Journal articles on the topic 'Suspicious behaviors'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Suspicious behaviors.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Cheng, Junyi, Xianfeng Zhang, Xiao Chen, Miao Ren, Jie Huang, and Peng Luo. "Early Detection of Suspicious Behaviors for Safe Residence from Movement Trajectory Data." ISPRS International Journal of Geo-Information 11, no. 9 (2022): 478. http://dx.doi.org/10.3390/ijgi11090478.
Full textPark, Yeonji, Yoojin Jeong, and Chaebong Sohn. "Suspicious behavior recognition using deep learning." Journal of Advances in Military Studies 4, no. 1 (2021): 43–59. http://dx.doi.org/10.37944/jams.v4i1.78.
Full textWong, Khai Chiuan, and Mohd Ridzuan bin Ahmad. "Reviewing Approaches and Techniques for Detecting Suspicious Human Behavior: A Comprehensive Survey." ELEKTRIKA- Journal of Electrical Engineering 23, no. 2 (2024): 44–52. http://dx.doi.org/10.11113/elektrika.v23n2.538.
Full textCheoi, Kyung Joo. "Temporal Saliency-Based Suspicious Behavior Pattern Detection." Applied Sciences 10, no. 3 (2020): 1020. http://dx.doi.org/10.3390/app10031020.
Full textWong, Keri Ka-Yee, and Adrian Raine. "Peer Problems and Low Self-esteem Mediate the Suspicious and Non-suspicious Schizotypy–Reactive Aggression Relationship in Children and Adolescents." Journal of Youth and Adolescence 48, no. 11 (2019): 2241–54. http://dx.doi.org/10.1007/s10964-019-01125-9.
Full textYan, Guanghua, Qiang Li, Dong Guo, and Xiangyu Meng. "Discovering Suspicious APT Behaviors by Analyzing DNS Activities." Sensors 20, no. 3 (2020): 731. http://dx.doi.org/10.3390/s20030731.
Full textSchoenmakers, Birgitte, and Johan Wens. "Efficiency, Usability, and Outcomes of Proctored Next-Level Exams for Proficiency Testing in Primary Care Education: Observational Study." JMIR Formative Research 5, no. 8 (2021): e23834. http://dx.doi.org/10.2196/23834.
Full textZeigler-Hill, Virgil, and Jennifer Vonk. "Borderline Personality Features and Mate Retention Behaviors: The Mediating Roles of Suspicious and Reactive Jealousy." Sexes 4, no. 4 (2023): 507–21. http://dx.doi.org/10.3390/sexes4040033.
Full textSaghehei, Ehsan, and Azizollah Memariani. "Suspicious Behavior Detection in Debit Card Transactions using Data Mining." Information Resources Management Journal 28, no. 3 (2015): 1–14. http://dx.doi.org/10.4018/irmj.2015070101.
Full textGong, Kai, Zhong Xu, Zhefeng Cai, Yuxiu Chen, and Zhanxiang Wang. "Internet Hospitals Help Prevent and Control the Epidemic of COVID-19 in China: Multicenter User Profiling Study." Journal of Medical Internet Research 22, no. 4 (2020): e18908. http://dx.doi.org/10.2196/18908.
Full textPoornima, S., and M. Geethanjali. "Shilling Attack Detection in User Based Recommendation System." Data Analytics and Artificial Intelligence 3, no. 2 (2023): 85–94. http://dx.doi.org/10.46632/daai/3/2/17.
Full textShrushti, Thigale, Musale Jitendra, Shinde Swapnil, Deshmane Swamini, and Kale Harshad. "Deep Learning model for Anomaly Detection in Video Surveillance: A CNN Approach." Research and Applications: Embedded System 7, no. 2 (2024): 32–44. https://doi.org/10.5281/zenodo.11483938.
Full textGruenewald, Jeff, Brent R. Klein, Grant Drawve, Brent L. Smith, and Katie Ratcliff. "Suspicious preoperational activities and law enforcement interdiction of terrorist plots." Policing: An International Journal 42, no. 1 (2019): 89–107. http://dx.doi.org/10.1108/pijpsm-08-2018-0125.
Full textJiang, Meng, Alex Beutel, Peng Cui, Bryan Hooi, Shiqiang Yang, and Christos Faloutsos. "Spotting Suspicious Behaviors in Multimodal Data: A General Metric and Algorithms." IEEE Transactions on Knowledge and Data Engineering 28, no. 8 (2016): 2187–200. http://dx.doi.org/10.1109/tkde.2016.2555310.
Full textMartinez Torres, Duber, Humberto Loaiza Correa, and Eduardo Caicedo Bravo. "Online learning of contexts for detecting suspicious behaviors in surveillance videos." Image and Vision Computing 89 (September 2019): 197–210. http://dx.doi.org/10.1016/j.imavis.2019.07.006.
Full textSharma, Ritesh Manoj. "Active Chat Monitoring and Suspicious Chat Detection Over Internet." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 05 (2024): 1–5. http://dx.doi.org/10.55041/ijsrem32752.
Full textSaravanan Arumugam. "Deep Learning-Based Smart Invigilation System for Enhanced Exam Integrity." Proceedings of Engineering and Technology Innovation 29 (February 10, 2025): 99–115. https://doi.org/10.46604/peti.2024.14105.
Full textYadav, Pratik. "Predict, Identify and Alert on Suspicious Activity by Multiple Zone." International Journal for Research in Applied Science and Engineering Technology 11, no. 5 (2023): 4705–8. http://dx.doi.org/10.22214/ijraset.2023.52523.
Full textAdams, Peter, and Nancy M. Smith. "Understanding behavior detection technology: How it finds suspicious behaviors and meets requirements of new compliance environment." Journal of Investment Compliance 5, no. 1 (2004): 33–38. http://dx.doi.org/10.1108/15285810410636055.
Full textAyed, M. B., S. Elkosantini, and M. Abid. "An Automated Surveillance System Based on Multi-Processor and GPU Architecture." Engineering, Technology & Applied Science Research 7, no. 6 (2017): 2319–23. https://doi.org/10.5281/zenodo.1119002.
Full textGupta, Neha, and Bharat Bhushan Agarwal. "Suspicious Activity Classification in Classrooms using Deep Learning." Engineering, Technology & Applied Science Research 13, no. 6 (2023): 12226–30. http://dx.doi.org/10.48084/etasr.6228.
Full textNavale, Dr. Mahesh, Aryan Arjun Jadhav, Mahesh Shrikrishna Kadam, Shalmali Dipak Karandikar, and Siddhi Anil Kate. "From Manual to Automated: A Computer Vision-Based Solution for Exam Cheating Detection." International Journal of Ingenious Research, Invention and Development (IJIRID) 3, no. 5 (2024): 414–19. https://doi.org/10.5281/zenodo.14066366.
Full textLowe, Maria R., Angela Stroud, and Alice Nguyen. "Who Looks Suspicious? Racialized Surveillance in a Predominantly White Neighborhood." Social Currents 4, no. 1 (2016): 34–50. http://dx.doi.org/10.1177/2329496516651638.
Full textSubha, I., P. Narmadha, S. Nivedha, and T. Sethukarasi. "Real-Time Suspicious Human Action Recognition from Surveillance Videos for Resource-Constrained Devices." Journal of Computational and Theoretical Nanoscience 17, no. 8 (2020): 3790–97. http://dx.doi.org/10.1166/jctn.2020.9322.
Full textAlimahomed-Wilson, Sabrina. "When the FBI Knocks: Racialized State Surveillance of Muslims." Critical Sociology 45, no. 6 (2018): 871–87. http://dx.doi.org/10.1177/0896920517750742.
