Academic literature on the topic 'Suspicious behaviors'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Suspicious behaviors.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Suspicious behaviors"
Cheng, Junyi, Xianfeng Zhang, Xiao Chen, Miao Ren, Jie Huang, and Peng Luo. "Early Detection of Suspicious Behaviors for Safe Residence from Movement Trajectory Data." ISPRS International Journal of Geo-Information 11, no. 9 (2022): 478. http://dx.doi.org/10.3390/ijgi11090478.
Full textPark, Yeonji, Yoojin Jeong, and Chaebong Sohn. "Suspicious behavior recognition using deep learning." Journal of Advances in Military Studies 4, no. 1 (2021): 43–59. http://dx.doi.org/10.37944/jams.v4i1.78.
Full textWong, Khai Chiuan, and Mohd Ridzuan bin Ahmad. "Reviewing Approaches and Techniques for Detecting Suspicious Human Behavior: A Comprehensive Survey." ELEKTRIKA- Journal of Electrical Engineering 23, no. 2 (2024): 44–52. http://dx.doi.org/10.11113/elektrika.v23n2.538.
Full textCheoi, Kyung Joo. "Temporal Saliency-Based Suspicious Behavior Pattern Detection." Applied Sciences 10, no. 3 (2020): 1020. http://dx.doi.org/10.3390/app10031020.
Full textWong, Keri Ka-Yee, and Adrian Raine. "Peer Problems and Low Self-esteem Mediate the Suspicious and Non-suspicious Schizotypy–Reactive Aggression Relationship in Children and Adolescents." Journal of Youth and Adolescence 48, no. 11 (2019): 2241–54. http://dx.doi.org/10.1007/s10964-019-01125-9.
Full textYan, Guanghua, Qiang Li, Dong Guo, and Xiangyu Meng. "Discovering Suspicious APT Behaviors by Analyzing DNS Activities." Sensors 20, no. 3 (2020): 731. http://dx.doi.org/10.3390/s20030731.
Full textSchoenmakers, Birgitte, and Johan Wens. "Efficiency, Usability, and Outcomes of Proctored Next-Level Exams for Proficiency Testing in Primary Care Education: Observational Study." JMIR Formative Research 5, no. 8 (2021): e23834. http://dx.doi.org/10.2196/23834.
Full textZeigler-Hill, Virgil, and Jennifer Vonk. "Borderline Personality Features and Mate Retention Behaviors: The Mediating Roles of Suspicious and Reactive Jealousy." Sexes 4, no. 4 (2023): 507–21. http://dx.doi.org/10.3390/sexes4040033.
Full textSaghehei, Ehsan, and Azizollah Memariani. "Suspicious Behavior Detection in Debit Card Transactions using Data Mining." Information Resources Management Journal 28, no. 3 (2015): 1–14. http://dx.doi.org/10.4018/irmj.2015070101.
Full textGong, Kai, Zhong Xu, Zhefeng Cai, Yuxiu Chen, and Zhanxiang Wang. "Internet Hospitals Help Prevent and Control the Epidemic of COVID-19 in China: Multicenter User Profiling Study." Journal of Medical Internet Research 22, no. 4 (2020): e18908. http://dx.doi.org/10.2196/18908.
Full textDissertations / Theses on the topic "Suspicious behaviors"
Reed, Ahren Alexander. "Detecting Suspicious Behavior With Low-cost Sensors." DigitalCommons@CalPoly, 2011. https://digitalcommons.calpoly.edu/theses/655.
Full textWiliem, Arnold. "Robust suspicious behaviour detection for smart surveillance systems." Thesis, Queensland University of Technology, 2010. https://eprints.qut.edu.au/41567/1/Arnold_Wiliem_Thesis.pdf.
Full textLeDoux, Charles. "Creating Profiles of Suspicious Behavior to Locate Plausible Evidence of Targeted Attacks." Thesis, University of Louisiana at Lafayette, 2017. http://pqdtopen.proquest.com/#viewpdf?dispub=10245924.
Full textLedford, Christopher. "SEEDS OF SUSPICION: THE PERPETUAL CYCLE OF ANTI-MUSLIM STEREOTYPES, MIDDLE EAST INTERVENTION, AND TERRORISM." UKnowledge, 2019. https://uknowledge.uky.edu/polysci_etds/26.
Full textLin, Yung-Yu, and 林永彧. "A Study of Collaborative Discovering of Suspicious Network Behaviors." Thesis, 2006. http://ndltd.ncl.edu.tw/handle/82199720080097230068.
