Residential College | false |
Status | 已發表Published |
Mining suspicious patterns in physical environment | |
Simon Fong | |
2007-09-27 | |
Conference Name | International Workshop on Anti-counterfeiting, Security, and Identification |
Source Publication | 2007 IEEE International Workshop on Anti-counterfeiting, Security, Identification, ASID |
Pages | 419-422 |
Conference Date | APR 16-18, 2007 |
Conference Place | Xiamen, PEOPLES R CHINA |
Abstract | In the view of escalating threat in homeland security, it is imperative to have an automated detection system that can pick up suspicious patterns of human movement in physical environments. It can give a forewarning before a planned attack happens or an ultimate security is breached. In the past, significant research on Intrusion Detection Systems was established, but limited to virtual environments like computer networks and operating systems. In this paper, we proposed a general mining model for detecting suspicious patterns in physical environment. Suspicious patterns are subtle, relatively difficult to define and detect. Experiments are currently being conducted. |
Keyword | Data-mining Intrusion Detection Physical Environment Security |
DOI | 10.1109/IWASID.2007.373669 |
URL | View the original |
Indexed By | CPCI-S |
Language | 英語English |
WOS Research Area | Engineering ; Telecommunications |
WOS Subject | Engineering, Electrical & Electronic ; Telecommunications |
WOS ID | WOS:000250042400094 |
Scopus ID | 2-s2.0-34548855690 |
Fulltext Access | |
Citation statistics | |
Document Type | Conference paper |
Collection | DEPARTMENT OF COMPUTER AND INFORMATION SCIENCE |
Affiliation | Faculty of Science and Technology, University of Macao, Macao, China |
First Author Affilication | Faculty of Science and Technology |
Recommended Citation GB/T 7714 | Simon Fong. Mining suspicious patterns in physical environment[C], 2007, 419-422. |
APA | Simon Fong.(2007). Mining suspicious patterns in physical environment. 2007 IEEE International Workshop on Anti-counterfeiting, Security, Identification, ASID, 419-422. |
Files in This Item: | There are no files associated with this item. |
Items in the repository are protected by copyright, with all rights reserved, unless otherwise indicated.
Edit Comment