Searched for: subject%3A%22behavior%255C+model%22
(1 - 12 of 12)
document
Nadeem, A. (author)
Understanding the behavior of cyber adversaries provides threat intelligence to security practitioners, and improves the cyber readiness of an organization. With the rapidly evolving threat landscape, data-driven solutions are becoming essential for automatically extracting behavioral patterns from data that are otherwise too time-consuming to...
doctoral thesis 2024
document
Top, Jakob Dirk (author), Jonker, C.M. (author), Verbrugge, Rineke (author), de Weerd, Harmen (author)
Epistemic logic can be used to reason about statements such as ‘I know that you know that I know that φ ’. In this logic, and its extensions, it is commonly assumed that agents can reason about epistemic statements of arbitrary nesting depth. In contrast, empirical findings on Theory of Mind, the ability to (recursively) reason about mental...
conference paper 2024
document
Fu, Xinyue (author), Zhuang, Taozhi (author), Huang, R. (author), Dong, Yaxian (author)
Introduction: Resident participation has gained increasing prominence and significance in the pursuit of sustainable neighborhoods regeneration. However, the current state of resident participation practices remains beset by several challenges, which present formidable impediments to the initiation and execution of neighborhood regeneration...
journal article 2023
document
Song, Q. (author), Tan, Rui (author), Wang, J. (author)
Driver Behavior Modeling (DBM) aims to predict and model human driving behaviors, which is typically incorporated into the Advanced Driver Assistance System to enhance transportation safety and improve driving experience. Inverse reinforcement learning (IRL) is a prevailing DBM technique with the goal of modeling the driving policy by...
conference paper 2023
document
Nadeem, A. (author), Verwer, S.E. (author), Yang, Shanchieh Jay (author)
The evolving nature of the tactics, techniques, and procedures used by cyber adversaries have made signature and template based methods of modeling adversary behavior almost infeasible. We are moving into an era of data-driven autonomous cyber defense agents that learn contextually meaningful adversary behaviors from observables. In this chapter...
book chapter 2023
document
Klessens, Tycho M.A. (author), Daniel, D. (author), Jiang, Yong (author), van Breukelen, B.M. (author), Scholten, L. (author), Pande, S. (author)
Freshwater resources in coastal areas are under intense pressure from excessive groundwater extraction, which amplifies saltwater intrusion (SWI) into coastal freshwater aquifers, such as in the Mekong Delta. Studies that combine socioenvironmental data and households' psychological factors next to salinity measurement data to design...
journal article 2022
document
Hung, H.S. (author), Gedik, E. (author), Cabrera Quiros, L.C. (author)
When aspiring to achieve 'in the wild' behavior analysis, we come across a number of conceptual and practical issues. In this chapter, we focus primarily on describing the data collection process for the automated analysis of human social behavior. Specifically, we address the task of analyzing social interaction during conversations. Most...
book chapter 2019
document
Thoen, Sebastiaan (author)
Tour formation is a distinguishing feature of freight transportation. An increasing amount of research is dedicated to the consideration of tour formation in freight simulation models, but these tour formation models lack statistical calibration on empirical data, do not represent shipments explicitly, or focus on a narrow segment of freight...
master thesis 2018
document
Ingeveld, M. (author)
With the aim of investigating the perception of elderly on two types of automated vehicle (owned and shared) this thesis research questioned 123 elderly respondents on their intention of using AV in the (near) future and what the main reasons for (not) using these technologies are. By using behavioral modeling and a modified UTAUT model the main...
master thesis 2017
document
Xu, J. (author)
doctoral thesis 2015
document
Ozkale, B. (author)
Recently, some retail stores face large amount of cash transactions and thus leave traditional cash handling organizations to improve the efficiency. When switching to a new cash management system, retailers need forecasts of cash payment volumes. Two airport retailers, Schiphol Airport Retail (SAR) & Kappe are among those companies that seek...
master thesis 2013
document
Taal, J.R. (author), Chen, Z. (author), He, Y. (author), Lagendijk, R.I.L. (author)
Wireless and Internet video applications are inherently subjected to bit errors and packet errors, respectively. This is especially so if constraints on the end-to-end compression and transmission latencies are imposed. Therefore, it is necessary to develop methods to optimize the video compression parameters and the rate allocation of these...
journal article 2004
Searched for: subject%3A%22behavior%255C+model%22
(1 - 12 of 12)