Full textArroyo, Roberto, J. Javier Yebes, Luis M. Bergasa, Iván G. Daza, and Javier Almazán. "Expert video-surveillance system for real-time detection of suspicious behaviors in shopping malls." Expert Systems with Applications 42, no. 21 (2015): 7991–8005. http://dx.doi.org/10.1016/j.eswa.2015.06.016.
Full textPELED, DORON, and HONGYANG QU. "ENFORCING CONCURRENT TEMPORAL BEHAVIORS." International Journal of Foundations of Computer Science 17, no. 04 (2006): 743–61. http://dx.doi.org/10.1142/s012905410600408x.
Full textZeigler-Hill, Virgil, Cheryl A. Cosby, Jennifer K. Vrabel, and Ashton C. Southard. "Narcissism and mate retention behaviors: What strategies do narcissistic individuals use to maintain their romantic relationships?" Journal of Social and Personal Relationships 37, no. 10-11 (2020): 2737–57. http://dx.doi.org/10.1177/0265407520939190.
Full textYang, Zhihai, Qindong Sun, Yaling Zhang, Lei Zhu, and Wenjiang Ji. "Inference of Suspicious Co-Visitation and Co-Rating Behaviors and Abnormality Forensics for Recommender Systems." IEEE Transactions on Information Forensics and Security 15 (2020): 2766–81. http://dx.doi.org/10.1109/tifs.2020.2977023.
Full textdo Nascimento, Vinicius D., Tiago A. O. Alves, Claudio M. de Farias, and Diego Leonel Cadette Dutra. "A Hybrid Framework for Maritime Surveillance: Detecting Illegal Activities through Vessel Behaviors and Expert Rules Fusion." Sensors 24, no. 17 (2024): 5623. http://dx.doi.org/10.3390/s24175623.
Full textGaldelli, Alessandro, Adriano Mancini, Carmen Ferrà, and Anna Nora Tassetti. "A Synergic Integration of AIS Data and SAR Imagery to Monitor Fisheries and Detect Suspicious Activities." Sensors 21, no. 8 (2021): 2756. http://dx.doi.org/10.3390/s21082756.
Full textHuang, Hong, Weitao Huang, and Feng Jiang. "GSIDroid: A Suspicious Subgraph-Driven and Interpretable Android Malware Detection System." Sensors 25, no. 13 (2025): 4116. https://doi.org/10.3390/s25134116.
Full textAhmad, Heryanto, Stiawan Deris, Hermansyah Adi, et al. "The incorporation of stacked long short-term memory into intrusion detection systems for botnet attack classification." IAES International Journal of Artificial Intelligence (IJ-AI) 13, no. 3 (2024): 3657–70. https://doi.org/10.11591/ijai.v13.i3.pp3657-3670.
Full textLi, Juan, Xianwen Fang, and Yinkai Zuo. "Entropy-Based Behavioral Closeness Filtering Chaotic Activity Method." Mathematics 12, no. 5 (2024): 666. http://dx.doi.org/10.3390/math12050666.
Full textResearcher. "PREVENTING SYBIL ATTACKS IN BLOCKCHAIN USING DISTRIBUTED BEHAVIOR MONITORING AND INTEGRITY VALIDATION OF MINERS." International Journal of Computer Science Review (IJCSR) 1, no. 1 (2024): 12–20. https://doi.org/10.5281/zenodo.14440824.
Full textHeryanto, Ahmad, Deris Stiawan, Adi Hermansyah, et al. "The incorporation of stacked long short-term memory into intrusion detection systems for botnet attack classification." IAES International Journal of Artificial Intelligence (IJ-AI) 13, no. 3 (2024): 3657. http://dx.doi.org/10.11591/ijai.v13.i3.pp3657-3670.
Full textChang, Remco, Alvin Lee, Mohammad Ghoniem, et al. "Scalable and Interactive Visual Analysis of Financial Wire Transactions for Fraud Detection." Information Visualization 7, no. 1 (2008): 63–76. http://dx.doi.org/10.1057/palgrave.ivs.9500172.
