17.1.3.8.12 Intruders, Intrusions, Intrusion Detection, Threats

Chapter Contents (Back)
Activity Recognition. Intrusion Detection. Physical, not network, which is filed elsewhere.

Vidient Systems, Inc.,
2007. Vendor, Surveillance.
WWW Link. Intrusion detection. Spin off from NEC research labs.

Viion Systems,
2009.
WWW Link. Vendor, Intrusion Detection. Actually, senses when someone leaves the computer. Presence detection. Montreal.

Mick, P.[Peter], Beck, D.[Donald],
Video-type universal motion and intrusion detection system,
US_Patent3,988,533, Oct 26, 1976
WWW Link. BibRef 7610

Harman, R.K.[R. Keith], Patchell, J.W.[John W.],
Perimeter surveillance system,
US_Patent4,249,207, Feb 3, 1981
WWW Link. BibRef 8102

Willoughby, J.S.[Jon S.],
Clock synchronized digital TV motion detector,
US_Patent5,008,745, Apr 16, 1991
WWW Link. BibRef 9104

Kuno, Y.[Yoshinori], Fukui, K.[Kazuhiro], Nakai, H.[Hiroaki],
Display monitoring system for detecting and tracking an intruder in a monitor area,
US_Patent5,243,418, Sep 7, 1993
WWW Link. BibRef 9309

Buccola, C.S.[Charles S.], Kolb, L.M.[Lawrence M.],
Automatically adjustable and self-testing dual technology intrusion detection system for minimizing false alarms,
US_Patent5,331,308, Jul 19, 1994
WWW Link. BibRef 9407

Freeman, E.J.[Edward J.],
Motion detection system,
US_Patent5,396,284, Mar 7, 1995
WWW Link. BibRef 9503

Ruckh, R.[Rainer], Argast, M.[Martin],
Method for detecting objects in a monitored area,
US_Patent5,539,199, Jul 23, 1996
WWW Link. BibRef 9607

Otsuki, A.[Akira],
Anomaly surveillance device,
US_Patent5,512,942, Apr 30, 1996
WWW Link. BibRef 9604

Aviv, D.G.[David G.],
Abnormality detection and surveillance system,
US_Patent5,666,157, Sep 9, 1997
WWW Link. BibRef 9709
And: US_Patent6,028,626, Feb 22, 2000
WWW Link. More change detection. BibRef

Guthrie, T.C.[Thomas C.],
Object tracking system for monitoring a controlled space,
US_Patent5,973,732, Oct 26, 1999
WWW Link. BibRef 9910

Baxter, K.M.[Keith M.],
Intruder alarm with trajectory display,
US_Patent5,966,074, Oct 12, 1999
WWW Link. BibRef 9910

Kuwano, Y.[Yukinori], Okino, T.[Toshiyuki], Ikeda, T.[Takashi], Arisawa, M.[Masato], Fujita, H.[Hideto], Murata, H.[Haruhiko],
Monitoring system and imaging system,
US_Patent6,456,320, Sep 24, 2002
WWW Link. Detect entering person. BibRef 0209

Ito, W.[Wataru], Ueda, H.[Hirotada], Okada, T.[Toshimichi], Endo, M.[Miyuki],
Method for tracking entering object and apparatus for tracking and monitoring entering object,
US_Patent6,404,455, Jun 11, 2002
WWW Link. BibRef 0206

Ito, W.[Wataru], Ueda, H.[Hirotada], Yamada, H.[Hiromasa],
Method of distinguishing a moving object and apparatus of tracking and monitoring a moving object,
US_Patent6,445,409, Sep 3, 2002
WWW Link. BibRef 0209

Ito, W.[Wataru], Ueda, H.[Hirotada],
Method and apparatus for automatically detecting intrusion object into view of image pickup device,
US_Patent6,754,367, Jun 22, 2004
WWW Link. BibRef 0406

Morellas, V., Pavlidis, I., Tsiamyrtzis, P.,
DETER: Detection of events for threat evaluation and recognition,
MVA(15), No. 1, October 2003, pp. 29-45.
Springer DOI 0310
BibRef

Yeung, D.Y.[Dit-Yan], Ding, Y.X.[Yu-Xin],
Host-based intrusion detection using dynamic and static behavioral models,
PR(36), No. 1, January 2003, pp. 229-243.
Elsevier DOI 0210
BibRef

Yeung, D.Y.[Dit-Yan], Chow, C.,
Parzen-window network intrusion detectors,
ICPR02(IV: 385-388).
IEEE DOI 0211
BibRef

Ito, W.[Wataru], Ueda, H.[Hirotada],
Intruding object monitoring method and intruding object monitoring system,
US_Patent6,812,835, Nov 2, 2004
WWW Link. BibRef 0411

Gutta, S.[Srinivas], Brodsky, T.[Tomas],
Intruder detection through trajectory analysis in monitoring and surveillance systems,
US_Patent6,593,852, Jul 15, 2003
WWW Link. BibRef 0307

Rao, R.[Ravishankar],
System and method for alarm generation based on the detection of the presence of a person,
US_Patent7,109,861, Sep 19, 2006
WWW Link. BibRef 0609

Han, M.[Mei], Gong, Y.H.[Yi-Hong], Tao, H.[Hai],
Video surveillance system that detects predefined behaviors based on predetermined patterns of movement through zones,
US_Patent7,088,846, Aug 8, 2006
WWW Link. BibRef 0608
And:
Video surveillance system with object detection and probability scoring based on object class,
US_Patent7,127,083, Oct 24, 2006
WWW Link. BibRef
And:
Video surveillance system with rule-based reasoning and multiple-hypothesis scoring,
US_Patent7,136,507, Nov 14, 2006
WWW Link. BibRef
And:
Video surveillance system in which trajectory hypothesis spawning allows for trajectory splitting and/or merging,
US_Patent7,148,912, Dec 12, 2006
WWW Link. BibRef

Jiang, S.Y.[Sheng-Yi], Song, X.Y.[Xiao-Yu], Wang, H.[Hui], Han, J.J.[Jian-Jun], Li, Q.H.[Qing-Hua],
A clustering-based method for unsupervised intrusion detections,
PRL(27), No. 7, May 2006, pp. 802-810.
Elsevier DOI Clustering; Threshold; Outlier factor; Intrusion detection 0604
BibRef

Alkelai, M.[Moshe], Kartoun, D.[David],
Dual sensor intruder alarm,
US_Patent7,126,476, Oct 24, 2006
WWW Link. IR and visible. BibRef 0610

Meniere, J.[Jerome], Lefebure, M.[Martin], Guichard, F.[Frederic], Belahmidi, A.[Abdelmounim],
Method for detecting new objects in an illuminated scene,
US_Patent7,302,081, Nov 27, 2007
WWW Link. BibRef 0711

Meng, L.M.[Ling-Min], di Poala, W.S.[William S.], Grimm, W.M.[Wolfgang M.],
Dual sensing intrusion detection method and system with state-level fusion,
US_Patent7,262,697, Aug 28, 2007
WWW Link. BibRef 0708

di Poala, W.S.[William S.],
Method and apparatus for reducing false alarms due to white light in a motion detection system,
US_Patent7,161,152, Jan 9, 2007
WWW Link. with IR BibRef 0701

Niwa, A.[Akimasa],
Moving body detecting apparatus,
US_Patent7,433,494, Oct 7, 2008
WWW Link. intrusion, breakin. BibRef 0810

Woo, H., Jung, Y.M., Kim, J.G., Seo, J.K.,
Environmentally Robust Motion Detection for Video Surveillance,
IP(19), No. 11, November 2010, pp. 2838-2848.
IEEE DOI 1011
To generate motion alarms. BibRef

Burghouts, G.J., Marck, J.W.,
Reasoning About Threats: From Observables to Situation Assessment,
SMC-C(41), No. 5, September 2011, pp. 608-616.
IEEE DOI 1109
BibRef

Carvalho, P.[Pedro], Oliveira, T.[Telmo], Ciobanu, L.[Lucian], Gaspar, F.[Filipe], Teixeira, L.F.[Luís F.], Bastos, R.[Rafael], Cardoso, J.S.[Jaime S.], Dias, M.S.[Miguel S.], Côrte-Real, L.[Luís],
Analysis of object description methods in a video object tracking environment,
MVA(24), No. 6, August 2013, pp. 1149-1165.
Springer DOI 1307
BibRef

Pereira, A.[Américo], Familiar, A.[Alexandra], Moreira, B.[Bruno], Terroso, T.[Teresa], Carvalho, P.[Pedro], Côrte-Real, L.[Luís],
Video Based Group Tracking and Management,
ICIAR16(423-430).
Springer DOI 1608
BibRef

Teixeira, L.F.[Luis F.], Carvalho, P.[Pedro], Cardoso, J.S.[Jaime S.], Corte-Real, L.[Luis],
Automatic description of object appearances in a wide-area surveillance scenario,
ICIP12(1609-1612).
IEEE DOI 1302
BibRef

Mitchell, R., Chen, I.R.[Ing-Ray],
Adaptive Intrusion Detection of Malicious Unmanned Air Vehicles Using Behavior Rule Specifications,
SMCS(44), No. 5, May 2014, pp. 593-604.
IEEE DOI 1405
ant colony optimisation BibRef

Lin, C., Song, K.,
Probability-Based Location Aware Design and On-Demand Robotic Intrusion Detection System,
SMCS(44), No. 6, June 2014, pp. 705-715.
IEEE DOI 1406
Mobile nodes BibRef

Penmetsa, S.[Surya], Minhuj, F.[Fatima], Singh, A.[Amarjot], Omkar, S.N.,
Autonomous UAV for Suspicious Action Detection using Pictorial Human Pose Estimation and Classification,
ELCVIA(13), No. 1, 2014, pp. xx-yy.
DOI Link 1407
BibRef

Burghouts, G.J., Schutte, K., ten Hove, R.J.M., van den Broek, S.P., Baan, J., Rajadell, O., van Huis, J.R., van Rest, J., Hanckmann, P., Bouma, H., Sanroma, G., Evans, M., Ferryman, J.,
Instantaneous threat detection based on a semantic representation of activities, zones and trajectories,
SIViP(8), No. S1, December 2014, pp. 191-200.
Springer DOI 1411
BibRef

Sanromà, G.[Gerard], Patino, L.[Luis], Burghouts, G.J.[Gertjan J.], Schutte, K.[Klamer], Ferryman, J.M.[James M.],
A unified approach to the recognition of complex actions from sequences of zone-crossings,
IVC(32), No. 5, 2014, pp. 363-378.
Elsevier DOI 1404
Threat recognition
See also Spatio-temporal layout of human actions for improved bag-of-words action detection. BibRef

Shannon, T.[Thomas], Wiltshire, B.[Ben], Spier, E.[Emmet],
Detection of people in military and security context images,
SPIE(Newsroom), September 2, 2014
DOI Link 1410
An autonomous person-detection solution could help alert surveillance operators to potential issues, reducing the cognitive burden and achieving more with less manpower. BibRef

van den Broek, S.P.[Sebastiaan P.], ten Hove, R. .J.M.[R. Johan-Martijn], den Hollander, R.[Richard], Burghouts, G.J.[Gertjan J.],
Automated recognition of human activities in video streams in real time,
SPIE(Newsroom), June 30, 2014
DOI Link 1407
A system using standard surveillance cameras senses human activities relevant for early detection of military threats. BibRef

Sanromà, G.[Gerard], Burghouts, G.J.[Gertjan J.], Schutte, K.[Klamer],
Recognition of Long-Term Behaviors by Parsing Sequences of Short-Term Actions with a Stochastic Regular Grammar,
SSSPR12(225-233).
Springer DOI 1211
BibRef

Hanckmann, P.[Patrick], Schutte, K.[Klamer], Burghouts, G.J.[Gertjan J.],
Automated Textual Descriptions for a Wide Range of Video Events with 48 Human Actions,
VECTaR12(I: 372-380).
Springer DOI 1210
BibRef

Riffo, V., Mery, D.,
Automated Detection of Threat Objects Using Adapted Implicit Shape Model,
SMCS(46), No. 4, April 2016, pp. 472-482.
IEEE DOI 1604
Blades BibRef

Al-Yaseen, W.L.[Wathiq Laftah], Othman, Z.A.[Zulaiha Ali], Nazri, M.Z.A.[Mohd Zakree Ahmad],
Real-time multi-agent system for an adaptive intrusion detection system,
PRL(85), No. 1, 2017, pp. 56-64.
Elsevier DOI 1612
Adaptive intrusion detection system BibRef

Zhou, C., Huang, S., Xiong, N., Yang, S., Li, H., Qin, Y., Li, X.,
Design and Analysis of Multimodel-Based Anomaly Intrusion Detection Systems in Industrial Process Automation,
SMCS(45), No. 10, October 2015, pp. 1345-1360.
IEEE DOI 1509
Automation BibRef

