Suspicious Human Activity Detection System
نویسندگان
چکیده
منابع مشابه
Incremental behavior modeling and suspicious activity detection
We propose and evaluate an efficient method for automatic identification of suspicious behavior in video surveillance data that incrementally learns scenespecific statistical models of human behavior without requiring storage of large databases of training data. The approach begins by building an initial set of models explaining the behaviors occurring in a small bootstrap data set. The bootstr...
متن کاملStorage-based Intrusion Detection: Watching Storage Activity for Suspicious Behavior
Storage-based intrusion detection allows storage systems to watch for data modifications characteristic of system intrusions. This enables storage systems to spot several common intruder actions, such as adding backdoors, inserting Trojan horses, and tampering with audit logs. Further, an intrusion detection system (IDS) embedded in a storage device continues to operate even after client system...
متن کاملSecurity in Physical Environments: Algorithms and System for Automated Detection of Suspicious Activity
Secure physical environments are vulnerable to misuse by authorized users. To protect against potentially suspicious actions, data about the movement of users can be captured through the use of RFID tags and sensors, and patterns of suspicious behaviour detected in the captured data. This paper presents four types of suspicious patterns, algorithms for their detection, and the design and implem...
متن کاملSuspicious Email Detection System via Triple DES Algorithm: Cryptography Approach
Abstract: The paper presents a suspicious email detection System which detect suspicious activities. In the paper we proposed the use of cryptography strategies for terrorists email detection. Security plays a very important and crucial role in the field of Internet and for email communication. So there is a need of suspicious email detection system which detects all suspicious activities. The ...
متن کاملSuspicious URL detection system using SGD Algorithm for twitter stream
Twitter is a one of the most popular social networking site used by millions of people in the world. As the usage growing rapidly in the recent years, attackers are concentrating more on twitter to gather personnel data and made changes to. It leads to the diminishing the privacy of the users. The attacker tweets suspicious URLs on the user’s timeline. These URLs contains spam, phishing and mal...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of ISMAC
سال: 2020
ISSN: 2582-1369
DOI: 10.36548/jismac.2020.4.005