Intruder detection

In information security, intruder detection is the art of detecting intruders behind attacks as unique persons. This technique tries to identify the… (More)
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2014
2014
Nowadays, people are always concerned about security, not only about their own but also of their goods. Trying to solve this… (More)
  • figure 1
  • figure 2
  • figure 5
  • figure 3
  • figure 4
Is this relevant?
2014
2014
Many types of automated visual surveillance systems have been presented in the recent literature. Most of the schemes require… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 6
Is this relevant?
2012
2012
We propose a new algorithm based on machine learning techniques for automatic intruder detection in visual surveillance networks… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2010
2010
In November 2009, RESON successfully demonstrated the capability of an integrated underwater intruder detection system composed… (More)
  • figure 2
  • figure 1
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2008
2008
This paper presents an intruder detection system which consists of a Zigbee sensor network and an autonomous mobile robot… (More)
Is this relevant?
Highly Cited
2007
Highly Cited
2007
In a wireless sensor network, multiple nodes would send sensor readings to a base station for further processing. It is known… (More)
  • figure 1
  • table 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
2007
2007
Sensor networks are effective tools for detecting intruders. However, the standard technique of placing sensors in a perimeter is… (More)
  • figure 1
  • figure 2
  • figure 5
  • figure 4
  • figure 3
Is this relevant?
Highly Cited
2006
Highly Cited
2006
In a wireless sensor network, multiple nodes would send sensor readings to a base station for further processing. It is well… (More)
  • figure 1
  • table I
  • figure 2
  • figure 5
  • figure 6
Is this relevant?
2005
2005
This paper propose a new algorithm to detect the intruder in room. The basic idea of the proposed method is to estimate the… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2004
2004
Nowadays, the installation of affordable automation and security system for residential and office usage has been a necessity in… (More)
  • figure 1
  • table 1
Is this relevant?