HBML: A Language for Quantitative Behavioral Modeling in the Human Terrain

  • Nils F Sandell
  • Robert Savell
  • David Twardowski
  • George Cybenko
Conference paper


Human and machine behavioral modeling and analysis are active areas of study in a variety of domains of current interest. Notions of what behavior means as well as how behaviors can be represented, compared, shared, integrated and analyzed are not well established and vary from domain to domain, even from researcher to researcher. Our current research suggests that a common framework for the systematic analysis of behaviors of people, networks, and engineered systems is both possible and much needed. The main contribution of this paper is the presentation of the Human Behavioral Modeling Language (HBML). We believe that the proposed schema and framework can support behavioral modeling and analysis by large-scale computational systems across a variety of domains.


Behavioral Modeling Anomaly Detection Order Behavior Insider Threat Functional Subgroup 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    V. Berk and G. Cybenko. Process query systems. IEEE Computer, pages 62–70, January 2007.Google Scholar
  2. 2.
    V. Berk and N. Fox. Process query systems for network security monitoring. In Proceedings of the SPIE 0277-786X Defense and Security Symposium, Orlando, Florida, March/April 2005.Google Scholar
  3. 3.
    W. Chung et al. Dynamics of process-based social networks. In Sensors, and Command, Control, Communications, and Intelligence (C3I) Technologies for Homeland Security and Homeland Defense V, Orlando, FL, April 2006.Google Scholar
  4. 4.
    G. Cybenko, V. H. Berk, V. Crespi, G. Jiang, and R. S. Gray. An overview of process query systems. In Proc. SPIE 5403: Sensors, and Command, Control, Communications, and Intelligence, pages 183–197, 2004.Google Scholar
  5. 5.
    S. Das. Intelligent market-making in artificial financial markets. PhD Thesis, Dpmt EECS, MIT, 2005.Google Scholar
  6. 6.
    R. W. Lucky. Silicon Dreams. St. Martin's Press, New York, 1989.Google Scholar
  7. 7.
    A. Madhavan. Market microstructure: A survey. Journal of Financial Markets, 3:205–258, 2000.CrossRefGoogle Scholar
  8. 8.
    S. Oh, L. Schenato, P. Chen, and S. Sastry. A scalable real-time multiple-target tracking algorithm for sensor networks. University of California, Berkeley, Technical Report UCB//ERL M05/9, Feb. 2005.Google Scholar
  9. 9.
    A. Putt. Putt's Law and the Successful Technocrat: How to Win in the Information Age. Wiley-IEEE Press, 2006.Google Scholar
  10. 10.
    R. Savell and G. Cybenko. Mining for social processes in intelligence data streams. Social Computing, Jan 2008.Google Scholar
  11. 11.
    S.Stolfo et al. Insider Attack and Cyber Security: Beyond the Hacker. Springer, New York, March, 2008.Google Scholar
  12. 12.
    D. Twardowski, R. Savell, and G. Cybenko. Process learning of network interactions in market microstructures. submitted for publication, preprint available, 2008.Google Scholar
  13. 13.
    B. Warrender and S. Forrest. Detecting intrusion using system calls: alternative data models. In 1999 IEEE Symp. on Security and Privacy, pages 133–145, Oakland, CA, 1999.Google Scholar

Copyright information

© Springer-Verlag US 2009

Authors and Affiliations

  • Nils F Sandell
    • 1
  • Robert Savell
    • 1
  • David Twardowski
    • 1
  • George Cybenko
    • 1
  1. 1.Thayer School, Dartmouth CollegeHanover

Personalised recommendations