Abnormal Behavior Detection to Identify Infected Systems Using the APChain Algorithm and Behavioral Profiling

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

OPTIMIZATION TO IDENTIFY MUSKINGUM MODEL PARAMETERS USING IMPERIALIST COMPETITIVE ALGORITHM

In engineering, flood routing is an important technique necessary for the solution of a floodcontrol problem and for the satisfactory operation of a flood-prediction service. A simple conceptual model like the Muskingum model is very effective for the flood routing process. One challenge in application of the Muskingum model is that its parameters cannot be measured physically. In this article ...

متن کامل

An Abnormal Crowd Behavior Detection Algorithm Based on Fluid Mechanics

Abnormal crowd behavior detection is an advanced topic researched in fields of computer vision and digital image processing. The problems such as diversity of monitoring scene, different crowd density and mutual occlusion among crowds etc result in a low recognition rate for abnormal crowd behavior detection. In order to solve these problems, this paper combines a streakline model based on flui...

متن کامل

Abnormal behavior detection using hybrid agents in crowded scenes

Please save a copy of this file, complete and upload as the " Confirmation of Authorship " file. 1. This manuscript, or a large part of it, has not been published, was not, and is not being submitted to any other journal. If presented at a conference, the conference is identified. If published in conference proceedings, the publication is identified below and substantial justification for re-pu...

متن کامل

Using the Breakout Algorithm to Identify Hard and Unsolvable Subproblems

Local search algorithms have been very successful for solving constraint satisfaction problems (CSP). However, a major weakness has been that local search is unable to detect unsolvability and is thus not suitable for highly constrained or overconstrained problems. In this paper, we present a scheme where a local search algorithm, the breakout algorithm, is used to identify hard or unsolvable s...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Security and Communication Networks

سال: 2018

ISSN: 1939-0114,1939-0122

DOI: 10.1155/2018/9706706