Residential Collegefalse
Status已發表Published
Detection of Suspicious Patterns in Secure Physical Environments
Pengfan Yan; Robert P. Biuk-Aghai; Simon Fong; Yain-Whar Si
2007-12-03
Conference NameThe 4th International Conference on Information Technology and Applications (ICITA 2007)
Source PublicationFourth International Conference on Information Technology and Applications, ICITA 2007
Pages40-45
Conference DateJanuary 2007
Conference PlaceSydney, Australia
Abstract

Security in physical environments has become increasingly important in the wake of terror and criminal activity, particularly over the past decade. One of the challenges is to identify activities that may not be outright illegal or breaches of security, but that are suspicious, i.e. where there is a possibility that these activities may lead to breaches of security. Technology such as RFH) is used to track the access and movement of people in highly security physical environments. This paper presents methods of detecting patterns of suspicious activity in logs collected by such physical access control systems. It also outlines methods of predicting future suspicious activities based on such logs.

KeywordData Mining Rfid Security
URLView the original
Indexed By其他
Language英語English
Fulltext Access
Document TypeConference paper
CollectionDEPARTMENT OF COMPUTER AND INFORMATION SCIENCE
AffiliationDepartment of Computer and Information Science, Faculty of Science and Technology, University of Macau, Macau
First Author AffilicationFaculty of Science and Technology
Recommended Citation
GB/T 7714
Pengfan Yan,Robert P. Biuk-Aghai,Simon Fong,et al. Detection of Suspicious Patterns in Secure Physical Environments[C], 2007, 40-45.
APA Pengfan Yan., Robert P. Biuk-Aghai., Simon Fong., & Yain-Whar Si (2007). Detection of Suspicious Patterns in Secure Physical Environments. Fourth International Conference on Information Technology and Applications, ICITA 2007, 40-45.
Files in This Item:
There are no files associated with this item.
Related Services
Recommend this item
Bookmark
Usage statistics
Export to Endnote
Google Scholar
Similar articles in Google Scholar
[Pengfan Yan]'s Articles
[Robert P. Biuk-Aghai]'s Articles
[Simon Fong]'s Articles
Baidu academic
Similar articles in Baidu academic
[Pengfan Yan]'s Articles
[Robert P. Biuk-Aghai]'s Articles
[Simon Fong]'s Articles
Bing Scholar
Similar articles in Bing Scholar
[Pengfan Yan]'s Articles
[Robert P. Biuk-Aghai]'s Articles
[Simon Fong]'s Articles
Terms of Use
No data!
Social Bookmark/Share
All comments (0)
No comment.
 

Items in the repository are protected by copyright, with all rights reserved, unless otherwise indicated.