Journal articles on the topic 'Suspicious Behavior Detection'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Suspicious Behavior Detection.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Cheoi, Kyung Joo. "Temporal Saliency-Based Suspicious Behavior Pattern Detection." Applied Sciences 10, no. 3 (2020): 1020. http://dx.doi.org/10.3390/app10031020.
Full textWong, Khai Chiuan, and Mohd Ridzuan bin Ahmad. "Reviewing Approaches and Techniques for Detecting Suspicious Human Behavior: A Comprehensive Survey." ELEKTRIKA- Journal of Electrical Engineering 23, no. 2 (2024): 44–52. http://dx.doi.org/10.11113/elektrika.v23n2.538.
Full textCheng, Junyi, Xianfeng Zhang, Xiao Chen, Miao Ren, Jie Huang, and Peng Luo. "Early Detection of Suspicious Behaviors for Safe Residence from Movement Trajectory Data." ISPRS International Journal of Geo-Information 11, no. 9 (2022): 478. http://dx.doi.org/10.3390/ijgi11090478.
Full textTalekar, P. R. "Suspicious Activity Detection." International Journal of Advance and Applied Research 5, no. 17 (2024): 31–38. https://doi.org/10.5281/zenodo.12164825.
Full textGhosh, Sumon, Prasham Shah, Aditya Ghadge, and Vaibhav Sanghavi. "Suspicious Activity Detection." International Journal for Research in Applied Science and Engineering Technology 10, no. 11 (2022): 113–16. http://dx.doi.org/10.22214/ijraset.2022.47186.
Full textZhu, Shao Ping, and Yu Hua Chen. "A Novel Approach Automatic Detection of Suspicious Behavior." Advanced Materials Research 962-965 (June 2014): 2838–41. http://dx.doi.org/10.4028/www.scientific.net/amr.962-965.2838.
Full textGaware, Rutik. "Suspicious Activity Detection." International Journal for Research in Applied Science and Engineering Technology 11, no. 12 (2023): 1632–35. http://dx.doi.org/10.22214/ijraset.2023.57711.
Full textLeong, Dexter Sing Fong, Hao Feng Chan, Shakir Hussain Naushad Mohamed, et al. "Suspicious Behavior Detection Using Computer Vision." Proceedings of International Conference on Artificial Life and Robotics 30 (February 13, 2025): 729–34. https://doi.org/10.5954/icarob.2025.os26-3.
Full textSaghehei, Ehsan, and Azizollah Memariani. "Suspicious Behavior Detection in Debit Card Transactions using Data Mining." Information Resources Management Journal 28, no. 3 (2015): 1–14. http://dx.doi.org/10.4018/irmj.2015070101.
Full textPoornima, S., and M. Geethanjali. "Shilling Attack Detection in User Based Recommendation System." Data Analytics and Artificial Intelligence 3, no. 2 (2023): 85–94. http://dx.doi.org/10.46632/daai/3/2/17.
Full textOuivirach, Kan, Shashi Gharti, and Matthew N. Dailey. "Incremental behavior modeling and suspicious activity detection." Pattern Recognition 46, no. 3 (2013): 671–80. http://dx.doi.org/10.1016/j.patcog.2012.10.008.
Full textAnsari, Dr Vaqar, Aditya Ghadge, Prasham Shah, Sumon Ghosh, and Vaibhav Sanghavi. "Suspicious Activity Detection Using Different Models." International Journal for Research in Applied Science and Engineering Technology 11, no. 4 (2023): 2668–77. http://dx.doi.org/10.22214/ijraset.2023.50729.
Full textJiang, Meng, Peng Cui, and Christos Faloutsos. "Suspicious Behavior Detection: Current Trends and Future Directions." IEEE Intelligent Systems 31, no. 1 (2016): 31–39. http://dx.doi.org/10.1109/mis.2016.5.
Full textSingh, Sonakshi. "Active Chat Monitoring and Suspicious Chat Detection over Internet." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 05 (2024): 1–5. http://dx.doi.org/10.55041/ijsrem32634.
Full textSharma, Ritesh Manoj. "Active Chat Monitoring and Suspicious Chat Detection Over Internet." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 05 (2024): 1–5. http://dx.doi.org/10.55041/ijsrem32752.
Full textBrewer, Neil, Audrey Bay Wei Ying, Robyn L. Young, and Yong-Hwee Nah. "Theory of mind and the detection of suspicious behavior." Journal of Applied Research in Memory and Cognition 7, no. 1 (2018): 123–31. http://dx.doi.org/10.1037/h0101817.
Full textMartinez, Duber, Humberto Loaiza, and Eduardo Caicedo. "Algorithm For Early Threat Detection By Suspicious Behavior Representation." IEEE Latin America Transactions 18, no. 05 (2020): 825–32. http://dx.doi.org/10.1109/tla.2020.9082909.
Full textBrewer, Neil, Audrey Bay Wei Ying, Robyn L. Young, and Yong-Hwee Nah. "Theory of Mind and the Detection of Suspicious Behavior." Journal of Applied Research in Memory and Cognition 7, no. 1 (2018): 123–31. http://dx.doi.org/10.1016/j.jarmac.2017.09.006.
Full textShrushti, Thigale, Musale Jitendra, Shinde Swapnil, Deshmane Swamini, and Kale Harshad. "Deep Learning model for Anomaly Detection in Video Surveillance: A CNN Approach." Research and Applications: Embedded System 7, no. 2 (2024): 32–44. https://doi.org/10.5281/zenodo.11483938.
Full textDr., Mahesh Navle Aryan Jadhav Mahesh Shrikrishna Kadam Shalmali Dipak Karandikar Siddhi Anil Kate. "Suspicious Activity Detection in Exam Hall using Deep Learning." International Journal of Research in Engineering & Science 9, no. 2 (2025): 71–80. https://doi.org/10.5281/zenodo.15573101.
Full textJadhav, Chaya, Rashmi Ramteke, and Rachna K. Somkunwar. "Smart Crowd Monitoring and Suspicious Behavior Detection Using Deep Learning." Revue d'Intelligence Artificielle 37, no. 4 (2023): 955–62. http://dx.doi.org/10.18280/ria.370416.
Full textPatil, Chetan, Saurbh Moynak, Yash Wagh, Bhavana Pathare, and Tanuja Mulla. "CogniWatch: Advanced Scene Analysis for Threat Detection and Public Safety." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 07, no. 10 (2023): 1–11. http://dx.doi.org/10.55041/ijsrem26323.
Full textKim, Sujeong, Chanwoong Hwang, and Taejin Lee. "Anomaly Based Unknown Intrusion Detection in Endpoint Environments." Electronics 9, no. 6 (2020): 1022. http://dx.doi.org/10.3390/electronics9061022.
Full textUpadhya, Vibha, Pokale Akanksha Satish, Mulla Mushra Anjum Sameer, Vaishnavi Nalawade, and Dr Anupama Shankarrao Budhewar,. "Intrusion Detection in IOT." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 01 (2025): 1–9. https://doi.org/10.55041/ijsrem40396.
Full textRenushe, Prof Mrs A. H., Miss Varsha Poojary, Miss Salonee Shirsat, Miss Sakshi Sonawale, and Miss Pratiksha Yadav. "Suspicious Activity Tracking." International Journal for Research in Applied Science and Engineering Technology 12, no. 2 (2024): 1105–7. http://dx.doi.org/10.22214/ijraset.2024.58499.
Full textKuzenbayev, B. A., B. T. Zhussupova, A. Zh Sarina, D. Zh Alippayeva, G. A. Babulova, and A. K. Karagozhina. "Principles of suspicious activity detection and programs for analyzing suspicious activity using video surveillance cameras." Bulletin of the National Engineering Academy of the Republic of Kazakhstan 93, no. 3 (2024): 121–31. http://dx.doi.org/10.47533/2024.1606-146x.55.
Full textYadav, Pratik. "Predict, Identify and Alert on Suspicious Activity by Multiple Zone." International Journal for Research in Applied Science and Engineering Technology 11, no. 5 (2023): 4705–8. http://dx.doi.org/10.22214/ijraset.2023.52523.
Full textYan, Guanghua, Qiang Li, Dong Guo, and Xiangyu Meng. "Discovering Suspicious APT Behaviors by Analyzing DNS Activities." Sensors 20, no. 3 (2020): 731. http://dx.doi.org/10.3390/s20030731.
Full textNavale, Dr. Mahesh, Aryan Arjun Jadhav, Mahesh Shrikrishna Kadam, Shalmali Dipak Karandikar, and Siddhi Anil Kate. "From Manual to Automated: A Computer Vision-Based Solution for Exam Cheating Detection." International Journal of Ingenious Research, Invention and Development (IJIRID) 3, no. 5 (2024): 414–19. https://doi.org/10.5281/zenodo.14066366.
Full textYasmeen, Bushra, Haslina Arshad, and Hameedur Rahman. "SUSPICIOUS ACTIVITY DETECTION USING CCTV SURVEILLANCE VIDEO." Journal of Information System and Technology Management 6, no. 22 (2021): 60–70. http://dx.doi.org/10.35631/jistm.622006.
Full textCai, Hao, Zhiguang Song, Jianlong Xu, Zhi Xiong, and Yuanquan Xie. "CUDM: A Combined UAV Detection Model Based on Video Abnormal Behavior." Sensors 22, no. 23 (2022): 9469. http://dx.doi.org/10.3390/s22239469.
Full textDigambar, Kauthkar, Pingle Snehal, Bansode Vijay, Idalkanthe Pooja, and Vani Sunita. "Suspicious Human Activity and Fight Detection using Deep Learning." International Journal of Innovative Science and Research Technology 7, no. 6 (2022): 390–92. https://doi.org/10.5281/zenodo.6791644.
Full textPawar, Prof Dipali, Omkar Dhanwat, Sushant Shrivastav, Devendra Sutar, and Sourabh Yadav. "Suspicious Activity Detection from Video Surveillance Using CNN Algorithm." International Journal for Research in Applied Science and Engineering Technology 11, no. 5 (2023): 412–16. http://dx.doi.org/10.22214/ijraset.2023.51375.
Full textAyed, M. B., S. Elkosantini, and M. Abid. "An Automated Surveillance System Based on Multi-Processor and GPU Architecture." Engineering, Technology & Applied Science Research 7, no. 6 (2017): 2319–23. https://doi.org/10.5281/zenodo.1119002.
Full textG S, Chaya. "Unusual Crowd Activity Detection Using Open CV and Motion Influence Map." International Journal for Research in Applied Science and Engineering Technology 9, no. VII (2021): 1232–36. http://dx.doi.org/10.22214/ijraset.2021.36550.
Full textDekkati, Sreekanth, Sai Srujan Gutlapalli, Upendar Rao Thaduri, and Venkata Koteswara Rao Ballamudi. "AI and Machine Learning for Remote Suspicious Action Detection and Recognition." ABC Journal of Advanced Research 11, no. 2 (2022): 97–102. http://dx.doi.org/10.18034/abcjar.v11i2.694.
Full textNazir, Amril, Rohan Mitra, Hana Sulieman, and Firuz Kamalov. "Suspicious Behavior Detection with Temporal Feature Extraction and Time-Series Classification for Shoplifting Crime Prevention." Sensors 23, no. 13 (2023): 5811. http://dx.doi.org/10.3390/s23135811.
Full textElhamod, Mohannad, and Martin D. Levine. "Automated Real-Time Detection of Potentially Suspicious Behavior in Public Transport Areas." IEEE Transactions on Intelligent Transportation Systems 14, no. 2 (2013): 688–99. http://dx.doi.org/10.1109/tits.2012.2228640.
Full textMrs, K. Shireesha, Mounika Ramavath, Divya Gopularam, and Sreeja Gundeboina. "OBJECT ACTION DETECTION USING DEEP LEARNING." International Journal of Engineering Technology Research & Management (IJETRM) 09, no. 04 (2025): 364–68. https://doi.org/10.5281/zenodo.15275560.
Full textShubham, R. Dhembare, and Sharad W. Mohod Dr. "Intrusion Detection System in Vehicular Ad-hoc Networks." International Journal of Innovative Science and Research Technology 7, no. 11 (2022): 1065–69. https://doi.org/10.5281/zenodo.7435133.
Full textChen, Tong, Jiqiang Liu, Yalun Wu, et al. "Survey on Astroturfing Detection and Analysis from an Information Technology Perspective." Security and Communication Networks 2021 (December 1, 2021): 1–16. http://dx.doi.org/10.1155/2021/3294610.
Full textAdams, Peter, and Nancy M. Smith. "Understanding behavior detection technology: How it finds suspicious behaviors and meets requirements of new compliance environment." Journal of Investment Compliance 5, no. 1 (2004): 33–38. http://dx.doi.org/10.1108/15285810410636055.
Full textNICHEPORUK, A., A. NICHEPORUK, I. NEGA, Y. NICHEPORUK, and A. KAZANTSEV. "INFORMATION TECHNOLOGY FOR DETECTING METAMORPHIC VIRUSES BASED ON THE ANALYSIS OF THE BEHAVIOR OF APPLICATIONS IN THE CORPORATE NETWORK." Computer Systems and Information Technologies 1, no. 1 (2020): 60–67. http://dx.doi.org/10.31891/csit-2020-1-8.
Full textSomarriba, Oscar, Urko Zurutuza, Roberto Uribeetxeberria, Laurent Delosières, and Simin Nadjm-Tehrani. "Detection and Visualization of Android Malware Behavior." Journal of Electrical and Computer Engineering 2016 (2016): 1–17. http://dx.doi.org/10.1155/2016/8034967.
Full textA Rao, Anagha, and Kanchana V. "Dynamic Approach for Detection of Suspicious Transactions in Money Laundering." International Journal of Engineering & Technology 7, no. 3.10 (2018): 10. http://dx.doi.org/10.14419/ijet.v7i3.10.15619.
Full textPatil, Shankargoud, and Kappargaon S. Prabhushetty. "Detection of Abnormal Activity to Alert the Nearby Persons via M-DNN Based Surveillance System." WSEAS TRANSACTIONS ON SYSTEMS AND CONTROL 16 (December 20, 2021): 668–85. http://dx.doi.org/10.37394/23203.2021.16.61.
Full textVeena, Ch, I. Shweshitha, N. Nitheesha, and Harsha Priya Raulo. "The Data Mining Based Model for Detection of Fraudulent Behavior in Water Consumption." International Journal for Research in Applied Science and Engineering Technology 10, no. 9 (2022): 994–96. http://dx.doi.org/10.22214/ijraset.2022.46783.
Full textdo Nascimento, Vinicius D., Tiago A. O. Alves, Claudio M. de Farias, and Diego Leonel Cadette Dutra. "A Hybrid Framework for Maritime Surveillance: Detecting Illegal Activities through Vessel Behaviors and Expert Rules Fusion." Sensors 24, no. 17 (2024): 5623. http://dx.doi.org/10.3390/s24175623.
Full textAyed, M. B., S. Elkosantini, and M. Abid. "An Automated Surveillance System Based on Multi-Processor and GPU Architecture." Engineering, Technology & Applied Science Research 7, no. 6 (2017): 2319–23. http://dx.doi.org/10.48084/etasr.1645.
Full textLIN, GUO-SHIANG, SIN-KUO CHAI, WEI-CHENG YEH, and YI-CHANG LIN. "SUSPICIOUS REGION DETECTION AND IDENTIFICATION BASED ON INTRA-/INTER-FRAME ANALYSES AND FUZZY CLASSIFIER FOR BREAST MAGNETIC RESONANCE IMAGING." International Journal of Pattern Recognition and Artificial Intelligence 28, no. 03 (2014): 1450007. http://dx.doi.org/10.1142/s0218001414500074.
Full text