메뉴 건너뛰기




Volumn , Issue , 2012, Pages 241-253

Individual movement behaviour in secure physical environments: Modeling and detection of suspicious activity

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER PROGRAMMING; COMPUTER SCIENCE;

EID: 84936859064     PISSN: None     EISSN: None     Source Type: Book    
DOI: 10.1007/978-1-4471-2969-1_15     Document Type: Chapter
Times cited : (9)

References (21)
  • 3
    • 85025630499 scopus 로고    scopus 로고
    • Brandenburg University of Technology: Intrusion detection systems list and bibliography. http://www-rnks.informatik.tu-cottbus.de/en/node/209 (2004)
    • (2004)
  • 4
    • 77953651084 scopus 로고    scopus 로고
    • In-depth behavior understanding and use: The behavior informatics approach
    • Cao, L.: In-depth behavior understanding and use: The behavior informatics approach. Inf. Sci. 180,3067-3085 (2010). doi:10.1016/j.ins.2010.03.025
    • (2010) Inf. Sci , vol.180 , pp. 3067-3085
    • Cao, L.1
  • 5
    • 46649101343 scopus 로고    scopus 로고
    • Mining impact-targeted activity patterns in imbalanced data
    • Cao, L., Zhao, Y., Zhang, C.: Mining impact-targeted activity patterns in imbalanced data. IEEE Trans. Knowl. Data Eng. 20, 1053-1066 (2008). doi:10.1109/TKDE.2007.190635
    • (2008) IEEE Trans. Knowl. Data Eng , vol.20 , pp. 1053-1066
    • Cao, L.1    Zhao, Y.2    Zhang, C.3
  • 6
    • 38549100388 scopus 로고    scopus 로고
    • Activity mining: From activities to actions
    • Cao, L., Zhao, Y., Zhang, C., Zhang, H.: Activity mining: From activities to actions. Int. J. Inform. Technol. Decis. Mak. 7(02), 259-273 (2008). doi:10.1142/S0219622008002934
    • (2008) Int. J. Inform. Technol. Decis. Mak , vol.7 , Issue.2 , pp. 259-273
    • Cao, L.1    Zhao, Y.2    Zhang, C.3    Zhang, H.4
  • 7
    • 0033899045 scopus 로고    scopus 로고
    • Graph-based data mining
    • Cook, D.J., Holder, L.B.: Graph-based data mining. IEEE Intell. Syst. 15(2), 32-41 (2000)
    • (2000) IEEE Intell. Syst , vol.15 , Issue.2 , pp. 32-41
    • Cook, D.J.1    Holder, L.B.2
  • 8
    • 85025674948 scopus 로고    scopus 로고
    • Intellitactics, Inc.: Intellitactics security manager. http://www.intellitactics.com/int/products/securitymanager.asp (2009)
    • (2009)
  • 9
    • 3042631500 scopus 로고    scopus 로고
    • Ubiquitous sensors based human behavior modeling and recognition using a spatio-temporal representation of user states
    • IEEE Press, New York
    • Isoda, Y., Kurakake, S., Nakano, H.: Ubiquitous sensors based human behavior modeling and recognition using a spatio-temporal representation of user states. In: 18th International Conference on Advanced Information Networking and Applications, pp. 512-517. IEEE Press, New York (2004)
    • (2004) 18Th International Conference on Advanced Information Networking and Applications , pp. 512-517
    • Isoda, Y.1    Kurakake, S.2    Nakano, H.3
  • 11
    • 84940104123 scopus 로고    scopus 로고
    • A data mining framework for building intrusion detection models
    • IEEE Press, New York
    • Lee, W., Stolfo, S.J., Mok, K.W.: A data mining framework for building intrusion detection models. In: IEEE Symposium on Security and Privacy, pp. 120-132. IEEE Press, New York (1999)
    • (1999) IEEE Symposium on Security and Privacy , pp. 120-132
    • Lee, W.1    Stolfo, S.J.2    Mok, K.W.3
  • 15
    • 0141499742 scopus 로고    scopus 로고
    • Undergraduate thesis, Data Mining Lab, Department of Computer Science, Columbia University
    • Portnoy, L.: Intrusion detection with unlabeled data using clustering. Undergraduate thesis, Data Mining Lab, Department of Computer Science, Columbia University (2000)
    • (2000) Intrusion Detection with Unlabeled Data Using Clustering
    • Portnoy, L.1
  • 18
    • 85025589084 scopus 로고    scopus 로고
    • Trend Micro, Inc.: OSSEC manual. http://www.ossec.net/main/manual (2009)
    • (2009)
  • 19
    • 36448973171 scopus 로고    scopus 로고
    • Cctv: Constant cameras track violators
    • US Department of Justice
    • US Department of Justice: CCTV: Constant cameras track violators. Natl. Inst. Justice J. 249, 16-23 (2003)
    • (2003) Natl. Inst. Justice J , vol.249 , pp. 16-23
  • 20
    • 85025637560 scopus 로고    scopus 로고
    • Wikipedia contributors: Protocol-based intrusion detection system. http://en.wikipedia.org/wiki/Protocol-based_intrusion_detection_system (2009)
    • (2009)


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.