Skip to search formSkip to main contentSkip to account menu

Intruder detection

In information security, intruder detection is the art of detecting intruders behind attacks as unique persons. This technique tries to identify the… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2018
Highly Cited
2018
Contemporary surveillance systems mainly use video cameras as their primary sensor. However, video cameras possess fundamental… 
Highly Cited
2018
Highly Cited
2018
With the growing use of underwater acoustic communications (UWAC) for both industrial and military operations, there is a need to… 
2013
2013
The authors apply a decision fusion architecture on a collection of behavioral biometric sensors using keystroke dynamics, mouse… 
2012
2012
Automated systems have become deeply involved in our daily life these days. Every day new researches and solutions are introduced… 
Review
2008
Highly Cited
2006
Highly Cited
2006
In a wireless sensor network, multiple nodes would send sensor readings to a base station for further processing. It is well… 
Highly Cited
2005
Highly Cited
2005
One crucial application of intelligent robotic systems is remote surveillance using a security robot. A fundamental need in… 
Highly Cited
2004
Highly Cited
2004
We describe the development of Centibots, a framework for very large teams of robots that are able to perceive, explore, plan and…