DocumentCode
2875111
Title
Mining Suspicious Patterns in Physical Environment
Author
Fong, Simon
Author_Institution
Fac. of Sci. & Technol., Univ. of Macau, Macau
fYear
2007
fDate
16-18 April 2007
Firstpage
419
Lastpage
422
Abstract
In the view of escalating threat in homeland security, it is imperative to have an automated detection system that can pick up suspicious patterns of human movement in physical environments. It can give a forewarning before a planned attack happens or an ultimate security is breached. In the past, significant research on intrusion detection systems was established, but limited to virtual environments like computer networks and operating systems. In this paper, we proposed a general mining model for detecting suspicious patterns in physical environment. Suspicious patterns are subtle, relatively difficult to define and detect. Experiments are currently being conducted.
Keywords
data mining; security of data; automated detection system; computer networks; homeland security; intrusion detection systems; mining model; operating systems; physical environments; virtual environments; Biomedical monitoring; Computer networks; Data security; Intrusion detection; Joining processes; National security; Operating systems; Permission; Terrorism; Virtual environment; Data-mining; Intrusion Detection; physical environment security;
fLanguage
English
Publisher
ieee
Conference_Titel
Anti-counterfeiting, Security, Identification, 2007 IEEE International Workshop on
Conference_Location
Xiamen, Fujian
Print_ISBN
1-4244-1035-5
Electronic_ISBN
1-4244-1035-5
Type
conf
DOI
10.1109/IWASID.2007.373669
Filename
4244861
Link To Document