Abnormal Behavior Detection to Identify Infected Systems Using the APChain Algorithm and Behavioral Profiling
نویسندگان
چکیده
منابع مشابه
OPTIMIZATION TO IDENTIFY MUSKINGUM MODEL PARAMETERS USING IMPERIALIST COMPETITIVE ALGORITHM
In engineering, flood routing is an important technique necessary for the solution of a floodcontrol problem and for the satisfactory operation of a flood-prediction service. A simple conceptual model like the Muskingum model is very effective for the flood routing process. One challenge in application of the Muskingum model is that its parameters cannot be measured physically. In this article ...
متن کاملAn Abnormal Crowd Behavior Detection Algorithm Based on Fluid Mechanics
Abnormal crowd behavior detection is an advanced topic researched in fields of computer vision and digital image processing. The problems such as diversity of monitoring scene, different crowd density and mutual occlusion among crowds etc result in a low recognition rate for abnormal crowd behavior detection. In order to solve these problems, this paper combines a streakline model based on flui...
متن کاملAbnormal behavior detection using hybrid agents in crowded scenes
Please save a copy of this file, complete and upload as the " Confirmation of Authorship " file. 1. This manuscript, or a large part of it, has not been published, was not, and is not being submitted to any other journal. If presented at a conference, the conference is identified. If published in conference proceedings, the publication is identified below and substantial justification for re-pu...
متن کاملAnalysis of a Quantitative Behavioral Assessment Program to Identify and Treat Abnormal Behaviors in Captive Primates
متن کامل
Using the Breakout Algorithm to Identify Hard and Unsolvable Subproblems
Local search algorithms have been very successful for solving constraint satisfaction problems (CSP). However, a major weakness has been that local search is unable to detect unsolvability and is thus not suitable for highly constrained or overconstrained problems. In this paper, we present a scheme where a local search algorithm, the breakout algorithm, is used to identify hard or unsolvable s...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Security and Communication Networks
سال: 2018
ISSN: 1939-0114,1939-0122
DOI: 10.1155/2018/9706706