Skip to search formSkip to main contentSkip to account menu

Intruder detection

In information security, intruder detection is the art of detecting intruders behind attacks as unique persons. This technique tries to identify the… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2018
Highly Cited
2018
With the growing use of underwater acoustic communications (UWAC) for both industrial and military operations, there is a need to… 
2013
2013
The authors apply a decision fusion architecture on a collection of behavioral biometric sensors using keystroke dynamics, mouse… 
2012
2012
Automated systems have become deeply involved in our daily life these days. Every day new researches and solutions are introduced… 
Highly Cited
2008
Highly Cited
2008
In this paper, we present an intruder detection system that uses a wireless sensor network and mobile robots. The sensor network… 
Highly Cited
2006
Highly Cited
2006
We introduce a novel adaptive non-parametric anomaly detection approach, called GEM, that is based on the minimal covering… 
Highly Cited
2005
Highly Cited
2005
One crucial application of intelligent robotic systems is remote surveillance using a security robot. A fundamental need in… 
Highly Cited
2004
Highly Cited
2004
We describe the development of Centibots, a framework for very large teams of robots that are able to perceive, explore, plan and… 
Review
2004
Review
2004
In recent years wireless local area network (WLAN) has become a popular choice for local area networking in both enterprise and…