Searched for: subject%3A%22behavior%255C+model%22
(1 - 9 of 9)
document
Nadeem, A. (author)
Understanding the behavior of cyber adversaries provides threat intelligence to security practitioners, and improves the cyber readiness of an organization. With the rapidly evolving threat landscape, data-driven solutions are becoming essential for automatically extracting behavioral patterns from data that are otherwise too time-consuming to...
doctoral thesis 2024
document
Top, Jakob Dirk (author), Jonker, C.M. (author), Verbrugge, Rineke (author), de Weerd, Harmen (author)
Epistemic logic can be used to reason about statements such as ‘I know that you know that I know that φ ’. In this logic, and its extensions, it is commonly assumed that agents can reason about epistemic statements of arbitrary nesting depth. In contrast, empirical findings on Theory of Mind, the ability to (recursively) reason about mental...
conference paper 2024
document
Fu, Xinyue (author), Zhuang, Taozhi (author), Huang, R. (author), Dong, Yaxian (author)
Introduction: Resident participation has gained increasing prominence and significance in the pursuit of sustainable neighborhoods regeneration. However, the current state of resident participation practices remains beset by several challenges, which present formidable impediments to the initiation and execution of neighborhood regeneration...
journal article 2023
document
Song, Q. (author), Tan, Rui (author), Wang, J. (author)
Driver Behavior Modeling (DBM) aims to predict and model human driving behaviors, which is typically incorporated into the Advanced Driver Assistance System to enhance transportation safety and improve driving experience. Inverse reinforcement learning (IRL) is a prevailing DBM technique with the goal of modeling the driving policy by...
conference paper 2023
document
Nadeem, A. (author), Verwer, S.E. (author), Yang, Shanchieh Jay (author)
The evolving nature of the tactics, techniques, and procedures used by cyber adversaries have made signature and template based methods of modeling adversary behavior almost infeasible. We are moving into an era of data-driven autonomous cyber defense agents that learn contextually meaningful adversary behaviors from observables. In this chapter...
book chapter 2023
document
Klessens, Tycho M.A. (author), Daniel, D. (author), Jiang, Yong (author), van Breukelen, B.M. (author), Scholten, L. (author), Pande, S. (author)
Freshwater resources in coastal areas are under intense pressure from excessive groundwater extraction, which amplifies saltwater intrusion (SWI) into coastal freshwater aquifers, such as in the Mekong Delta. Studies that combine socioenvironmental data and households' psychological factors next to salinity measurement data to design...
journal article 2022
document
Hung, H.S. (author), Gedik, E. (author), Cabrera Quiros, L.C. (author)
When aspiring to achieve 'in the wild' behavior analysis, we come across a number of conceptual and practical issues. In this chapter, we focus primarily on describing the data collection process for the automated analysis of human social behavior. Specifically, we address the task of analyzing social interaction during conversations. Most...
book chapter 2019
document
Xu, J. (author)
doctoral thesis 2015
document
Taal, J.R. (author), Chen, Z. (author), He, Y. (author), Lagendijk, R.I.L. (author)
Wireless and Internet video applications are inherently subjected to bit errors and packet errors, respectively. This is especially so if constraints on the end-to-end compression and transmission latencies are imposed. Therefore, it is necessary to develop methods to optimize the video compression parameters and the rate allocation of these...
journal article 2004
Searched for: subject%3A%22behavior%255C+model%22
(1 - 9 of 9)