Academic literature on the topic 'Suspicious behaviors'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Suspicious behaviors.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Suspicious behaviors"

1

Cheng, Junyi, Xianfeng Zhang, Xiao Chen, Miao Ren, Jie Huang, and Peng Luo. "Early Detection of Suspicious Behaviors for Safe Residence from Movement Trajectory Data." ISPRS International Journal of Geo-Information 11, no. 9 (2022): 478. http://dx.doi.org/10.3390/ijgi11090478.

Full text
Abstract:
Early detection of people’s suspicious behaviors can aid in the prevention of crimes and make the community safer. Existing methods that are focused on identifying abnormal behaviors from video surveillance that are based on computer vision, which are more suitable for detecting ongoing behaviors. While criminals intend to avoid abnormal behaviors under surveillance, their suspicious behaviors prior to crimes will be unconsciously reflected in the trajectories. Herein, we characterize several suspicious behaviors from unusual movement patterns, unusual behaviors, and unusual gatherings of peop
APA, Harvard, Vancouver, ISO, and other styles
2

Park, Yeonji, Yoojin Jeong, and Chaebong Sohn. "Suspicious behavior recognition using deep learning." Journal of Advances in Military Studies 4, no. 1 (2021): 43–59. http://dx.doi.org/10.37944/jams.v4i1.78.

Full text
Abstract:
The purpose of this study is to reinforce the defense and security system by recognizing the behaviors of suspicious person both inside and outside the military using deep learning. Surveillance cameras help detect criminals and people who are acting unusual. However, it is inefficient in that the administrator must monitor all the images transmitted from the camera. It incurs a large cost and is vulnerable to human error. Therefore, in this study, we propose a method to find a person who should be watched carefully only with surveillance camera images. For this purpose, the video data of doub
APA, Harvard, Vancouver, ISO, and other styles
3

Wong, Khai Chiuan, and Mohd Ridzuan bin Ahmad. "Reviewing Approaches and Techniques for Detecting Suspicious Human Behavior: A Comprehensive Survey." ELEKTRIKA- Journal of Electrical Engineering 23, no. 2 (2024): 44–52. http://dx.doi.org/10.11113/elektrika.v23n2.538.

Full text
Abstract:
The paper aims to review related works that focus on detecting suspicious human behavior using machine-learning techniques. Suspicious human behavior refers to behaviors that may indicate involvement in or preparation for a crime. Detecting such behaviors before a crime is committed allows law enforcement to take early action and prevent criminal activities. One of the challenges in developing an effective detection system for suspicious human behavior is the absence of a well-defined definition for such behaviors. Different definitions can lead to various methods for designing the detection s
APA, Harvard, Vancouver, ISO, and other styles
4

Cheoi, Kyung Joo. "Temporal Saliency-Based Suspicious Behavior Pattern Detection." Applied Sciences 10, no. 3 (2020): 1020. http://dx.doi.org/10.3390/app10031020.

Full text
Abstract:
The topic of suspicious behavior detection has been one of the most emergent research themes in computer vision, video analysis, and monitoring. Due to the huge number of CCTV (closed-circuit television) systems, it is not easy for people to manually identify CCTV for suspicious motion monitoring. This paper is concerned with an automatic suspicious behavior detection method using a CCTV video stream. Observers generally focus their attention on behaviors that vary in terms of magnitude or gradient of motion and behave differently in rules of motion with other objects. Based on these facts, th
APA, Harvard, Vancouver, ISO, and other styles
5

Wong, Keri Ka-Yee, and Adrian Raine. "Peer Problems and Low Self-esteem Mediate the Suspicious and Non-suspicious Schizotypy–Reactive Aggression Relationship in Children and Adolescents." Journal of Youth and Adolescence 48, no. 11 (2019): 2241–54. http://dx.doi.org/10.1007/s10964-019-01125-9.

