Research Article
A Security Model for Detecting Suspicious Patterns in Physical Environment
@INPROCEEDINGS{10.1109/IAS.2007.89, author={Simon Fong and Zhuang Yan}, title={A Security Model for Detecting Suspicious Patterns in Physical Environment}, proceedings={3rd International ICST Symposium on Information Assurance and Security}, publisher={IEEE}, proceedings_a={IAS}, year={2007}, month={9}, keywords={Access control Computer networks Data mining Information security Intrusion detection Joining processes Operating systems Permission Smart cards Virtual environment}, doi={10.1109/IAS.2007.89} }
- Simon Fong
Zhuang Yan
Year: 2007
A Security Model for Detecting Suspicious Patterns in Physical Environment
IAS
IEEE
DOI: 10.1109/IAS.2007.89
Abstract
In the view of escalating global threat in security, it is imperative to have an automated detection system that can pick up suspicious patterns of human movement in physical environments. It can give a forewarning before a planned attack happens or an ultimate security is breached. In the past, significant research on the intrusion detection was established, but limited to virtual environments like computer networks and operating systems. In this paper, we proposed a general security model for detecting suspicious patterns in physical environment. Suspicious patterns are subtle and we showed that they can be detected via an experiment.
Copyright © 2007–2024 IEEE