Full textKim, In Duk. "Suspicious receivers' interactions goals and strategic behaviors within dating relationships." Thesis, 2004. http://hdl.handle.net/10125/11962.
Full text蔡薰儀. "Suspicious Behavior-based Malware Detection Using Artificial Neural Network." Thesis, 2012. http://ndltd.ncl.edu.tw/handle/80779298373258676583.
Full textJohnson, Courtney Beth. "The roles of commitment and attributions on uninvolved partner responses to imagined sexual infidelity." Thesis, 2014. http://hdl.handle.net/1805/4858.
Full textBooks on the topic "Suspicious behaviors"
John, Farrell. Freud's paranoid quest: Psychoanalysis and modern suspicion. New York University Press, 1996.
Find full textOsamoh, Simon. Church Safety: Responding to Suspicious Behavior. Independently Published, 2020.
Find full textFreeman, Daniel. Overcoming Paranoid and Suspicious Thoughts: A Self-Help Guide Using Cognitive Behavioral Techniques. Basic Books, 2008.
Find full textFreeman, Daniel. Overcoming Paranoid and Suspicious Thoughts: A Self-Help Guide Using Cognitive Behavioral Techniques. Little, Brown Book Group Limited, 2016.
Find full textOvercoming Paranoid and Suspicious Thoughts: A Self-Help Guide Using Cognitive Behavioral Techniques. ReadHowYouWant.com, Limited, 2013.
Find full textMyers, Cindi, Amanda Stevens, and Elle James. Harlequin Intrigue May 2018 - Box Set 1 Of 2: Show of Force Snowbound Suspicion Criminal Behavior. Harlequin Enterprises, Limited, 2019.
Find full textOtteson, James R. Honorable Business. Oxford University Press, 2019. http://dx.doi.org/10.1093/oso/9780190914202.001.0001.
Full textBowman, Matthew. Liberty and Order. Oxford University Press, 2017. http://dx.doi.org/10.1093/oso/9780190280192.003.0005.
Full textBook chapters on the topic "Suspicious behaviors"
Todd, Lisa M. "Suspicious and Provocative Behaviour." In Sexual Treason in Germany during the First World War. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-51514-4_4.
Full textRonczkowski, Michael R. "Behavioral Traits and Suspicious Activity." In Terrorism and Organized Hate Crime. CRC Press, 2017. http://dx.doi.org/10.4324/9781315203133-4.
Full textDeshpande, Dhanashree, Shrinivas Deshpande, and Vilas Thakare. "Analysis of Online Suspicious Behavior Patterns." In Advances in Intelligent Systems and Computing. Springer Singapore, 2018. http://dx.doi.org/10.1007/978-981-10-7386-1_42.
Full textBiuk-Aghai, Robert P., Yain-Whar Si, Simon Fong, and Peng-Fan Yan. "Individual Movement Behaviour in Secure Physical Environments: Modeling and Detection of Suspicious Activity." In Behavior Computing. Springer London, 2012. http://dx.doi.org/10.1007/978-1-4471-2969-1_15.
Full textFurtado, Ashlin, Rehan Sayed, Arvin Nooli, Sriram Radhakrishna, Rishabh Oruganti, and N. Venugopal. "Real-Time ATM Booth Suspicious Behavior Monitoring System." In Lecture Notes in Networks and Systems. Springer Nature Singapore, 2024. http://dx.doi.org/10.1007/978-981-97-1323-3_12.
Full textAli, Mohammed Mahmood, Sara Noorain, Mohammad S. Qaseem, and Ateeq ur Rahman. "Suspicious Human Behaviour Detection Focusing on Campus Sites." In Lecture Notes in Networks and Systems. Springer Nature Singapore, 2022. http://dx.doi.org/10.1007/978-981-19-2940-3_12.
Full textRyan, Brendan, and Aswin Vijayan. "Classifying Normal and Suspicious Behaviours When Accessing Public Locations." In Advances in Intelligent Systems and Computing. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-96074-6_11.
Full textSalman, Muhammad, I. Wayan Budi Santana, Muhammad Ikram, and Mohamed Ali Kaafar. "Auditing and Attributing Behaviours of Suspicious Android Health Applications." In Lecture Notes in Computer Science. Springer Nature Singapore, 2025. https://doi.org/10.1007/978-981-96-3531-3_12.
Full textRoy, Anusree, and Mousumi Gupta. "Tracking Suspicious User Behavior Through Hybrid Feature Selection Technique." In Learning and Analytics in Intelligent Systems. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-42363-6_24.
Full textChoi, Ji-Hyen, Jong-Won Choe, and Yong-Ik Yoon. "Prediction Method for Suspicious Behavior Based on Omni-View Model." In Advances in Computer Science and Ubiquitous Computing. Springer Singapore, 2016. http://dx.doi.org/10.1007/978-981-10-3023-9_93.
Full textConference papers on the topic "Suspicious behaviors"
Heredia, Juanpablo, Fabrício Venturim, Dany Diaz, Felipe Moreno-Vera, and Jorge Poco. "Tracking Overfishing: Visual Analytics of Suspicious Behaviors in Commercial Fishing Vessels." In 2024 IEEE Visual Analytics Science and Technology VAST Challenge. IEEE, 2024. http://dx.doi.org/10.1109/vastchallenge64683.2024.00010.
Full textShrestha, Sujan, Yoji Taniguchi, and Tetsuo Tanaka. "Detection of Pre Shoplifting Suspicious Behavior Using Deep Learning." In 2024 16th IIAI International Congress on Advanced Applied Informatics (IIAI-AAI). IEEE, 2024. http://dx.doi.org/10.1109/iiai-aai63651.2024.00088.
Full textNooli, Arvin, Ashlin Furtado, Rehan Sayed, and Venugopal N. "Data-Set for Normal and Suspicious Behavior in ATM Booths." In 2024 IEEE 3rd International Conference on Data, Decision and Systems (ICDDS). IEEE, 2024. https://doi.org/10.1109/icdds62937.2024.10910657.
Full textRadhika, R., and A. Muthukumaravel. "Behavioral Analysis in Video Streams: Towards Automated Suspicious Activity Detection." In 2024 Asian Conference on Intelligent Technologies (ACOIT). IEEE, 2024. https://doi.org/10.1109/acoit62457.2024.10940053.
Full textBidlingmaier, Antonella, Julian Jandeleit, Fred Kunze, et al. "Fishing Vizzard: An Interactive Visual Analytics Tool to Identify Suspicious Fishing Behavior." In 2024 IEEE Visual Analytics Science and Technology VAST Challenge. IEEE, 2024. http://dx.doi.org/10.1109/vastchallenge64683.2024.00017.
Full textAwasthi, Abhishek, Mohammad Bdair, A. Nandha Kumar, Sanjog Thapa, Nalini Devi S, and Bharathi Ramesh Kumar. "NLP for Sentiment Analysis in Social Media Posts to Detect Suspicious Behaviour." In 2024 International Conference on Intelligent Algorithms for Computational Intelligence Systems (IACIS). IEEE, 2024. http://dx.doi.org/10.1109/iacis61494.2024.10721839.
Full textShajari, Shadi, Mustafa Alassad, and Nitin Agarwal. "Characterizing Suspicious Commenter Behaviors." In ASONAM '23: International Conference on Advances in Social Networks Analysis and Mining. ACM, 2023. http://dx.doi.org/10.1145/3625007.3627309.
Full textQiang, Wang, Pang Jianmin, Fu Wen, and Yue Feng. "Graphical Annotation of Suspicious Behaviors." In 2009 International Forum on Information Technology and Applications (IFITA). IEEE, 2009. http://dx.doi.org/10.1109/ifita.2009.191.
Full textFredrikson, Matt, Somesh Jha, Mihai Christodorescu, Reiner Sailer, and Xifeng Yan. "Synthesizing Near-Optimal Malware Specifications from Suspicious Behaviors." In 2010 IEEE Symposium on Security and Privacy. IEEE, 2010. http://dx.doi.org/10.1109/sp.2010.11.
Full textChengzhang, Ji, and Dae-Ki Kang. "Detecting spamming stores by analyzing their suspicious behaviors." In 2015 17th International Conference on Advanced Communication Technology (ICACT). IEEE, 2015. http://dx.doi.org/10.1109/icact.2015.7224845.
Full textReports on the topic "Suspicious behaviors"
Pennington, Adam G., John D. Strunk, John L. Griffin, Craig A. Soules, Garth R. Goodson, and Gregory R. Ganger. Storage-based Intrusion Detection: Watching storage activity for suspicious behavior. Defense Technical Information Center, 2002. http://dx.doi.org/10.21236/ada461142.
Full textKeefer, Philip, Benjamin Roseth, and Julieth Santamaria. General Skills Training for Public Employees Experimental: Evidence on Cybersecurity Training in Argentina. Inter-American Development Bank, 2024. http://dx.doi.org/10.18235/0013202.
Full text