Full text
Abstract:
Abstract The relationship between schizophrenia and violence has been well-established. Yet very little prior research exists on the factors that might explain the nature of this relationship and even fewer studies seek to clarify the etiology of aggressive behavior in adolescents with specific features of schizotypal personality that might help improve the specificity of intervention. The current study tested whether one dimension of schizotypy alone (i.e., the ‘suspicious’ feature) or the other 8 dimensions (i.e., the ‘non-suspicious’ features) were particularly associated with aggressive be
APA, Harvard, Vancouver, ISO, and other styles
6

Yan, Guanghua, Qiang Li, Dong Guo, and Xiangyu Meng. "Discovering Suspicious APT Behaviors by Analyzing DNS Activities." Sensors 20, no. 3 (2020): 731. http://dx.doi.org/10.3390/s20030731.

Full text
Abstract:
As sensors become more prevalent in our lives, security issues have become a major concern. In the Advanced Persistent Threat (APT) attack, the sensor has also become an important role as a transmission medium. As a relatively weak link in the network transmission process, sensor networks often become the target of attackers. Due to the characteristics of low traffic, long attack time, diverse attack methods, and real-time evolution, existing detection methods have not been able to detect them comprehensively. Current research suggests that a suspicious domain name can be obtained by analyzing
APA, Harvard, Vancouver, ISO, and other styles
7

Schoenmakers, Birgitte, and Johan Wens. "Efficiency, Usability, and Outcomes of Proctored Next-Level Exams for Proficiency Testing in Primary Care Education: Observational Study." JMIR Formative Research 5, no. 8 (2021): e23834. http://dx.doi.org/10.2196/23834.

Full text
Abstract:
Background The COVID-19 pandemic has affected education and assessment programs and has resulted in complex planning. Therefore, we organized the proficiency test for admission to the Family Medicine program as a proctored exam. To prevent fraud, we developed a web-based supervisor app for tracking and tracing candidates’ behaviors. Objective We aimed to assess the efficiency and usability of the proctored exam procedure and to analyze the procedure’s impact on exam scores. Methods The application operated on the following three levels to register events: the recording of actions, analyses of
APA, Harvard, Vancouver, ISO, and other styles
8

Zeigler-Hill, Virgil, and Jennifer Vonk. "Borderline Personality Features and Mate Retention Behaviors: The Mediating Roles of Suspicious and Reactive Jealousy." Sexes 4, no. 4 (2023): 507–21. http://dx.doi.org/10.3390/sexes4040033.

Full text
Abstract:
We investigated the roles that suspicious jealousy and reactive jealousy might play in the associations between borderline personality features (BPF) and mate retention behaviors. Study 1 (N = 406) found that BPF had positive indirect associations with benefit-provisioning behaviors and cost-inflicting behaviors through suspicious jealousy but not through reactive jealousy. Study 2 (N = 334 (a dyadic sample of 167 romantic couples)) revealed actor effects such that BPF had positive indirect associations with benefit-provisioning behaviors and cost-inflicting behaviors through suspicious jealou
APA, Harvard, Vancouver, ISO, and other styles
9

Saghehei, Ehsan, and Azizollah Memariani. "Suspicious Behavior Detection in Debit Card Transactions using Data Mining." Information Resources Management Journal 28, no. 3 (2015): 1–14. http://dx.doi.org/10.4018/irmj.2015070101.

Full text
Abstract:
The approach used in this paper is an implementation of a data mining process against real-life transactions of debit cards with the aim of detecting suspicious behavior. The framework designed for this purpose has been obtained through merging supervised and unsupervised models. First, due to unlabeled data, Twostep and Self-Organizing Map algorithms have been used in clustering the transactions. A C5.0 classification algorithm has been applied to evaluate supervised models and also to detect suspicious behaviors. An innovative plan has been designed to evaluate hybrid models and select the m
APA, Harvard, Vancouver, ISO, and other styles
10

Gong, Kai, Zhong Xu, Zhefeng Cai, Yuxiu Chen, and Zhanxiang Wang. "Internet Hospitals Help Prevent and Control the Epidemic of COVID-19 in China: Multicenter User Profiling Study." Journal of Medical Internet Research 22, no. 4 (2020): e18908. http://dx.doi.org/10.2196/18908.

