Security in Physical Environments : Algorithms and System for Automated Detection of Suspicious Activity
暂无分享,去创建一个
[1] Jeffrey Posluns,et al. Snort 2.0 Intrusion Detection , 2003 .
[2] Hartmut Pohl,et al. RFID security , 2004, Inf. Secur. Tech. Rep..
[3] Salvatore J. Stolfo,et al. A data mining framework for building intrusion detection models , 1999, Proceedings of the 1999 IEEE Symposium on Security and Privacy (Cat. No.99CB36344).
[4] Yiguo Qiao,et al. Anomaly intrusion detection method based on HMM , 2002 .
[5] Simon Fong,et al. Smart card-based irregular access patterns detection system , 2004, IEEE International Conference on e-Technology, e-Commerce and e-Service, 2004. EEE '04. 2004.
[6] Shoji Kurakake,et al. Ubiquitous sensors based human behavior modeling and recognition using a spatio-temporal representation of user states , 2004, 18th International Conference on Advanced Information Networking and Applications, 2004. AINA 2004..
[7] Eugene H. Spafford,et al. A PATTERN MATCHING MODEL FOR MISUSE INTRUSION DETECTION , 1994 .
[8] Lawrence B. Holder,et al. Graph-Based Data Mining , 2000, IEEE Intell. Syst..
[9] Zhang Ning-rong. An Efficient Mining Algorithm for Frequent Pattern in Intrusion Detection , 2005 .
[10] Scooter Willis Computer. A Passive RFID Information Grid for Location and Proximity Sensing for the Blind User , 2004 .
[11] Yunhao Liu,et al. LANDMARC: Indoor Location Sensing Using Active RFID , 2004, Proceedings of the First IEEE International Conference on Pervasive Computing and Communications, 2003. (PerCom 2003)..
[12] Leonid Portnoy,et al. Intrusion detection with unlabeled data using clustering , 2000 .
[13] Sushil Jajodia,et al. ADAM: Detecting Intrusions by Data Mining , 2001 .