textBarsagade, Kshitij, Sumeet Tabhane, Vishal Satpute, and Vipin Kamble. "Suspicious Activity Detection Using Deep Learning Approach." In 2023 1st International Conference on Innovations in High Speed Communication and Signal Processing (IHCSP). IEEE, 2023. http://dx.doi.org/10.1109/ihcsp56702.2023.10127155.
Full textReports on the topic "Suspicious Activity Detection"
Pennington, Adam G., John D. Strunk, John L. Griffin, Craig A. Soules, Garth R. Goodson, and Gregory R. Ganger. Storage-based Intrusion Detection: Watching storage activity for suspicious behavior. Defense Technical Information Center, 2002. http://dx.doi.org/10.21236/ada461142.
Full textSoramäki, Kimmo, and Florian Loecker. Preserving Data Sovereignty in National Fraud Portals- a Distributed Data Architecture. FNA, 2024. https://doi.org/10.69701/dhmk3850.
Full text