Huang, K., Zhang, Q., Zhou, C., Xiong, N., Qin, Y.,
An Efficient Intrusion Detection Approach for Visual Sensor Networks Based on Traffic Pattern Learning,
SMCS(47), No. 10, October 2017, pp. 2704-2713.
IEEE DOI 1709
Computational modeling, Feature extraction, Intrusion detection, Self-organizing feature maps, Training, Visualization, Wireless sensor networks, Active learning, big data, intrusion detection, self-organizing map (SOM), visual sensor networks (VSNs) BibRef

Hu, K.[Kelu], Zheng, C.L.[Chun-Lei], He, W.[Wei], Bao, X.H.[Xing-He], Wang, Y.G.[Ying-Guan],
Multi-Channels LSTM Networks for Fence Activity Classification,
IEICE(E101-D), No. 8, August 2018, pp. 2173-2177.
WWW Link. 1808
Sensor attached to a fence, detect intrusions. BibRef

Yang, A.[Aimin], Liu, H.X.[Hui-Xiang], Chen, Y.J.[Yong-Jie], Zhang, C.Y.[Chun-Ying], Yang, K.[Ke],
Digital video intrusion intelligent detection method based on narrowband Internet of Things and its application,
IVC(97), 2020, pp. 103914.
Elsevier DOI 2005
NB-IoT, Video intrusion detection, Support vector machines BibRef

Villamizar, M., Martínez-González, A., Canévet, O., Odobez, J.M.,
WatchNet++: efficient and accurate depth-based network for detecting people attacks and intrusion,
MVA(31), No. 6, August 2020, pp. Article41.
Springer DOI 2008
BibRef

Zhao, H.W.[Hong-Wei], Li, M.Z.[Ming-Zhao], Zhao, H.Y.[Hao-Yu],
Artificial intelligence based ensemble approach for intrusion detection systems,
JVCIR(71), 2020, pp. 102736.
Elsevier DOI 2009
Artificial Intelligence, Ensembles, Internet attacks, Neural networks BibRef

Miao, Y.M.[Yi-Ming], Tang, Y.[Yuan], Alzahrani, B.A.[Bander A.], Barnawi, A.[Ahmed], Alafif, T.[Tarik], Hu, L.[Long],
Airborne LiDAR Assisted Obstacle Recognition and Intrusion Detection Towards Unmanned Aerial Vehicle: Architecture, Modeling and Evaluation,
ITS(22), No. 7, July 2021, pp. 4531-4540.
IEEE DOI 2107
Laser radar, Unmanned aerial vehicles, Intrusion detection, Clustering algorithms, Monitoring, Image edge detection, unmanned aerial vehicle BibRef

Gong, X.[Xiao], Chen, X.[Xi], Zhong, Z.D.[Zhang-Dui], Chen, W.[Wei],
Enhanced Few-Shot Learning for Intrusion Detection in Railway Video Surveillance,
ITS(23), No. 8, August 2022, pp. 11301-11313.
IEEE DOI 2208
Rail transportation, Intrusion detection, Task analysis, Training, Video surveillance, Streaming media, Cameras, video surveillance BibRef

Chakraborty, M.[Mainak], Kumawat, H.C.[Harish C.], Dhavale, S.V.[Sunita Vikrant], Raj A, A.B.[Arockia Bazil],
Application of DNN for radar micro-doppler signature-based human suspicious activity recognition,
PRL(162), 2022, pp. 1-6.
Elsevier DOI 2210
CW radar, Human activity recognition, Micro-Doppler signatures, Spectrogram, Dataset, Convolutional neural network BibRef

Mansour, Z.[Ziad], Lounis, K.[Karim], Ding, S.H.H.[Steven H. H.], Zulkernine, M.[Mohammad],
AdaptIDS: Adaptive Intrusion Detection for Mission-Critical Aerospace Vehicles,
ITS(23), No. 12, December 2022, pp. 23459-23473.
IEEE DOI 2212
Military standards, Security, Intrusion detection, Protocols, Aerospace electronics, Data transfer, Synchronization, security analytics BibRef

Wang, Y.[Yalu], Li, J.[Jie], Zhao, W.[Wei], Han, Z.J.[Zhi-Jie], Zhao, H.[Hang], Wang, L.[Lei], He, X.[Xin],
N-STGAT: Spatio-Temporal Graph Neural Network Based Network Intrusion Detection for Near-Earth Remote Sensing,
RS(15), No. 14, 2023, pp. 3611.
DOI Link 2307
BibRef

Hassler, S.C.[Samuel Chase], Mughal, U.A.[Umair Ahmad], Ismail, M.[Muhammad],
Cyber-Physical Intrusion Detection System for Unmanned Aerial Vehicles,
ITS(25), No. 6, June 2024, pp. 6106-6117.
IEEE DOI 2406
Autonomous aerial vehicles, Feature extraction, Cyberattack, Complexity theory, Support vector machines, Training data, and machine learning BibRef

Jiang, Z.[Zhufeng], Wang, H.[Hui], Luo, G.L.[Guo-Liang], Fan, Z.Z.[Zi-Zhu], Xu, L.[Lu],
Pedestrian Intrusion Detection in Railway Station Based on Mirror Translation Attention and Feature Pooling Enhancement,
SPLetters(31), 2024, pp. 2730-2734.
IEEE DOI 2410
Pedestrians, Feature extraction, Rail transportation, Computational modeling, Dictionaries, Convolution, Mirrors, Encoding, self-attention BibRef


Khorramshahi, P.[Pirazh], Wu, Z.[Zhe], Wang, T.C.[Tian-Chen], Deluccia, L.[Luke], Wang, H.C.[Hong-Cheng],
Lightweight Delivery Detection on Doorbell Cameras,
WACV24(6947-6956)
IEEE DOI 2404
Training, Uncertainty, Computational modeling, System performance, Pipelines, Predictive models, Cameras, Algorithms, Commercial / retail BibRef

Li, X.M.[Xiao-Min], Li, X.R.[Xin-Ran], Gu, S.M.[Shu-Ming],
An intrusion monitoring system design based on 3D face recognition,
CVIDL23(280-283)
IEEE DOI 2403
Training, Computer hacking, Face recognition, Stereo image processing, Sensors, Intrusion Monitoring BibRef

Yang, T.[Tao], Wang, J.X.[Jun-Xiang], Deng, H.L.[Hong-Li], Li, M.Y.[Ming-Yang],
A Data Enhancement Model for Intrusion Detection In Smart Home,
CVIDL23(314-317)
IEEE DOI 2403
Training, Performance evaluation, Deep learning, Intrusion detection, Smart homes, Throughput, Few Shot Learning BibRef

Lohani, D.[Devashish], Crispim-Junior, C.[Carlos], Barthélemy, Q.[Quentin], Bertrand, S.[Sarah], Robinault, L.[Lionel], Rodet, L.T.[Laure Tougne],
Unsupervised and Adaptive Perimeter Intrusion Detector,
ICIP22(3621-3625)
IEEE DOI 2211
Deep learning, Training, Adaptive systems, Thresholding (Imaging), Intrusion detection, Detectors, Perimeter intrusion detection, i-LIDS dataset BibRef

Nahler, C.[Caterina], Plank, H.[Hannes], Steger, C.[Christian], Druml, N.[Norbert],
Resource-Constrained Human Presence Detection for Indirect Time-of-Flight Sensors,
DICTA21(1-5)
IEEE DOI 2201
Reflectivity, Image sensors, Performance evaluation, Histograms, Power measurement, Laser radar, Face recognition, Time-of-Flight, reflectance BibRef

Demir, U.[Ugur], Rawat, Y.S.[Yogesh S.], Shah, M.[Mubarak],
TinyVIRAT: Low-resolution Video Action Recognition,
ICPR21(7387-7394)
IEEE DOI 2105
Location awareness, Surveillance, Superresolution, Semantics, Pipelines, Benchmark testing BibRef

Swetha, S.[Sirnam], Kuehne, H.[Hilde], Rawat, Y.S.[Yogesh S.], Shah, M.[Mubarak],
Unsupervised Discriminative Embedding for Sub-Action Learning in Complex Activities,
ICIP21(2588-2592)
IEEE DOI 2201
Training, Visualization, Image coding, Viterbi algorithm, Benchmark testing, Task analysis, Complex activity, Action detection BibRef

Rizve, M.N.[Mamshad Nayeem], Demir, U.[Ugur], Tirupattur, P.[Praveen], Rana, A.J.[Aayush Jung], Duarte, K.[Kevin], Dave, I.R.[Ishan R.], Rawat, Y.S.[Yogesh S.], Shah, M.[Mubarak],
Gabriella: An Online System for Real-Time Activity Detection in Untrimmed Security Videos,
ICPR21(4237-4244)
IEEE DOI 2105
Location awareness, Computational modeling, Merging, Object detection, Real-time systems, Classification algorithms BibRef

Lee, S.C.[Sung Chun], Qian, G.[Gang], Beach, A.[Allison],
Real-time Person Tracking and Association on Doorbell Cameras,
ISVC20(II:458-469).
Springer DOI 2103
BibRef

Ikrissi, G., Mazri, T.,
A Study of Smart Campus Environment and Its Security Attacks,
SmartCityApp20(255-261).
DOI Link 2012
BibRef

Wang, H.[Hao], Ning, X.G.[Xiao-Gang], Dong, Q.[Quan], Liu, Y.F.[Ya-Fei], Hao, M.H.[Ming-Hui], Zhang, H.C.[Han-Chao], Wang, H.[Han], Chang, W.T.[Wen-Tao], Cao, Y.X.[Yin-Xuan], Liu, C.J.[Cai-Juan],
Quarterly Monitoring of Suspected Illegal Human Activities In National Nature Reserves of China with Sentinel-2 and High-resolution Images On the Cloud Platform,
ISPRS20(B3:1657-1662).
DOI Link 2012
BibRef

Perera, P., Fierrez, J., Patel, V.M.,
Quickest Intruder Detection For Multiple User Active Authentication,
ICIP20(1341-1345)
IEEE DOI 2011
Active Authentication, mobile-based biometrics, multiple user authentication BibRef

Cokbas, M., Ishwar, P., Konrad, J.,
Low-Resolution Overhead Thermal Tripwire for Occupancy Estimation,
PBVS20(398-406)
IEEE DOI 2008
Thermal sensors, Cameras, Event detection, Tracking, Land surface temperature, Feature extraction BibRef

Raglin, A.[Adrienne], Michealis, J.[James], Dennison, M.[Mark], Harrison, A.[Andre], Trout, T.[Theron], Schaffer, J.[James],
MxR Framework for Uncertainty Based Explanation for Uncovering Adversarial Behavior,
VAMR18(II: 354-368).
Springer DOI 1807
BibRef

Liu, Z., Zhang, J., Geng, L.,
An Intelligent Building Occupancy Detection System Based on Sparse Auto-Encoder,
SoftBio17(17-22)
IEEE DOI 1609
building management systems, energy conservation, image coding, learning (artificial intelligence), object detection, power engineering computing, data analysis, deep learning technology, energy saving, BibRef

Patino, L., Ferryman, J.M.,
Semantic Modelling for Behaviour Characterisation and Threat Detection,
PETS16(1282-1288)
IEEE DOI 1612
BibRef
And:
Detecting threat behaviours,
AVSS16(88-94)
IEEE DOI 1611
Cameras BibRef

Lu, R., Yang, H., Zhu, J., Wu, S., Wang, J., Bull, D.R.,
Hierarchical video summarization with loitering indication,
VCIP15(1-4)
IEEE DOI 1605
Data mining BibRef

Vijverberg, J.A.[Julien A.], Janssen, R.T.M.[Roel T.M.], de Zwart, R.[Remco], de With, P.H.N.[Peter H.N.],
Perimeter-intrusion event classification for on-line detection using multiple instance learning solving temporal ambiguities,
ICIP14(2408-2412)
IEEE DOI 1502
Algorithm design and analysis BibRef

Burghouts, G.J., van Slingerland, P., ten Hove, R.J.M., den Hollander, R.J.M., Schutte, K.,
Complex threat detection: Learning vs. rules, using a hierarchy of features,
AVSS14(375-380)
IEEE DOI 1411
Engines BibRef

di Caterina, G.[Gaetano], Manap, N.A.[Nurulfajar Abd], Ibrahim, M.M.[Masrullizam Mat], Soraghan, J.J.[John J.],
Real Time Door Access Event Detection and Notification in a Reactive Smart Surveillance System,
ICISP12(459-467).
Springer DOI 1208
BibRef

Garcia, F.[Frederic], Mirbach, B.[Bruno], Cuesta-Contreras, A.[Angel],
AVSS 2011 demo session,
AVSBS11(519-520).
IEEE DOI 1111
3D MLI technology. People and object detection for building safety. BibRef