Full text
Abstract:
Background During the spread of the novel coronavirus disease (COVID-19), internet hospitals in China were engaged with epidemic prevention and control, offering epidemic-related online services and medical support to the public. Objective The aim of this study is to explore the role of internet hospitals during the prevention and control of the COVID-19 outbreak in China. Methods Online epidemic-related consultations from multicenter internet hospitals in China during the COVID-19 epidemic were collected. The counselees were described and classified into seven type groups. Symptoms were recor
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Suspicious behaviors"

1

Reed, Ahren Alexander. "Detecting Suspicious Behavior With Low-cost Sensors." DigitalCommons@CalPoly, 2011. https://digitalcommons.calpoly.edu/theses/655.

Full text
Abstract:
A proof of concept is created that demonstrates how low-cost sensors and a simple software solution can be used to proactively detect IED placement. The main goal is to detect suspicious behavior; Specifically we derive requirements that loitering, meandering, improper location and object placement shall be detected. Current methods being used to detect Improvised Explosive Devices (IEDs) are costly in terms of equipment and risk to life, and many are retroactive; IED detection occurs long after explosives are placed. A prototype system is explored with the quality attributes of being low-co
APA, Harvard, Vancouver, ISO, and other styles
2

Wiliem, Arnold. "Robust suspicious behaviour detection for smart surveillance systems." Thesis, Queensland University of Technology, 2010. https://eprints.qut.edu.au/41567/1/Arnold_Wiliem_Thesis.pdf.

Full text
Abstract:
Video surveillance technology, based on Closed Circuit Television (CCTV) cameras, is one of the fastest growing markets in the field of security technologies. However, the existing video surveillance systems are still not at a stage where they can be used for crime prevention. The systems rely heavily on human observers and are therefore limited by factors such as fatigue and monitoring capabilities over long periods of time. To overcome this limitation, it is necessary to have “intelligent” processes which are able to highlight the salient data and filter out normal conditions that do not pos
APA, Harvard, Vancouver, ISO, and other styles
3

LeDoux, Charles. "Creating Profiles of Suspicious Behavior to Locate Plausible Evidence of Targeted Attacks." Thesis, University of Louisiana at Lafayette, 2017. http://pqdtopen.proquest.com/#viewpdf?dispub=10245924.

Full text
Abstract:
<p> Intrusion Detection Systems (IDS), designed during the early era of the Internet to protect against attacks by individual attackers, have been ill-equipped to protect against attacks executed by organized crime and nation-state actors. The IDSs typically monitor individual sources of data, such as network connections, OS events, or application logs, and use rule-based or anomaly-based methods to detect intrusions. Advanced attackers defeat such IDSs by molding their actions to match normal activities on the network and hosts. </p><p> I propose a new method for detecting intrusions from a
APA, Harvard, Vancouver, ISO, and other styles
4

Ledford, Christopher. "SEEDS OF SUSPICION: THE PERPETUAL CYCLE OF ANTI-MUSLIM STEREOTYPES, MIDDLE EAST INTERVENTION, AND TERRORISM." UKnowledge, 2019. https://uknowledge.uky.edu/polysci_etds/26.

Full text
Abstract:
The central theory guiding my research is that interstate conflict, at least as covered in mass media, leaves residual cultural attitudes that can shape the political context in which elites formulate policy. Specifically, U.S. interventionism in the Middle East has given rise to fundamental hostilities, founded on misguided biases, that shape involvement in the region today. I focus on one step within that broader theory, to test it empirically: the hypothesis that anti-Muslim stereotypes, when activated, will shape an individual’s foreign-policy preferences. I begin by considering competing
APA, Harvard, Vancouver, ISO, and other styles
5

Lin, Yung-Yu, and 林永彧. "A Study of Collaborative Discovering of Suspicious Network Behaviors." Thesis, 2006. http://ndltd.ncl.edu.tw/handle/82199720080097230068.

