Open Access

Abnormal User Behavior Detection for Industry Big Data Analysis

 and    | May 03, 2024

Cite

Gotlieb, M. R., & Cheema, S. E. (2017). From consumer to producer: motivations, internet use, and political consumerism. Information Communication & Society, 20(3-4), 570-586. Search in Google Scholar

Wang, Y. S. (2019). User experiences in live video streaming: a netnography analysis. Internet Research. Search in Google Scholar

Li, W., Lu, Y., Ma, J., & Wang, B. (2023). Users’ subsequent innovation after organizational adoption: evidence from an online game user innovation community. Internet Research, 33(4), 1446-1472. Search in Google Scholar

Zhao, XuanBhuiyan, Md Zakirul AlamQi, LianyongNie, HongliTang, WendaDou, Wanchun. (2020). Trcmp: a dependable app usage inference design for user behavior analysis through cyber-physical parameters. Journal of systems architecture, 102. Search in Google Scholar

Zhu, Z., Zhou, T., Jia, C., Liu, W., Liu, B., & Cao, J. (2020). Community detection across multiple social networks based on overlapping users. Transactions on Emerging Telecommunications Technologies. Search in Google Scholar

Can WangTao BoYun Wei ZhaoChi-Hung ChiKwok-Yan LamSen WangMin Shu. (2018). Behavior-interior-aware user preference analysis based on social networks. Complexity, 2018(Pta11). Search in Google Scholar

Urueña López, Alberto, Mateo, F., Navío-Marco, Julio, Martínez-Martínez, José María, Gómez-Sanchís, Juan, & Vila-Francés, Joan, et al. (2019). Analysis of computer user behavior, security incidents and fraud using self-organizing maps. Computers & Security. Search in Google Scholar

Bao, K., & Ding, Y. (2020). Multiobjects association and abnormal behavior detection for massive data analysis in multisensor monitoring network. Mathematical Problems in Engineering, 2020. Search in Google Scholar

Qi, W., Ding, W., Wang, X., Jiang, Y., Xu, Y., & Wang, J., et al. (2018). Construction and mitigation of user-behavior-based covert channels on smartphones. IEEE Transactions on Mobile Computing, PP(1), 1-1. Search in Google Scholar

Yin, L., & Zhong, Q. (2023). Googleresnet3 network for detecting the abnormal electricity consumption behavior of users. International journal of electrical power and energy systems. Search in Google Scholar

Ko, K. E., & Sim, K. B. (2018). Deep convolutional framework for abnormal behavior detection in a smart surveillance system. Engineering Applications of Artificial Intelligence, 67(jan.), 226-234. Search in Google Scholar

Xue, G., Liu, S., & Gong, D. (2020). Identifying abnormal riding behavior in urban rail transit: a survey on “in-out’’ in the same subway station. IEEE Transactions on Intelligent Transportation Systems, PP(99), 1-13. Search in Google Scholar

Khan, M. S., Gul, N., Kim, S. M., Kim, J., & Din, I. (2020). A comparative analysis of different outlier detection techniques in cognitive radio networks with malicious users. Wireless Communications and Mobile Computing, 2020, 18. Search in Google Scholar

Shi, H., Ji, L., Liu, S., Wang, K., & Hu, X. (2022). Collusive anomalies detection based on collaborative markov random field. Intelligent data analysis. Search in Google Scholar

Shuo, J., Hui, F., Shining, L., Zhao, X., & Khattak, A. J. (2019). Lstm-cnn for abnormal driving behavior recognition. IET Intelligent Transport Systems, 14(7). Search in Google Scholar

Essa, M., Hussein, M., & Sayed, T. (2018). Road users’ behavior and safety analysis of pedestrian–bike shared space: case study of robson street in vancouver. Canadian Journal of Civil Engineering, 45(12), 1053-1064. Search in Google Scholar

Lei, Z., Zhi-Kun, C., Jing-Quan, L. I., & Tao, B. (2017). Application of modified k-means model in user behavior analysis of electric power system. Radio Engineering. Search in Google Scholar

Xu, X. X. X. (2018). Abnormal user behaviour perception method in sdn. International Journal of Robotics & Automation, 33(5). Search in Google Scholar

Deng, S., Cai, Q., Zhang, Z., & Wu, X. (2021). User behavior analysis based on stacked autoencoder and clustering in complex power grid environment. IEEE Transactions on Intelligent Transportation Systems, PP(99), 1-15. Search in Google Scholar

Feng, P., Ma, J., & Sun, C. (2017). Selecting critical data flows in android applications for abnormal behavior detection. Mobile Information Systems,2017,(2017-4-30), 2017(pt.3), 1-16. Search in Google Scholar

Wu, C., & Cheng, Z. (2020). A novel detection framework for detecting abnormal human behavior. Mathematical Problems in Engineering, 2020(1), 1-9. Search in Google Scholar

Lin, R., Yang, F., Gao, M., Wu, B., & Zhao, Y. (2019). Aud-mts: an abnormal user detection approach based on power load multi-step clustering with multiple time scales. Energies, 12(16), 3144-. Search in Google Scholar

eISSN:
2444-8656
Language:
English
Publication timeframe:
Volume Open
Journal Subjects:
Life Sciences, other, Mathematics, Applied Mathematics, General Mathematics, Physics