Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (5)
  • Open Access

    ARTICLE

    Privacy-Preserving Gender-Based Customer Behavior Analytics in Retail Spaces Using Computer Vision

    Ginanjar Suwasono Adi1, Samsul Huda2,*, Griffani Megiyanto Rahmatullah3, Dodit Suprianto1, Dinda Qurrota Aini Al-Sefy3, Ivon Sandya Sari Putri4, Lalu Tri Wijaya Nata Kusuma5

    CMC-Computers, Materials & Continua, Vol.86, No.1, pp. 1-23, 2026, DOI:10.32604/cmc.2025.068619 - 10 November 2025

    Abstract In the competitive retail industry of the digital era, data-driven insights into gender-specific customer behavior are essential. They support the optimization of store performance, layout design, product placement, and targeted marketing. However, existing computer vision solutions often rely on facial recognition to gather such insights, raising significant privacy and ethical concerns. To address these issues, this paper presents a privacy-preserving customer analytics system through two key strategies. First, we deploy a deep learning framework using YOLOv9s, trained on the RCA-TVGender dataset. Cameras are positioned perpendicular to observation areas to reduce facial visibility while maintaining accurate More >

  • Open Access

    REVIEW

    Implementing a Cybersecurity Continuous User Evaluation Program

    Josh McNett1, Jackie McNett2,*

    Journal of Cyber Security, Vol.7, pp. 279-306, 2025, DOI:10.32604/jcs.2025.067514 - 25 July 2025

    Abstract This review explores the implementation and effectiveness of continuous evaluation programs in managing and mitigating insider threats within organizations. Continuous evaluation programs involve the ongoing assessment of individuals’ suitability for access to sensitive information and resources by monitoring their behavior, access patterns, and other indicators in real-time. The review was conducted using a comprehensive search across various academic and professional databases, including IEEE Xplore, SpringerLink, and Google Scholar and papers were selected from a time span of 2015–2023. The review outlines the importance of defining the scope and objectives of such programs, which should include… More >

  • Open Access

    ARTICLE

    Cyberattack Detection Framework Using Machine Learning and User Behavior Analytics

    Abdullah Alshehri1,*, Nayeem Khan1, Ali Alowayr1, Mohammed Yahya Alghamdi2

    Computer Systems Science and Engineering, Vol.44, No.2, pp. 1679-1689, 2023, DOI:10.32604/csse.2023.026526 - 15 June 2022

    Abstract This paper proposes a novel framework to detect cyber-attacks using Machine Learning coupled with User Behavior Analytics. The framework models the user behavior as sequences of events representing the user activities at such a network. The represented sequences are then fitted into a recurrent neural network model to extract features that draw distinctive behavior for individual users. Thus, the model can recognize frequencies of regular behavior to profile the user manner in the network. The subsequent procedure is that the recurrent neural network would detect abnormal behavior by classifying unknown behavior to either regular or… More >

  • Open Access

    ARTICLE

    User Behavior Traffic Analysis Using a Simplified Memory-Prediction Framework

    Rahmat Budiarto1,*, Ahmad A. Alqarni1, Mohammed Y. Alzahrani1, Muhammad Fermi Pasha2, Mohamed Fazil Mohamed Firdhous3, Deris Stiawan4

    CMC-Computers, Materials & Continua, Vol.70, No.2, pp. 2679-2698, 2022, DOI:10.32604/cmc.2022.019847 - 27 September 2021

    Abstract As nearly half of the incidents in enterprise security have been triggered by insiders, it is important to deploy a more intelligent defense system to assist enterprises in pinpointing and resolving the incidents caused by insiders or malicious software (malware) in real-time. Failing to do so may cause a serious loss of reputation as well as business. At the same time, modern network traffic has dynamic patterns, high complexity, and large volumes that make it more difficult to detect malware early. The ability to learn tasks sequentially is crucial to the development of artificial intelligence.… More >

  • Open Access

    ARTICLE

    Sales Prediction and Product Recommendation Model Through User Behavior Analytics

    Xian Zhao, Pantea Keikhosrokiani*

    CMC-Computers, Materials & Continua, Vol.70, No.2, pp. 3855-3874, 2022, DOI:10.32604/cmc.2022.019750 - 27 September 2021

    Abstract The COVID-19 has brought us unprecedented difficulties and thousands of companies have closed down. The general public has responded to call of the government to stay at home. Offline retail stores have been severely affected. Therefore, in order to transform a traditional offline sales model to the B2C model and to improve the shopping experience, this study aims to utilize historical sales data for exploring, building sales prediction and recommendation models. A novel data science life-cycle and process model with Recency, Frequency, and Monetary (RFM) analysis method with the combination of various analytics algorithms are… More >

Displaying 1-10 on page 1 of 5. Per Page