Intrusion Detection Methods Based on Incomplete RFID Traces