Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 234,061,349 papers from all fields of science
Search
Sign In
Create Free Account
Intruder detection
In information security, intruder detection is the art of detecting intruders behind attacks as unique persons. This technique tries to identify the…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
6 relations
Biometrics
Data mining
Information security
Intrusion detection system
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
Implementation of a Remote Real-Time Surveillance Security System for Intruder Detection
Jiang Landa
,
Chu Jun
,
Miao Jun
International Conference on Measuring Technology…
2017
Corpus ID: 15212766
Family security is one of the key goals of a digital home system. At present, webcams are widely used in home remote monitoring…
Expand
2016
2016
Embedded home surveillance system
Shahnewaz Ali
19th International Conference on Computer and…
2016
Corpus ID: 13170105
Video surveillance system is widely adopted in order to secure life. This paper presents embedded home surveillance systems to…
Expand
2015
2015
Enhancing Home Security Using SMS-based Intruder Detection System
2015
Corpus ID: 212440874
: Lifestyle in the modern society along with human behavior and thinking is changing dramatically with the advancement of…
Expand
2015
2015
SWARM BASED DEFENSE TECHNIQUE FOR JAMMING ATTACK
2015
Corpus ID: 88502860
Wireless Sensor Networks are vulnerable to physical layer attacks like jamming attack. In order to detect the pulse jamming…
Expand
2013
2013
Data clustering for the block profile method of intruder detection
Tomasz E. Wesolowski
,
P. Kudlacik
2013
Corpus ID: 59908474
The paper concerns the problem of computer security and intrusion detection. In particular the problem of detecting the…
Expand
2013
2013
Misdirection attack in WSN: Topological analysis and an algorithm for delay and throughput prediction
R. S. Sachan
,
M. Wazid
,
D. P. Singh
,
Avita Katal
,
R. Goudar
International Symposium on Combinatorial…
2013
Corpus ID: 18255069
Wireless Sensor Network (WSN) has a great potential to be deployed in wide range of applications like consumer, industrial and…
Expand
Review
2010
Review
2010
Wireless sensor networks for human intruder detection
V. Sharma
,
R. Sundaresan
,
+28 authors
Amulya Ratna Swain
2010
Corpus ID: 14392905
In this paper we report on the outcomes of a research and demonstration project on human intrusion detection in a large secure…
Expand
2009
2009
Improved Intruder Detection Using Seismic Sensors and Adaptive Noise Cancellation
W. Audette
,
D. Kynor
,
J. Wilbur
2009
Corpus ID: 10440252
Maintenance of a secure perimeter around military camps is a significant problem. Detecting foot-borne intruders is a…
Expand
1996
1996
Automatic video surveillance with intelligent scene monitoring and intruder detection
J. Freer
,
B. J. Beggs
,
H. Fernandez-Canque
,
F. Chevrier
,
A. Goryashko
30th Annual International Carnahan Conference on…
1996
Corpus ID: 56519512
We present a digital image processing based approach for the automatic identification and analysis of moving objects (primarily…
Expand
1992
1992
Image Processing Method for Intruder Detection around Power Line Towers
M. Kaneta
,
H. Kanoh
,
K. Kanemaru
,
T. Nagai
IAPR International Workshop on Machine Vision…
1992
Corpus ID: 1201740
A method of detecting intruders around pow~r line tow~rs using an image processing technique has bcen developed. Outdoor images…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE