Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 218,268,536 papers from all fields of science
Search
Sign In
Create Free Account
Intruder detection
In information security, intruder detection is the art of detecting intruders behind attacks as unique persons. This technique tries to identify the…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
6 relations
Biometrics
Data mining
Information security
Intrusion detection system
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2018
Highly Cited
2018
Cooperative Authentication in Underwater Acoustic Sensor Networks
R. Diamant
,
P. Casari
,
S. Tomasin
IEEE Transactions on Wireless Communications
2018
Corpus ID: 46972953
With the growing use of underwater acoustic communications (UWAC) for both industrial and military operations, there is a need to…
Expand
Highly Cited
2015
Highly Cited
2015
Multi-modal decision fusion for continuous authentication
Lex Fridman
,
Ariel Stolerman
,
+4 authors
Moshe Kam
Computers & electrical engineering
2015
Corpus ID: 12404697
Review
2015
Review
2015
A cloud based and Android supported scalable home automation system
I. Korkmaz
,
S. K. Metin
,
Alper Gurek
,
C. Gur
,
Cagri Gurakin
,
Mustafa Akdeniz
Computers & electrical engineering
2015
Corpus ID: 12752704
2013
2013
Decision Fusion for Multimodal Active Authentication
Alex Fridman
,
Ariel Stolerman
,
+4 authors
Moshe Kam
IT Professional
2013
Corpus ID: 8832027
The authors apply a decision fusion architecture on a collection of behavioral biometric sensors using keystroke dynamics, mouse…
Expand
2012
2012
Intelligent Home Monitoring Using RSSI in Wireless Sensor Networks
F. Kausar
2012
Corpus ID: 50533683
Automated systems have become deeply involved in our daily life these days. Every day new researches and solutions are introduced…
Expand
Highly Cited
2008
Highly Cited
2008
Intruder detection using a wireless sensor network with an intelligent mobile robot response
Yuanyuan Li
,
L. Parker
IEEE SoutheastCon
2008
Corpus ID: 11384103
In this paper, we present an intruder detection system that uses a wireless sensor network and mobile robots. The sensor network…
Expand
Highly Cited
2006
Highly Cited
2006
Geometric entropy minimization (GEM) for anomaly detection and localization
A. Hero
Neural Information Processing Systems
2006
Corpus ID: 2645495
We introduce a novel adaptive non-parametric anomaly detection approach, called GEM, that is based on the minimal covering…
Expand
Highly Cited
2005
Highly Cited
2005
iBotGuard: an Internet-based Intelligent Robot security system using Invariant Face Recognition against intruder
J. Liu
,
M. Wang
,
B. Feng
IEEE Transactions on Systems Man and Cybernetics…
2005
Corpus ID: 3758775
One crucial application of intelligent robotic systems is remote surveillance using a security robot. A fundamental need in…
Expand
Highly Cited
2004
Highly Cited
2004
Centibots: Very Large Scale Distributed Robotic Teams
C. Ortiz
,
K. Konolige
,
+8 authors
D. Schulz
AAAI Conference on Artificial Intelligence
2004
Corpus ID: 759866
We describe the development of Centibots, a framework for very large teams of robots that are able to perceive, explore, plan and…
Expand
Review
2004
Review
2004
In-building intruder detection for WLAN access
A. Hatami
,
K. Pahlavan
PLANS . Position Location and Navigation…
2004
Corpus ID: 28692741
In recent years wireless local area network (WLAN) has become a popular choice for local area networking in both enterprise and…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE