Showing 1 - 20 results of 4,902 for search 'detection behavior', query time: 0.14s Refine Results
  1. 1
  2. 2

    Application of chemotactic behavior for life detection by Max Riekeles, Vincent Bruder, Vincent Bruder, Nicholas Adams, Berke Santos, Berke Santos, Dirk Schulze-Makuch, Dirk Schulze-Makuch, Dirk Schulze-Makuch

    Published 2025-02-01
    “…Overall, the results indicated that each of the three organisms showed chemotactic behavior toward L-serine, which, to our knowledge, is the first time that an L-serine-induced chemotactic response has been detected for H. volcanii.…”
    Get full text
    Article
  3. 3

    Multi-Granularity User Anomalous Behavior Detection by Wenying Feng, Yu Cao, Yilu Chen, Ye Wang, Ning Hu, Yan Jia, Zhaoquan Gu

    Published 2024-12-01
    “…We introduce the Multi-Granularity User Anomalous Behavior Detection (MG-UABD) system, which combines coarse-grained and fine-grained anomaly detection to improve the accuracy and effectiveness of detecting anomalous behaviors. …”
    Get full text
    Article
  4. 4
  5. 5

    Study on user behavior profiling in insider threat detection by Yuanbo GUO, Chunhui LIU, Jing KONG, Yifeng WANG

    Published 2018-12-01
    “…Behavior profiling technic using no-labeled historical data to build normal behavior model is an effective way to detect insider attackers. …”
    Get full text
    Article
  6. 6
  7. 7

    Indoor Abnormal Behavior Detection for the Elderly: A Review by Tianxiao Gu, Min Tang

    Published 2025-05-01
    “…In order to address this challenge, the technology of indoor abnormal behavior detection has become a research hotspot. This paper systematically reviews detection methods based on sensors, video, infrared, WIFI, radar, depth, and multimodal fusion. …”
    Get full text
    Article
  8. 8

    Approach to detecting SQL injection behaviors in network environment by Yu-fei ZHAO, Gang XIONG, Long-tao HE, Zhou-jun LI

    Published 2016-02-01
    “…Based on the request length, request frequency and feature string, a new method, LFF (length-frequency-feature), was proposed to detect SQL injection behaviors from network traffic. …”
    Get full text
    Article
  9. 9

    Detecting anomalous SRF cavity behavior with unsupervised learning by Hal Ferguson, Jiang Li, Adam Carpenter, Chris Tennant, Dillon Thomas, Dennis Turner

    Published 2025-03-01
    “…We present an unsupervised learning framework for detecting anomalous superconducting radio-frequency (SRF) cavity behavior at the Continuous Electron Beam Accelerator Facility (CEBAF), emphasizing its initial performance and effectiveness. …”
    Get full text
    Article
  10. 10
  11. 11

    Automated detection of complex zebrafish seizure behavior at scale by Paige Whyte-Fagundes, John Efromson, Anjelica Vance, Samuel Carpenter, Aurélien Bègue, Aloe Carroll, Thomas Jedidiah Jenks Doman, Mark Harfouche, Scott C. Baraban

    Published 2025-06-01
    “…Abstract Convulsive seizure behaviors are a hallmark feature of epilepsy, but automated detection of these events in freely moving animals is difficult. …”
    Get full text
    Article
  12. 12

    Advanced stimulation and dog behavior analysis system by Stojanović Milan, Stevanović Dejan, Stošović Slavimir

    Published 2025-01-01
    “…This paper describes a system for analyzing the behavior of a hunting dog using the detection of the dog’s barking and its speed of movement, as well as a system for sound and vibration stimulation of the dog and LED module. …”
    Get full text
    Article
  13. 13

    Identification of Programs Based on the Behavior by M. V. Baklanovsky, A. R. Khanov

    Published 2014-12-01
    Subjects: “…behavior analysis, anomaly detection, pattern mining…”
    Get full text
    Article
  14. 14

    Does ChatGPT show gender bias in behavior detection? by Ji Wu, Yaokang Song, Doris Chenguang Wu

    Published 2024-12-01
    “…However, whether and how ChatGPT contains bias in behavior detection and thus generates ethical concerns in decision-making deserves explored. …”
    Get full text
    Article
  15. 15

    Unknown attack detection model based on network behavior analysis by Yi-han YU, Yu FU, Xiao-ping WU

    Published 2016-06-01
    Subjects: “…intranet behavior…”
    Get full text
    Article
  16. 16

    Midbrain encodes sound detection behavior without auditory cortex by Tai-Ying Lee, Yves Weissenberger, Andrew J King, Johannes C Dahmen

    Published 2024-12-01
    “…By imaging cellular activity in the corticorecipient shell of the inferior colliculus of mice engaged in a sound detection task, we show that the majority of neurons encode information beyond the physical attributes of the stimulus and that the animals’ behavior can be decoded from the activity of those neurons with a high degree of accuracy. …”
    Get full text
    Article
  17. 17

    Research on malicious behavior detection based on iOS system by Yuliang WANG, Xiaodong CHEN, Tun WU

    Published 2017-02-01
    “…Firstly,the cases of malicious application of multiple iOS platforms were enumerated.The main malicious behavior of mobile application under iOS platform was analyzed by dissecting the misuse of crime and the bad influence.The key technologies of malicious behavior detection process were studied.The iOS application malicious behavior detection model was put forward.Finally,iOS application malicious behavior detection solution was given.…”
    Get full text
    Article
  18. 18

    PUE Attack Detection in CWSN Using Collaboration and Learning Behavior by Javier Blesa, Elena Romero, Alba Rozas, Alvaro Araujo, Octavio Nieto-Taladriz

    Published 2013-06-01
    “…This paper discusses a new approach, based on anomaly behavior detection and collaboration, to detect the PUE attack in CWSN scenarios. …”
    Get full text
    Article
  19. 19

    Detecting phase transitions in collective behavior using manifold's curvature by Kelum Gajamannage, Erik M. Bollt

    Published 2017-03-01
    “…If a given behavior of a multi-agent system restricts the phase variable to an invariant manifold, then we define a phase transition as a change of physical characteristics such as speed, coordination, and structure. …”
    Get full text
    Article
  20. 20

    Crowd abnormal behavior detection based on motion similar entropy by Fei LI, Ken CHEN, Meng LI, Chunmei GUO

    Published 2017-05-01
    “…It is an important research content of graphic processing in the field of intelligent video surveillance to detect abnormal events.An algorithm based on entropy of motion similarity (EMS) to detect abnormal behavior was proposed.Based on the optical flow algorithm,taking the bottom flow block as the basic unit to get the scene motion information,according to the concept of social network model,the construction scene of the motion network model (MNM) was proposed,the division of the scene particles motion similarity was completed,and the distribution EMS of MNM was calculated in the time domain.Finally,the obtained image entropy was compared with the reasonable threshold,to determine whether abnormal behavior occured.Experimental results indicate that the proposed algo-rithm can detect abnormal behavior effectively and show promising performance while comparing with the state of the art methods.…”
    Get full text
    Article