Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 226,834,045 papers from all fields of science
Search
Sign In
Create Free Account
Intruder detection
In information security, intruder detection is the art of detecting intruders behind attacks as unique persons. This technique tries to identify the…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
6 relations
Biometrics
Data mining
Information security
Intrusion detection system
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Review
2015
Review
2015
A cloud based and Android supported scalable home automation system
I. Korkmaz
,
S. K. Metin
,
Alper Gurek
,
C. Gur
,
Cagri Gurakin
,
Mustafa Akdeniz
Computers & electrical engineering
2015
Corpus ID: 12752704
2012
2012
The k-barrier coverage mechanism in Wireless Visual Sensor Networks
Chih-Yung Chang
,
Chih-Yao Hsiao
,
Chao-Tsun Chang
IEEE Wireless Communications and Networking…
2012
Corpus ID: 11424211
Wireless Visual Sensor Networks (WVSNs) consist of a set of camera sensor nodes each of which equips with a camera and is capable…
Expand
Review
2010
Review
2010
Wireless sensor networks for human intruder detection
V. Sharma
,
R. Sundaresan
,
+28 authors
Amulya Ratna Swain
2010
Corpus ID: 14392905
In this paper we report on the outcomes of a research and demonstration project on human intrusion detection in a large secure…
Expand
2010
2010
An analytical approach to the deployment quality of surveillance wireless sensor networks considering the effect of jammers and coverage holes
M. Y. Donmez
,
R. Kosar
,
Cem Ersoy
Comput. Networks
2010
Corpus ID: 42153235
2010
2010
Integrated underwater intruder detection system
D. Suchman
,
T. Meurling
International WaterSide Security Conference
2010
Corpus ID: 14707774
In November 2009, RESON successfully demonstrated the capability of an integrated underwater intruder detection system composed…
Expand
2010
2010
Wildlife intruder detection using sounds captured by acoustic sensors
M. Ghiurcau
,
C. Rusu
,
R. Bilcu
IEEE International Conference on Acoustics…
2010
Corpus ID: 367730
In this paper we classify the sounds originated from humans, birds and cars. The motivation of such a classification is to detect…
Expand
2009
2009
Improved Intruder Detection Using Seismic Sensors and Adaptive Noise Cancellation
W. Audette
,
D. Kynor
,
J. Wilbur
2009
Corpus ID: 10440252
Maintenance of a secure perimeter around military camps is a significant problem. Detecting foot-borne intruders is a…
Expand
2006
2006
How to Cheat at Managing Information Security
M. Osborne
,
Paul M. Summitt
2006
Corpus ID: 60874521
2005
2005
Perimeter intruder detection systems performance standard
D. Armstrong
,
C. Peile
Proceedings 39th Annual International Carnahan…
2005
Corpus ID: 11271790
This paper includes discussion of the main high level principles upon which the development of the standards is based. These are…
Expand
1999
1999
Distributed real-time simulation for intruder detection system analysis
Jeffrey S. Smith
,
B. Peters
,
S. E. Jordan
,
M. Snell
WSC'99. Winter Simulation Conference Proceedings…
1999
Corpus ID: 6156028
The paper describes a distributed simulation system developed for evaluation of physical security systems. The work extends…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE