Residential Collegefalse
Status已發表Published
Mining suspicious patterns in physical environment
Simon Fong
2007-09-27
Conference NameInternational Workshop on Anti-counterfeiting, Security, and Identification
Source Publication2007 IEEE International Workshop on Anti-counterfeiting, Security, Identification, ASID
Pages419-422
Conference DateAPR 16-18, 2007
Conference PlaceXiamen, PEOPLES R CHINA
Abstract

In the view of escalating threat in homeland security, it is imperative to have an automated detection system that can pick up suspicious patterns of human movement in physical environments. It can give a forewarning before a planned attack happens or an ultimate security is breached. In the past, significant research on Intrusion Detection Systems was established, but limited to virtual environments like computer networks and operating systems. In this paper, we proposed a general mining model for detecting suspicious patterns in physical environment. Suspicious patterns are subtle, relatively difficult to define and detect. Experiments are currently being conducted.

KeywordData-mining Intrusion Detection Physical Environment Security
DOI10.1109/IWASID.2007.373669
URLView the original
Indexed ByCPCI-S
Language英語English
WOS Research AreaEngineering ; Telecommunications
WOS SubjectEngineering, Electrical & Electronic ; Telecommunications
WOS IDWOS:000250042400094
Scopus ID2-s2.0-34548855690
Fulltext Access
Citation statistics
Document TypeConference paper
CollectionDEPARTMENT OF COMPUTER AND INFORMATION SCIENCE
AffiliationFaculty of Science and Technology, University of Macao, Macao, China
First Author AffilicationFaculty of Science and Technology
Recommended Citation
GB/T 7714
Simon Fong. Mining suspicious patterns in physical environment[C], 2007, 419-422.
APA Simon Fong.(2007). Mining suspicious patterns in physical environment. 2007 IEEE International Workshop on Anti-counterfeiting, Security, Identification, ASID, 419-422.
Files in This Item:
There are no files associated with this item.
Related Services
Recommend this item
Bookmark
Usage statistics
Export to Endnote
Google Scholar
Similar articles in Google Scholar
[Simon Fong]'s Articles
Baidu academic
Similar articles in Baidu academic
[Simon Fong]'s Articles
Bing Scholar
Similar articles in Bing Scholar
[Simon Fong]'s Articles
Terms of Use
No data!
Social Bookmark/Share
All comments (0)
No comment.
 

Items in the repository are protected by copyright, with all rights reserved, unless otherwise indicated.