Full text
Abstract:
碩士<br>國立交通大學<br>資訊科學與工程研究所<br>94<br>As the rapid growth of network attacking tools, patterns of network intrusion events change gradually. Referring to the newest Symantec Internet Security Threat Report, we found that network intrusion behaviors evolve into more hidden and target-specific behaviors. There are many researches had been proposed to analyze network intrusion behaviors in accordance with low-level network data. However, since these researches might suffer a large mount of false alerts, it is very difficult for network administrators to discover useful information from these alerts
APA, Harvard, Vancouver, ISO, and other styles
6

Kim, In Duk. "Suspicious receivers' interactions goals and strategic behaviors within dating relationships." Thesis, 2004. http://hdl.handle.net/10125/11962.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

蔡薰儀. "Suspicious Behavior-based Malware Detection Using Artificial Neural Network." Thesis, 2012. http://ndltd.ncl.edu.tw/handle/80779298373258676583.

Full text
Abstract:
碩士<br>國立交通大學<br>網路工程研究所<br>100<br>In the recent years, malware has been widely spread and has caused severe threats against cyber security. Although malware may be made some changes to evade the traditional signature-based detection, the malware and its variations still have some similar behaviors, which most of the malware also intent to do. In order to detect unknown malware and variations of known ones, we propose a behavioral artificial neural network-based malware detection (ANN-MD) system. By observing runtime behaviors of some known malware samples using three sandboxes, we listed 13 su
APA, Harvard, Vancouver, ISO, and other styles
8

Johnson, Courtney Beth. "The roles of commitment and attributions on uninvolved partner responses to imagined sexual infidelity." Thesis, 2014. http://hdl.handle.net/1805/4858.

Full text
Abstract:
Indiana University-Purdue University Indianapolis (IUPUI)<br>This study examined the roles of commitment and attributions in uninvolved partner responses to imagined sexual infidelity. Undergraduate students (N = 298) in dating relationships participated in a hypothetical sexual infidelity scenario in which they imagined their romantic partner engaged in sexual intercourse with someone else. Measured-variable path analysis was used to evaluate the predictive ability of commitment and attributions on negative emotional responses and predicted relationship continuation. The hypothesized conceptu
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Suspicious behaviors"

1

John, Farrell. Freud's paranoid quest: Psychoanalysis and modern suspicion. New York University Press, 1996.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Witt, L. A., and Cari Z. Suspicious Behavior. Riptide Publishing, 2017.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Suspicious Behavior. GallagherWitt, 2018.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Osamoh, Simon. Church Safety: Responding to Suspicious Behavior. Independently Published, 2020.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Freeman, Daniel. Overcoming Paranoid and Suspicious Thoughts: A Self-Help Guide Using Cognitive Behavioral Techniques. Basic Books, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Freeman, Daniel. Overcoming Paranoid and Suspicious Thoughts: A Self-Help Guide Using Cognitive Behavioral Techniques. Little, Brown Book Group Limited, 2016.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Overcoming Paranoid and Suspicious Thoughts: A Self-Help Guide Using Cognitive Behavioral Techniques. ReadHowYouWant.com, Limited, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Myers, Cindi, Amanda Stevens, and Elle James. Harlequin Intrigue May 2018 - Box Set 1 Of 2: Show of Force Snowbound Suspicion Criminal Behavior. Harlequin Enterprises, Limited, 2019.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Otteson, James R. Honorable Business. Oxford University Press, 2019. http://dx.doi.org/10.1093/oso/9780190914202.001.0001.

Full text
Abstract:
Many people are suspicious of business, as well as of markets and commercial society. Are they right to be suspicious? Examples like Enron and Bernie Madoff do not help the impression many have of it as prone to dubious behavior and potentially disastrous negative consequences. But there are bad actors in all walks of life, not just in business. Is there something special about business that encourages, or even rewards, bad behavior? Can there be such a thing as honorable business? While there certainly is dishonorable business, there is indeed also such a thing as honorable business. Honorabl
APA, Harvard, Vancouver, ISO, and other styles
10

Bowman, Matthew. Liberty and Order. Oxford University Press, 2017. http://dx.doi.org/10.1093/oso/9780190280192.003.0005.

Full text
Abstract:
This essay explores Mormonism’s paradoxical relationship with American free market capitalism. Examining a series of case studies from Mormonism’s past, as well as several important Mormon economic thinkers, I argue that there is no single “Mormon” position on economics. Rather, there are a variety of positions, from libertarian individualism to market-suspicious communitarianism, that various Mormons at various times have marshaled theological and historical resources to support. This complex constellation of ideas not only debunks the myth of Mormonism as a monolith but also sheds light on a
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Suspicious behaviors"

1

Todd, Lisa M. "Suspicious and Provocative Behaviour." In Sexual Treason in Germany during the First World War. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-51514-4_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Ronczkowski, Michael R. "Behavioral Traits and Suspicious Activity." In Terrorism and Organized Hate Crime. CRC Press, 2017. http://dx.doi.org/10.4324/9781315203133-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Deshpande, Dhanashree, Shrinivas Deshpande, and Vilas Thakare. "Analysis of Online Suspicious Behavior Patterns." In Advances in Intelligent Systems and Computing. Springer Singapore, 2018. http://dx.doi.org/10.1007/978-981-10-7386-1_42.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Biuk-Aghai, Robert P., Yain-Whar Si, Simon Fong, and Peng-Fan Yan. "Individual Movement Behaviour in Secure Physical Environments: Modeling and Detection of Suspicious Activity." In Behavior Computing. Springer London, 2012. http://dx.doi.org/10.1007/978-1-4471-2969-1_15.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Furtado, Ashlin, Rehan Sayed, Arvin Nooli, Sriram Radhakrishna, Rishabh Oruganti, and N. Venugopal. "Real-Time ATM Booth Suspicious Behavior Monitoring System." In Lecture Notes in Networks and Systems. Springer Nature Singapore, 2024. http://dx.doi.org/10.1007/978-981-97-1323-3_12.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Ali, Mohammed Mahmood, Sara Noorain, Mohammad S. Qaseem, and Ateeq ur Rahman. "Suspicious Human Behaviour Detection Focusing on Campus Sites." In Lecture Notes in Networks and Systems. Springer Nature Singapore, 2022. http://dx.doi.org/10.1007/978-981-19-2940-3_12.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Ryan, Brendan, and Aswin Vijayan. "Classifying Normal and Suspicious Behaviours When Accessing Public Locations." In Advances in Intelligent Systems and Computing. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-96074-6_11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Salman, Muhammad, I. Wayan Budi Santana, Muhammad Ikram, and Mohamed Ali Kaafar. "Auditing and Attributing Behaviours of Suspicious Android Health Applications." In Lecture Notes in Computer Science. Springer Nature Singapore, 2025. https://doi.org/10.1007/978-981-96-3531-3_12.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Roy, Anusree, and Mousumi Gupta. "Tracking Suspicious User Behavior Through Hybrid Feature Selection Technique." In Learning and Analytics in Intelligent Systems. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-42363-6_24.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Choi, Ji-Hyen, Jong-Won Choe, and Yong-Ik Yoon. "Prediction Method for Suspicious Behavior Based on Omni-View Model." In Advances in Computer Science and Ubiquitous Computing. Springer Singapore, 2016. http://dx.doi.org/10.1007/978-981-10-3023-9_93.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Suspicious behaviors"

1

Heredia, Juanpablo, Fabrício Venturim, Dany Diaz, Felipe Moreno-Vera, and Jorge Poco. "Tracking Overfishing: Visual Analytics of Suspicious Behaviors in Commercial Fishing Vessels." In 2024 IEEE Visual Analytics Science and Technology VAST Challenge. IEEE, 2024. http://dx.doi.org/10.1109/vastchallenge64683.2024.00010.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Shrestha, Sujan, Yoji Taniguchi, and Tetsuo Tanaka. "Detection of Pre Shoplifting Suspicious Behavior Using Deep Learning." In 2024 16th IIAI International Congress on Advanced Applied Informatics (IIAI-AAI). IEEE, 2024. http://dx.doi.org/10.1109/iiai-aai63651.2024.00088.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Nooli, Arvin, Ashlin Furtado, Rehan Sayed, and Venugopal N. "Data-Set for Normal and Suspicious Behavior in ATM Booths." In 2024 IEEE 3rd International Conference on Data, Decision and Systems (ICDDS). IEEE, 2024. https://doi.org/10.1109/icdds62937.2024.10910657.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Radhika, R., and A. Muthukumaravel. "Behavioral Analysis in Video Streams: Towards Automated Suspicious Activity Detection." In 2024 Asian Conference on Intelligent Technologies (ACOIT). IEEE, 2024. https://doi.org/10.1109/acoit62457.2024.10940053.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Bidlingmaier, Antonella, Julian Jandeleit, Fred Kunze, et al. "Fishing Vizzard: An Interactive Visual Analytics Tool to Identify Suspicious Fishing Behavior." In 2024 IEEE Visual Analytics Science and Technology VAST Challenge. IEEE, 2024. http://dx.doi.org/10.1109/vastchallenge64683.2024.00017.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Awasthi, Abhishek, Mohammad Bdair, A. Nandha Kumar, Sanjog Thapa, Nalini Devi S, and Bharathi Ramesh Kumar. "NLP for Sentiment Analysis in Social Media Posts to Detect Suspicious Behaviour." In 2024 International Conference on Intelligent Algorithms for Computational Intelligence Systems (IACIS). IEEE, 2024. http://dx.doi.org/10.1109/iacis61494.2024.10721839.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Shajari, Shadi, Mustafa Alassad, and Nitin Agarwal. "Characterizing Suspicious Commenter Behaviors." In ASONAM '23: International Conference on Advances in Social Networks Analysis and Mining. ACM, 2023. http://dx.doi.org/10.1145/3625007.3627309.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Qiang, Wang, Pang Jianmin, Fu Wen, and Yue Feng. "Graphical Annotation of Suspicious Behaviors." In 2009 International Forum on Information Technology and Applications (IFITA). IEEE, 2009. http://dx.doi.org/10.1109/ifita.2009.191.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Fredrikson, Matt, Somesh Jha, Mihai Christodorescu, Reiner Sailer, and Xifeng Yan. "Synthesizing Near-Optimal Malware Specifications from Suspicious Behaviors." In 2010 IEEE Symposium on Security and Privacy. IEEE, 2010. http://dx.doi.org/10.1109/sp.2010.11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Chengzhang, Ji, and Dae-Ki Kang. "Detecting spamming stores by analyzing their suspicious behaviors." In 2015 17th International Conference on Advanced Communication Technology (ICACT). IEEE, 2015. http://dx.doi.org/10.1109/icact.2015.7224845.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Suspicious behaviors"

1

Pennington, Adam G., John D. Strunk, John L. Griffin, Craig A. Soules, Garth R. Goodson, and Gregory R. Ganger. Storage-based Intrusion Detection: Watching storage activity for suspicious behavior. Defense Technical Information Center, 2002. http://dx.doi.org/10.21236/ada461142.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Keefer, Philip, Benjamin Roseth, and Julieth Santamaria. General Skills Training for Public Employees Experimental: Evidence on Cybersecurity Training in Argentina. Inter-American Development Bank, 2024. http://dx.doi.org/10.18235/0013202.

Full text
Abstract:
Cyberattacks have risen to become one of the most critical global risks. Despite increasing investments to combat cyberattacks, there remains a significant, often unnoticed vulnerability: employees. Previous literature reveals that over two-thirds of cyberattacks within organizations result from employee negligence. While strengthening cybersecurity through employee training is essential, traditional methods often fall short. In this study, we tested different approaches to reduce risk exposure to phishing, one of the most common types of cyberattacks, focusing on a sector and context unaddres
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!