Search alternatives:
host detection » post election (Expand Search)
Showing 1 - 20 results of 111 for search 'host detection behavior', query time: 0.11s Refine Results
  1. 1

    Understanding socialbot behavior on end hosts by Yukun He, Qiang Li, Jian Cao, Yuede Ji, Dong Guo

    Published 2017-02-01
    “…Therefore, new approaches are needed to detect socialbots on hosts. The fundamental to design host-side detecting approaches is to gain an insight into the behaviors of socialbots on host. …”
    Get full text
    Article
  2. 2

    Decoding the Bite: Sensory cues, host heterogeneity, and pathogen manipulation in mosquito host-seeking behavior by Ran Zhang, Rui Han, Shuairu Jiao, Xiuyun Wang, Guizhi Xu, Fanghang He, Chengsheng Peng, Qilong Wu, Shengqun Deng

    Published 2025-01-01
    “…This review synthesizes the mechanisms driving mosquito host-seeking behavior and the factors underlying heterogeneous human biting patterns. …”
    Get full text
    Article
  3. 3

    Overhead Analysis and Evaluation of Approaches to Host-Based Bot Detection by Yuede Ji, Qiang Li, Yukun He, Dong Guo

    Published 2015-05-01
    “…Host-based bot detection approaches discover malicious bot processes by signature comparison or behavior analysis. …”
    Get full text
    Article
  4. 4
  5. 5

    Reinforcement Learning-Based Generative Security Framework for Host Intrusion Detection by Yongsik Kim, Su-Youn Hong, Sungjin Park, Huy Kang Kim

    Published 2025-01-01
    “…Attackers create more complicated attack patterns and configure attack behavior to resemble normal behavior to evade detection by defenders. …”
    Get full text
    Article
  6. 6

    Multi-view adversarial attack defending method for host intrusion detection by WANG Fei, QIAN Kehan, LYU Mingqi, ZHU Tiantian, CHEN Honglong

    Published 2025-01-01
    “…Host-based intrusion detection (HID) aims to identify attack behaviors through the analysis of host logs. …”
    Get full text
    Article
  7. 7

    A novel approach for detecting malicious hosts based on RE-GCN in intranet by Haochen Xu, Xiaoyu Geng, Junrong Liu, Zhigang Lu, Bo Jiang, Yuling Liu

    Published 2024-12-01
    “…Therefore, accurately identifying hosts with malicious behavior in the network is crucial. …”
    Get full text
    Article
  8. 8

    Identifying Abnormal Hosts in Data Streams Using Reversible Sketch by Aiping Zhou, Jin Qian

    Published 2025-05-01
    “…ABSTRACT Significant cardinality change is an important sign of the beginning of network attacks. Hosts associated with significant cardinality changes usually exhibit abnormal behavior. …”
    Get full text
    Article
  9. 9

    Variability of Known Exoplanet Host Stars Observed by TESS by Emilie R. Simpson, Tara Fetherolf, Stephen R. Kane, Joshua Pepper, Teo Močnik, Paul A. Dalba

    Published 2023-01-01
    “…Both direct and indirect methods of exoplanet detection rely upon detailed knowledge of the potential host stars. …”
    Get full text
    Article
  10. 10

    Host personality and seasonal parasitism risk do not account for egg rejection behavior in the azure-winged magpie by Xingyi Jiang, Wei Liang, Yanyun Zhang

    Published 2025-04-01
    “…Recent studies have shown that host egg rejection behavior can vary according to personality traits and parasitism risk. …”
    Get full text
    Article
  11. 11

    Patrolling and Cleaning: Threat Detection and Response Behaviors of Soldiers in a Social Aphid by Zhixiang Liu, Zhentao Cheng, Hui Zhang, Xiaolei Huang

    Published 2025-07-01
    “…However, over the past decades, numerous studies have focused on housekeeping and colony defense behaviors in species living in primary hosts, but little attention has been given to the secondary host stage. …”
    Get full text
    Article
  12. 12
  13. 13

    Uncovering Wolbachia diversity upon artificial host transfer. by Daniela I Schneider, Markus Riegler, Wolfgang Arthofer, Hervé Merçot, Christian Stauffer, Wolfgang J Miller

    Published 2013-01-01
    “…The common endosymbiotic Wolbachia bacteria influence arthropod hosts in multiple ways. They are mostly recognized for their manipulations of host reproduction, yet, more recent studies demonstrate that Wolbachia also impact host behavior, metabolic pathways and immunity. …”
    Get full text
    Article
  14. 14
  15. 15

    Efficient IDS for IoT Networks Using Host-Based Data Aggregation and Multi-Entropy Analysis by Yusei Katsura, Arata Endo, Ismail Arai, Kazutoshi Fujikawa

    Published 2025-01-01
    “…This study proposes a lightweight IDS with the host-based approach, representing communication behaviors with multiple entropies. …”
    Get full text
    Article
  16. 16

    Fabrication and evaluation of a host-guest polylactic acid/gelatin-hydroxyapatite-blueberry scaffold for bone regeneration by Someyra Sistani, Samira Asgharzade, Samaneh Arab, Marjan Bahraminasab, Elahe Soltani-Fard

    Published 2025-08-01
    “…In this study, a three-dimensional (3D) host-guest scaffold model was developed. A porous polylactic acid (PLA) framework (host) was fabricated using a 3D printing technique to provide mechanical stability. …”
    Get full text
    Article
  17. 17

    Mantidfly larvae use cues on substrate to locate and distinguish different sexes and life stages of potential spider hosts by Laurel B. Lietzenmayer, Lisa A. Taylor

    Published 2024-11-01
    “…While this suggests that mantidflies actively seek out adult spiders, we also found that adult spiders were more active than juveniles and may have simply deposited more silk and excreta, providing a stronger cue to detect. We discuss these findings in the context of the risks and benefits of different spider hosts, and how early-life spider-searching strategies may shape a mantidfly’s long-term fitness.…”
    Get full text
    Article
  18. 18
  19. 19

    Stealthy magma system behavior at Veniaminof Volcano, Alaska by Yuyu Li, Patricia M. Gregg, Zhong Lu, Jiahui Wang

    Published 2025-06-01
    “…Volcanoes with long-lived thermally mature magma systems with moderate to small magma reservoirs are the most likely to exhibit stealthy behavior, with the smallest systems most likely to fail without producing a deformation signal. …”
    Get full text
    Article
  20. 20

    Behavioral adaptations of Caenorhabditis elegans against pathogenic threats by Xin Zhao, Xinyu Li, Jiayi Gao, Shi Shen, Wei Zou

    Published 2025-04-01
    “…C. elegans detects harmful signals through chemosensation and initiates avoidance behaviors. …”
    Get full text
    Article