Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 230,218,156 papers from all fields of science
Search
Sign In
Create Free Account
Behavioral clustering
Behavioral clustering is a statistical analysis method used in retailing to identify consumer purchase trends and group stores based on consumer…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
1 relation
Geomarketing
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2020
2020
Behavioral Clustering: A New Approach for Traffic Congestion Evaluation
W. Balzano
,
A. Murano
,
L. Sorrentino
,
Silvia Stranieri
AINA Workshops
2020
Corpus ID: 214764355
Nowadays, the analysis of vehicular ad hoc networks for the evaluation of traffic conditions is a hot research field. One of the…
Expand
2018
2018
Automatic Payload Signature Generation for Accurate Identification of Internet Applications and Application Services
Baraka D. Sija
,
Kyu-Seok Shim
,
Myung-Sup Kim
KSII Transactions on Internet and Information…
2018
Corpus ID: 46893454
The diversity and fast growth of Internet traffic volume are highly influenced by mobile and computer applications being…
Expand
2016
2016
Fractal Clustering and similarity measure: Two new approaches for reducing energy consumption in Wireless Sensor Networks
Fernando R. Almeida
,
Angelo Brayner
,
J. Rodrigues
,
J. Maia
International Conference on Ubiquitous and Future…
2016
Corpus ID: 14193055
Sensor clustering is an efficient strategy to reduce the number of messages flowing in a Wireless Sensor Network (WSN…
Expand
2014
2014
Distinguishing between Web Attacks and Vulnerability Scans Based on Behavioral Characteristics
K. Goseva-Popstojanova
,
Ana Dimitrijevikj
28th International Conference on Advanced…
2014
Corpus ID: 1947843
The number of vulnerabilities and reported attacks on Web systems are showing increasing trends, which clearly illustrate the…
Expand
2013
2013
Behavioral Clustering for Point Processes
Christian Braune
,
C. Borgelt
,
R. Kruse
International Symposium on Intelligent Data…
2013
Corpus ID: 16211262
Groups of parallel point processes may be analyzed with a variety of different goals. Here we consider the case in which one has…
Expand
2013
2013
A Scalable Implementation of Malware Detection Based on Network Connection Behaviors
Liang Shi
,
Jialan Que
,
Zhenyu Zhong
,
Brett Meyer
,
Patrick Crenshaw
,
Yuanchen He
International Conference on Cyber-Enabled…
2013
Corpus ID: 7996262
When hundreds of thousands of applications need to be analyzed within a short period of time, existing static and dynamic malware…
Expand
2012
2012
NetGator: Malware Detection Using Program Interactive Challenges
Brian Schulte
,
Haris Andrianakis
,
Kun Sun
,
A. Stavrou
International Conference on Detection of…
2012
Corpus ID: 17111193
Internet-borne threats have evolved from easy to detect denial of service attacks to zero-day exploits used for targeted…
Expand
2011
2011
Hypergraph Clustering for Better Network Traffic Inspection
Li Pu
,
B. Faltings
International Joint Conference on Artificial…
2011
Corpus ID: 17745569
Networked computing environments are subject to configuration errors, unauthorized users, undesired activities and attacks by…
Expand
2011
2011
Defining malware families based on analyst insights
Jeffrey Gennari
,
David French
IEEE International Conference on Technologies for…
2011
Corpus ID: 13974119
Determining whether arbitrary files are related to known malicious files is often useful in network and host-based defense. Doing…
Expand
Review
2001
Review
2001
Latent groups and cross-level inferences
W. Cho
2001
Corpus ID: 17889933
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE