16.7.4.7.7 Intruders, Intrusions, Intrusion Detection, Threats

Chapter Contents (Back)
Activity Recognition. Intrusion Detection.

Vidient Systems, Inc.,
2007. Vendor, Surveillance.
WWW Link. Intrusion detection. Spin off from NEC research labs.

Viion Systems,
2009.
WWW Link. Vendor, Intrusion Detection. Actually, senses when someone leaves the computer. Presence detection. Montreal.

Mick, P.[Peter], Beck, D.[Donald],
Video-type universal motion and intrusion detection system,
US_Patent3,988,533, Oct 26, 1976
WWW Link. BibRef 7610

Harman, R.K.[R. Keith], Patchell, J.W.[John W.],
Perimeter surveillance system,
US_Patent4,249,207, Feb 3, 1981
WWW Link. BibRef 8102

Willoughby, J.S.[Jon S.],
Clock synchronized digital TV motion detector,
US_Patent5,008,745, Apr 16, 1991
WWW Link. BibRef 9104

Kuno, Y.[Yoshinori], Fukui, K.[Kazuhiro], Nakai, H.[Hiroaki],
Display monitoring system for detecting and tracking an intruder in a monitor area,
US_Patent5,243,418, Sep 7, 1993
WWW Link. BibRef 9309

Buccola, C.S.[Charles S.], Kolb, L.M.[Lawrence M.],
Automatically adjustable and self-testing dual technology intrusion detection system for minimizing false alarms,
US_Patent5,331,308, Jul 19, 1994
WWW Link. BibRef 9407

Freeman, E.J.[Edward J.],
Motion detection system,
US_Patent5,396,284, Mar 7, 1995
WWW Link. BibRef 9503

Ruckh, R.[Rainer], Argast, M.[Martin],
Method for detecting objects in a monitored area,
US_Patent5,539,199, Jul 23, 1996
WWW Link. BibRef 9607

Otsuki, A.[Akira],
Anomaly surveillance device,
US_Patent5,512,942, Apr 30, 1996
WWW Link. BibRef 9604

Aviv, D.G.[David G.],
Abnormality detection and surveillance system,
US_Patent5,666,157, Sep 9, 1997
WWW Link. BibRef 9709
And: US_Patent6,028,626, Feb 22, 2000
WWW Link. More change detection. BibRef

Baxter, K.M.[Keith M.],
Intruder alarm with trajectory display,
US_Patent5,966,074, Oct 12, 1999
WWW Link. BibRef 9910

Kuwano, Y.[Yukinori], Okino, T.[Toshiyuki], Ikeda, T.[Takashi], Arisawa, M.[Masato], Fujita, H.[Hideto], Murata, H.[Haruhiko],
Monitoring system and imaging system,
US_Patent6,456,320, Sep 24, 2002
WWW Link. Detect entering person. BibRef 0209

Ito, W.[Wataru], Ueda, H.[Hirotada], Okada, T.[Toshimichi], Endo, M.[Miyuki],
Method for tracking entering object and apparatus for tracking and monitoring entering object,
US_Patent6,404,455, Jun 11, 2002
WWW Link. BibRef 0206

Ito, W.[Wataru], Ueda, H.[Hirotada], Yamada, H.[Hiromasa],
Method of distinguishing a moving object and apparatus of tracking and monitoring a moving object,
US_Patent6,445,409, Sep 3, 2002
WWW Link. BibRef 0209

Ito, W.[Wataru], Ueda, H.[Hirotada],
Method and apparatus for automatically detecting intrusion object into view of image pickup device,
US_Patent6,754,367, Jun 22, 2004
WWW Link. BibRef 0406

Morellas, V., Pavlidis, I., Tsiamyrtzis, P.,
DETER: Detection of events for threat evaluation and recognition,
MVA(15), No. 1, October 2003, pp. 29-45.
Springer DOI 0310
BibRef

Yeung, D.Y.[Dit-Yan], Ding, Y.X.[Yu-Xin],
Host-based intrusion detection using dynamic and static behavioral models,
PR(36), No. 1, January 2003, pp. 229-243.
WWW Link. 0210
BibRef

Yeung, D.Y.[Dit-Yan], Chow, C.,
Parzen-window network intrusion detectors,
ICPR02(IV: 385-388).
IEEE DOI 0211
BibRef

Ito, W.[Wataru], Ueda, H.[Hirotada],
Intruding object monitoring method and intruding object monitoring system,
US_Patent6,812,835, Nov 2, 2004
WWW Link. BibRef 0411

Gutta, S.[Srinivas], Brodsky, T.[Tomas],
Intruder detection through trajectory analysis in monitoring and surveillance systems,
US_Patent6,593,852, Jul 15, 2003
WWW Link. BibRef 0307

Rao, R.[Ravishankar],
System and method for alarm generation based on the detection of the presence of a person,
US_Patent7,109,861, Sep 19, 2006
WWW Link. BibRef 0609

Han, M.[Mei], Gong, Y.H.[Yi-Hong], Tao, H.[Hai],
Video surveillance system that detects predefined behaviors based on predetermined patterns of movement through zones,
US_Patent7,088,846, Aug 8, 2006
WWW Link. BibRef 0608
And:
Video surveillance system with object detection and probability scoring based on object class,
US_Patent7,127,083, Oct 24, 2006
WWW Link. BibRef
And:
Video surveillance system with rule-based reasoning and multiple-hypothesis scoring,
US_Patent7,136,507, Nov 14, 2006
WWW Link. BibRef
And:
Video surveillance system in which trajectory hypothesis spawning allows for trajectory splitting and/or merging,
US_Patent7,148,912, Dec 12, 2006
WWW Link. BibRef

Jiang, S.Y.[Sheng-Yi], Song, X.Y.[Xiao-Yu], Wang, H.[Hui], Han, J.J.[Jian-Jun], Li, Q.H.[Qing-Hua],
A clustering-based method for unsupervised intrusion detections,
PRL(27), No. 7, May 2006, pp. 802-810.
WWW Link. Clustering; Threshold; Outlier factor; Intrusion detection 0604
BibRef

Alkelai, M.[Moshe], Kartoun, D.[David],
Dual sensor intruder alarm,
US_Patent7,126,476, Oct 24, 2006
WWW Link. IR and visible. BibRef 0610

Meniere, J.[Jerome], Lefebure, M.[Martin], Guichard, F.[Frederic], Belahmidi, A.[Abdelmounim],
Method for detecting new objects in an illuminated scene,
US_Patent7,302,081, Nov 27, 2007
WWW Link. BibRef 0711

Meng, L.M.[Ling-Min], di Poala, W.S.[William S.], Grimm, W.M.[Wolfgang M.],
Dual sensing intrusion detection method and system with state-level fusion,
US_Patent7,262,697, Aug 28, 2007
WWW Link. BibRef 0708

di Poala, W.S.[William S.],
Method and apparatus for reducing false alarms due to white light in a motion detection system,
US_Patent7,161,152, Jan 9, 2007
WWW Link. with IR BibRef 0701

Niwa, A.[Akimasa],
Moving body detecting apparatus,
US_Patent7,433,494, Oct 7, 2008
WWW Link. intrusion, breakin. BibRef 0810

Woo, H., Jung, Y.M., Kim, J.G., Seo, J.K.,
Environmentally Robust Motion Detection for Video Surveillance,
IP(19), No. 11, November 2010, pp. 2838-2848.
IEEE DOI 1011
To generate motion alarms. BibRef

Burghouts, G.J., Marck, J.W.,
Reasoning About Threats: From Observables to Situation Assessment,
SMC-C(41), No. 5, September 2011, pp. 608-616.
IEEE DOI 1109
BibRef

Carvalho, P.[Pedro], Oliveira, T.[Telmo], Ciobanu, L.[Lucian], Gaspar, F.[Filipe], Teixeira, L.F.[Luís F.], Bastos, R.[Rafael], Cardoso, J.S.[Jaime S.], Dias, M.S.[Miguel S.], Côrte-Real, L.[Luís],
Analysis of object description methods in a video object tracking environment,
MVA(24), No. 6, August 2013, pp. 1149-1165.
Springer DOI 1307
BibRef

Pereira, A.[Américo], Familiar, A.[Alexandra], Moreira, B.[Bruno], Terroso, T.[Teresa], Carvalho, P.[Pedro], Côrte-Real, L.[Luís],
Video Based Group Tracking and Management,
ICIAR16(423-430).
Springer DOI 1608
BibRef

Teixeira, L.F.[Luis F.], Carvalho, P.[Pedro], Cardoso, J.S.[Jaime S.], Corte-Real, L.[Luis],
Automatic description of object appearances in a wide-area surveillance scenario,
ICIP12(1609-1612).
IEEE DOI 1302
BibRef

Mitchell, R., Chen, I.R.[Ing-Ray],
Adaptive Intrusion Detection of Malicious Unmanned Air Vehicles Using Behavior Rule Specifications,
SMCS(44), No. 5, May 2014, pp. 593-604.
IEEE DOI 1405
ant colony optimisation BibRef

Lin, C., Song, K.,
Probability-Based Location Aware Design and On-Demand Robotic Intrusion Detection System,
SMCS(44), No. 6, June 2014, pp. 705-715.
IEEE DOI 1406
Mobile nodes BibRef

Penmetsa, S.[Surya], Minhuj, F.[Fatima], Singh, A.[Amarjot], Omkar, S.N.,
Autonomous UAV for Suspicious Action Detection using Pictorial Human Pose Estimation and Classification,
ELCVIA(13), No. 1, 2014, pp. xx-yy.
WWW Link. 1407
BibRef

Burghouts, G.J., Schutte, K., ten Hove, R.J.M., van den Broek, S.P., Baan, J., Rajadell, O., van Huis, J.R., van Rest, J., Hanckmann, P., Bouma, H., Sanroma, G., Evans, M., Ferryman, J.,
Instantaneous threat detection based on a semantic representation of activities, zones and trajectories,
SIViP(8), No. S1, December 2014, pp. 191-200.
Springer DOI 1411
BibRef

Sanromà, G.[Gerard], Patino, L.[Luis], Burghouts, G.J.[Gertjan J.], Schutte, K.[Klamer], Ferryman, J.M.[James M.],
A unified approach to the recognition of complex actions from sequences of zone-crossings,
IVC(32), No. 5, 2014, pp. 363-378.
Elsevier DOI 1404
Threat recognition See also Spatio-temporal layout of human actions for improved bag-of-words action detection. BibRef

van den Broek, S.P.[Sebastiaan P.], ten Hove, R. .J.M.[R. Johan-Martijn], den Hollander, R.[Richard], Burghouts, G.J.[Gertjan J.],
Automated recognition of human activities in video streams in real time,
SPIE(Newsroom), June 30, 2014
DOI Link 1407
A system using standard surveillance cameras senses human activities relevant for early detection of military threats. BibRef

Sanromà, G.[Gerard], Burghouts, G.J.[Gertjan J.], Schutte, K.[Klamer],
Recognition of Long-Term Behaviors by Parsing Sequences of Short-Term Actions with a Stochastic Regular Grammar,
SSSPR12(225-233).
Springer DOI 1211
BibRef

Hanckmann, P.[Patrick], Schutte, K.[Klamer], Burghouts, G.J.[Gertjan J.],
Automated Textual Descriptions for a Wide Range of Video Events with 48 Human Actions,
VECTaR12(I: 372-380).
Springer DOI 1210
BibRef

Riffo, V., Mery, D.,
Automated Detection of Threat Objects Using Adapted Implicit Shape Model,
SMCS(46), No. 4, April 2016, pp. 472-482.
IEEE DOI 1604
Blades BibRef

Al-Yaseen, W.L.[Wathiq Laftah], Othman, Z.A.[Zulaiha Ali], Nazri, M.Z.A.[Mohd Zakree Ahmad],
Real-time multi-agent system for an adaptive intrusion detection system,
PRL(85), No. 1, 2017, pp. 56-64.
Elsevier DOI 1612
Adaptive intrusion detection system BibRef

Zhou, C., Huang, S., Xiong, N., Yang, S., Li, H., Qin, Y., Li, X.,
Design and Analysis of Multimodel-Based Anomaly Intrusion Detection Systems in Industrial Process Automation,
SMCS(45), No. 10, October 2015, pp. 1345-1360.
IEEE DOI 1509
Automation BibRef

Huang, K., Zhang, Q., Zhou, C., Xiong, N., Qin, Y.,
An Efficient Intrusion Detection Approach for Visual Sensor Networks Based on Traffic Pattern Learning,
SMCS(47), No. 10, October 2017, pp. 2704-2713.
IEEE DOI 1709
Computational modeling, Feature extraction, Intrusion detection, Self-organizing feature maps, Training, Visualization, Wireless sensor networks, Active learning, big data, intrusion detection, self-organizing map (SOM), visual sensor networks (VSNs) BibRef


Liu, Z., Zhang, J., Geng, L.,
An Intelligent Building Occupancy Detection System Based on Sparse Auto-Encoder,
SoftBio17(17-22)
IEEE DOI 1609
building management systems, energy conservation, image coding, learning (artificial intelligence), object detection, power engineering computing, data analysis, deep learning technology, energy saving, intelligent building occupancy detection system, regression methods, room occupancy status, sparse auto-encoder, Buildings, Feature extraction, Humidity, Sensors, Support vector machines, Testing, Training, Auto-encoder, Deep Learning, Energy Saving, Occupancy Detection, Sparse, Coding BibRef

Patino, L., Ferryman, J.M.,
Semantic Modelling for Behaviour Characterisation and Threat Detection,
PETS16(1282-1288)
IEEE DOI 1612
BibRef
And:
Detecting threat behaviours,
AVSS16(88-94)
IEEE DOI 1611
Cameras BibRef

Lu, R., Yang, H., Zhu, J., Wu, S., Wang, J., Bull, D.R.,
Hierarchical video summarization with loitering indication,
VCIP15(1-4)
IEEE DOI 1605
Data mining BibRef

Vijverberg, J.A.[Julien A.], Janssen, R.T.M.[Roel T.M.], de Zwart, R.[Remco], de With, P.H.N.[Peter H.N.],
Perimeter-intrusion event classification for on-line detection using multiple instance learning solving temporal ambiguities,
ICIP14(2408-2412)
IEEE DOI 1502
Algorithm design and analysis BibRef

Burghouts, G.J., van Slingerland, P., ten Hove, R.J.M., den Hollander, R.J.M., Schutte, K.,
Complex threat detection: Learning vs. rules, using a hierarchy of features,
AVSS14(375-380)
IEEE DOI 1411
Engines BibRef

di Caterina, G.[Gaetano], Manap, N.A.[Nurulfajar Abd], Ibrahim, M.M.[Masrullizam Mat], Soraghan, J.J.[John J.],
Real Time Door Access Event Detection and Notification in a Reactive Smart Surveillance System,
ICISP12(459-467).
Springer DOI 1208
BibRef

Garcia, F.[Frederic], Mirbach, B.[Bruno], Cuesta-Contreras, A.[Angel],
AVSS 2011 demo session,
AVSBS11(519-520).
IEEE DOI 1111
3D MLI technology. People and object detection for building safety. BibRef

Senst, T.[Tobias], Patzold, M., Evangelio, R.H.[Ruben Heras], Eiselein, V., Keller, I., Sikora, T.[Thomas],
On building decentralized wide-area surveillance networks based on ONVIF,
MMSysS11(420-423).
IEEE DOI 1111
BibRef

Flammini, F., Pragliola, C., Pappalardo, A., Vittorini, V.,
A robust approach for on-line and off-line threat detection based on event tree similarity analysis,
MMSysS11(414-419).
IEEE DOI 1111
BibRef

Lallier, C., Reynaud, E., Robinault, L., Tougne, L.,
A testing framework for background subtraction algorithms comparison in intrusion detection context,
AVSBS11(314-319).
IEEE DOI 1111
BibRef

Tu, P.[Peter], Yu, T.[Ting], Gao, D.[Dashan], Nevatia, R.[Ram], Lee, S.C.[Sung Chun], Kim, H.[Hale], Rhee, P.K.[Phill Kyu], Baek, J.H.[Joong-Hwan],
A systems level approach to perimeter protection,
WACV12(257-262).
IEEE DOI 1203
BibRef
And: AVSBS11(517-518).
IEEE DOI 1111
AVSS 2011 demo session. BibRef

Bombini, L.[Luca], Broggi, A.[Alberto], Debattisti, S.[Stefano],
Advanced Safety Sensor for Gate Automation,
CIAP11(II: 374-383).
Springer DOI 1109
BibRef

Cucchiara, R.[Rita], Fornaciari, M.[Michele], Haider, R.[Razia], Mandreoli, F.[Federica], Martoglia, R.[Riccardo], Prati, A.[Andrea], Sassatelli, S.[Simona],
A reasoning engine for intruders' localization in wide open areas using a network of cameras and RFIDs,
CNWASA11(33-40).
IEEE DOI 1106
BibRef

Michael, N.[Nicholas], Dilsizian, M.[Mark], Metaxas, D.N.[Dimitris N.], Burgoon, J.K.[Judee K.],
Motion Profiles for Deception Detection Using Visual Cues,
ECCV10(VI: 462-475).
Springer DOI 1009
See also Detecting Concealment of Intent in Transportation Screening: A Proof of Concept. BibRef

Soibam, B., Shah, S.K., Chaudhry, A., Eledath, J.[Jayan],
Quantitative comparison of metrics for change detection in video patrolling applications,
ObjectEvent09(601-608).
IEEE DOI 0910
BibRef

Zhai, Y.[Yun], Hampapur, A.[Arun],
Virtual Boundary Crossing Detection without Explicit Object Tracking,
AVSBS09(518-522).
IEEE DOI 0909
BibRef

Cermak, G.[Grant], Keyzer, K.[Karl],
Unsupervised Intrusion Detection Using Color Images,
ISVC07(II: 770-780).
Springer DOI 0711
BibRef

Kawabata, S.[Satoshi], Hiura, S.[Shinsaku], Sato, K.[Kosuke],
3D Intrusion Detection System with Uncalibrated Multiple Cameras,
ACCV07(I: 149-158).
Springer DOI 0711
BibRef

Dore, A.[Alessio], Regazzoni, C.S.[Carlo S.],
Bayesian Bio-inspired Model for Learning Interactive Trajectories,
AVSBS09(207-212).
IEEE DOI 0909
BibRef

Dore, A.[Alessio], Pinasco, M.[Matteo], Regazzoni, C.S.[Carlo S.],
A Bio-inspired Learning Approach for the Classification of Risk Zones in a Smart Space,
Learning07(1-8).
IEEE DOI 0706
Intrusion detection. Monitor space and warn of intrusion. BibRef

Laskov, P.[Pavel], Düssel, P.[Patrick], Schäfer, C.[Christin], Rieck, K.[Konrad],
Learning Intrusion Detection: Supervised or Unsupervised?,
CIAP05(50-57).
Springer DOI 0509
BibRef

Ryan, A.H.,
Real-time detection of threat,
AVSBS03(3-3).
WWW Link. 0310
BibRef

McKenna, T.,
Video surveillance and human activity recognition for anti-terrorism and force protection,
AVSBS03(2-2).
WWW Link. 0310
BibRef

Milanesi, G., Sarti, A., Tubaro, S.,
Robust real-time intrusion detection with fuzzy classification,
ICIP02(III: 437-440).
IEEE DOI 0210
BibRef

Makarov, A.[Aleksej],
Comparison of Background Extraction Based Intrusion Detection Algorithms,
ICIP96(I: 521-524).
IEEE DOI BibRef 9600

Makarov, A., Vesin, J.M., Kunt, M.,
Intrusion Detection Using Extraction of Moving Edges,
ICPR94(A:804-807).
IEEE DOI BibRef 9400

Rosin, P.L.[Paul L.], Ellis, T.[Tim],
Detecting and Classifying Intruders in Image Sequences,
BMVC91(xx-yy).
PDF File. 9109
BibRef

Chapter on Motion -- Feature-Based, Long Range, Motion and Structure Estimates, Tracking, Surveillance, Activities continues in
Human Activities, Interactions between People .


Last update:Nov 18, 2017 at 20:56:18