Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 217,275,345 papers from all fields of science
Search
Sign In
Create Free Account
Intruder detection
In information security, intruder detection is the art of detecting intruders behind attacks as unique persons. This technique tries to identify the…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
6 relations
Biometrics
Data mining
Information security
Intrusion detection system
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2018
Highly Cited
2018
Indoor Person Identification Using a Low-Power FMCW Radar
Baptist Vandersmissen
,
Nicolas Knudde
,
+4 authors
T. Dhaene
IEEE Transactions on Geoscience and Remote…
2018
Corpus ID: 49410307
Contemporary surveillance systems mainly use video cameras as their primary sensor. However, video cameras possess fundamental…
Expand
Highly Cited
2018
Highly Cited
2018
Cooperative Authentication in Underwater Acoustic Sensor Networks
R. Diamant
,
P. Casari
,
S. Tomasin
IEEE Transactions on Wireless Communications
2018
Corpus ID: 46972953
With the growing use of underwater acoustic communications (UWAC) for both industrial and military operations, there is a need to…
Expand
Highly Cited
2015
Highly Cited
2015
Multi-modal decision fusion for continuous authentication
Lex Fridman
,
Ariel Stolerman
,
+4 authors
Moshe Kam
Computers & electrical engineering
2015
Corpus ID: 12404697
Review
2015
Review
2015
A cloud based and Android supported scalable home automation system
I. Korkmaz
,
S. K. Metin
,
Alper Gurek
,
C. Gur
,
Cagri Gurakin
,
Mustafa Akdeniz
Computers & electrical engineering
2015
Corpus ID: 12752704
2013
2013
Decision Fusion for Multimodal Active Authentication
Alex Fridman
,
Ariel Stolerman
,
+4 authors
Moshe Kam
IT Professional
2013
Corpus ID: 8832027
The authors apply a decision fusion architecture on a collection of behavioral biometric sensors using keystroke dynamics, mouse…
Expand
2012
2012
Intelligent Home Monitoring Using RSSI in Wireless Sensor Networks
F. Kausar
2012
Corpus ID: 50533683
Automated systems have become deeply involved in our daily life these days. Every day new researches and solutions are introduced…
Expand
Review
2008
Review
2008
A survey of game-theoretic approaches in wireless sensor networks
R. Machado
,
S. Tekinay
Comput. Networks
2008
Corpus ID: 33287155
Highly Cited
2006
Highly Cited
2006
On the Intruder Detection for Sinkhole Attack in Wireless Sensor Networks
E. Ngai
,
Jiangchuan Liu
,
Michael R. Lyu
IEEE International Conference on Communications
2006
Corpus ID: 8865281
In a wireless sensor network, multiple nodes would send sensor readings to a base station for further processing. It is well…
Expand
Highly Cited
2005
Highly Cited
2005
iBotGuard: an Internet-based Intelligent Robot security system using Invariant Face Recognition against intruder
J. Liu
,
M. Wang
,
B. Feng
IEEE Transactions on Systems Man and Cybernetics…
2005
Corpus ID: 3758775
One crucial application of intelligent robotic systems is remote surveillance using a security robot. A fundamental need in…
Expand
Highly Cited
2004
Highly Cited
2004
Centibots: Very Large Scale Distributed Robotic Teams
C. Ortiz
,
K. Konolige
,
+8 authors
D. Schulz
AAAI Conference on Artificial Intelligence
2004
Corpus ID: 759866
We describe the development of Centibots, a framework for very large teams of robots that are able to perceive, explore, plan and…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE