Residential College | false |
Status | 已發表Published |
Detection of Suspicious Patterns in Secure Physical Environments | |
Pengfan Yan; Robert P. Biuk-Aghai; Simon Fong; Yain-Whar Si | |
2007-12-03 | |
Conference Name | The 4th International Conference on Information Technology and Applications (ICITA 2007) |
Source Publication | Fourth International Conference on Information Technology and Applications, ICITA 2007 |
Pages | 40-45 |
Conference Date | January 2007 |
Conference Place | Sydney, Australia |
Abstract | Security in physical environments has become increasingly important in the wake of terror and criminal activity, particularly over the past decade. One of the challenges is to identify activities that may not be outright illegal or breaches of security, but that are suspicious, i.e. where there is a possibility that these activities may lead to breaches of security. Technology such as RFH) is used to track the access and movement of people in highly security physical environments. This paper presents methods of detecting patterns of suspicious activity in logs collected by such physical access control systems. It also outlines methods of predicting future suspicious activities based on such logs. |
Keyword | Data Mining Rfid Security |
URL | View the original |
Indexed By | 其他 |
Language | 英語English |
Fulltext Access | |
Document Type | Conference paper |
Collection | DEPARTMENT OF COMPUTER AND INFORMATION SCIENCE |
Affiliation | Department of Computer and Information Science, Faculty of Science and Technology, University of Macau, Macau |
First Author Affilication | Faculty of Science and Technology |
Recommended Citation GB/T 7714 | Pengfan Yan,Robert P. Biuk-Aghai,Simon Fong,et al. Detection of Suspicious Patterns in Secure Physical Environments[C], 2007, 40-45. |
APA | Pengfan Yan., Robert P. Biuk-Aghai., Simon Fong., & Yain-Whar Si (2007). Detection of Suspicious Patterns in Secure Physical Environments. Fourth International Conference on Information Technology and Applications, ICITA 2007, 40-45. |
Files in This Item: | There are no files associated with this item. |
Items in the repository are protected by copyright, with all rights reserved, unless otherwise indicated.
Edit Comment