Full textSikder, Abu Sayed. "Unveiling the Human Aspect of Cybersecurity: A Holistic Examination of Employee Behavior and Its Significance in Safeguarding Organizational Security within the Context of Bangladesh." International Journal of Imminent Science & Technology. 1, no. 1 (2017): 199–215. http://dx.doi.org/10.70774/ijist.v1i1.19.
Full textVARUN R, Pranav P Rao, Manohar S N, and Nagsharan A. "Virtual Overseer for Examination Using Artificial Intelligence." Indonesian Journal of Information Systems 6, no. 2 (2024): 174–82. http://dx.doi.org/10.24002/ijis.v6i2.7311.
Full textLi, Zhuoxuan, Warren Seering, Tiffany Tao, and Shengnan Cao. "Understanding Community Behaviors in For-Profit Open Source Hardware Projects." Proceedings of the Design Society: International Conference on Engineering Design 1, no. 1 (2019): 2397–406. http://dx.doi.org/10.1017/dsi.2019.246.
Full textZhang, Ge, Zhao Li, Jiaming Huang, et al. "eFraudCom: An E-commerce Fraud Detection System via Competitive Graph Neural Networks." ACM Transactions on Information Systems 40, no. 3 (2022): 1–29. http://dx.doi.org/10.1145/3474379.
Full textMcNamarah, Chan. "White Caller Crime: Racialized Police Communication and Existing While Black." Michigan Journal of Race & Law, no. 24.2 (2019): 335. http://dx.doi.org/10.36643/mjrl.24.2.white.
Full textZhou, Xiaojun, Zhen Xu, Liming Wang, Kai Chen, Cong Chen, and Wei Zhang. "Inside the Closed World: User and Device Profile Analytics for SCADA Security." MATEC Web of Conferences 173 (2018): 03039. http://dx.doi.org/10.1051/matecconf/201817303039.
Full textMehmood, Abid. "LightAnomalyNet: A Lightweight Framework for Efficient Abnormal Behavior Detection." Sensors 21, no. 24 (2021): 8501. http://dx.doi.org/10.3390/s21248501.
Full textChen, Tong, Jiqiang Liu, Yalun Wu, et al. "Survey on Astroturfing Detection and Analysis from an Information Technology Perspective." Security and Communication Networks 2021 (December 1, 2021): 1–16. http://dx.doi.org/10.1155/2021/3294610.
Full textJiang, Chao. "Deploying human body detection technologies in security systems: An in-depth study of the FASTER-GCNN algorithm." Applied and Computational Engineering 32, no. 1 (2024): 210–15. http://dx.doi.org/10.54254/2755-2721/32/20230213.
Full textCheng, Dawei, Sheng Xiang, Chencheng Shang, Yiyi Zhang, Fangzhou Yang, and Liqing Zhang. "Spatio-Temporal Attention-Based Neural Network for Credit Card Fraud Detection." Proceedings of the AAAI Conference on Artificial Intelligence 34, no. 01 (2020): 362–69. http://dx.doi.org/10.1609/aaai.v34i01.5371.
Full textMuhajir Syamsu. "Relationship Between Artificial Intelligence and Machine Learning in Network Monitoring." International Journal of Integrative Research 1, no. 6 (2023): 359–76. http://dx.doi.org/10.59890/ijir.v1i6.72.
Full textFatahi, Somayeh, and Mohammad Rabiei. "Users clustering Based on Search Behavior Analysis Using the LRFM Model (Case Study: Iran Scientific Information Database (Ganj))." Iranian Journal of Information Processing & Management 36, no. 2 (2021): 419–42. https://doi.org/10.35050/JIPM010.2020.006.
Full textResearcher. "DEEP LEARNING FOR AUTOMATICALLY DETECTING CHEATING IN ONLINE EXAMS." International Journal of Information Technology Research and Development (IJITRD) 4, no. 2 (2023): 17–25. https://doi.org/10.5281/zenodo.15267916.
Full text