Senst, T.[Tobias], Patzold, M., Evangelio, R.H.[Ruben Heras], Eiselein, V., Keller, I., Sikora, T.[Thomas],
On building decentralized wide-area surveillance networks based on ONVIF,
MMSysS11(420-423).
IEEE DOI 1111
BibRef

Flammini, F., Pragliola, C., Pappalardo, A., Vittorini, V.,
A robust approach for on-line and off-line threat detection based on event tree similarity analysis,
MMSysS11(414-419).
IEEE DOI 1111
BibRef

Lallier, C., Reynaud, E., Robinault, L., Tougne, L.,
A testing framework for background subtraction algorithms comparison in intrusion detection context,
AVSBS11(314-319).
IEEE DOI 1111
BibRef

Tu, P.[Peter], Yu, T.[Ting], Gao, D.[Dashan], Nevatia, R.[Ram], Lee, S.C.[Sung Chun], Kim, H.[Hale], Rhee, P.K.[Phill Kyu], Baek, J.H.[Joong-Hwan],
A systems level approach to perimeter protection,
WACV12(257-262).
IEEE DOI 1203
BibRef
And: AVSBS11(517-518).
IEEE DOI 1111
AVSS 2011 demo session. BibRef

Bombini, L.[Luca], Broggi, A.[Alberto], Debattisti, S.[Stefano],
Advanced Safety Sensor for Gate Automation,
CIAP11(II: 374-383).
Springer DOI 1109
BibRef

Cucchiara, R.[Rita], Fornaciari, M.[Michele], Haider, R.[Razia], Mandreoli, F.[Federica], Martoglia, R.[Riccardo], Prati, A.[Andrea], Sassatelli, S.[Simona],
A reasoning engine for intruders' localization in wide open areas using a network of cameras and RFIDs,
CNWASA11(33-40).
IEEE DOI 1106
BibRef

Michael, N.[Nicholas], Dilsizian, M.[Mark], Metaxas, D.N.[Dimitris N.], Burgoon, J.K.[Judee K.],
Motion Profiles for Deception Detection Using Visual Cues,
ECCV10(VI: 462-475).
Springer DOI 1009

See also Detecting Concealment of Intent in Transportation Screening: A Proof of Concept. BibRef

Soibam, B., Shah, S.K., Chaudhry, A., Eledath, J.[Jayan],
Quantitative comparison of metrics for change detection in video patrolling applications,
ObjectEvent09(601-608).
IEEE DOI 0910
BibRef

Zhai, Y.[Yun], Hampapur, A.[Arun],
Virtual Boundary Crossing Detection without Explicit Object Tracking,
AVSBS09(518-522).
IEEE DOI 0909
BibRef

Cermak, G.[Grant], Keyzer, K.[Karl],
Unsupervised Intrusion Detection Using Color Images,
ISVC07(II: 770-780).
Springer DOI 0711
BibRef

Kawabata, S.[Satoshi], Hiura, S.[Shinsaku], Sato, K.[Kosuke],
3D Intrusion Detection System with Uncalibrated Multiple Cameras,
ACCV07(I: 149-158).
Springer DOI 0711
BibRef

Dore, A.[Alessio], Regazzoni, C.S.[Carlo S.],
Bayesian Bio-inspired Model for Learning Interactive Trajectories,
AVSBS09(207-212).
IEEE DOI 0909
BibRef

Dore, A.[Alessio], Pinasco, M.[Matteo], Regazzoni, C.S.[Carlo S.],
A Bio-inspired Learning Approach for the Classification of Risk Zones in a Smart Space,
Learning07(1-8).
IEEE DOI 0706
Intrusion detection. Monitor space and warn of intrusion. BibRef

Laskov, P.[Pavel], Düssel, P.[Patrick], Schäfer, C.[Christin], Rieck, K.[Konrad],
Learning Intrusion Detection: Supervised or Unsupervised?,
CIAP05(50-57).
Springer DOI 0509
BibRef

Ryan, A.H.,
Real-time detection of threat,
AVSBS03(3-3).
IEEE DOI 0310
BibRef

McKenna, T.,
Video surveillance and human activity recognition for anti-terrorism and force protection,
AVSBS03(2-2).
IEEE DOI 0310
BibRef

Milanesi, G., Sarti, A., Tubaro, S.,
Robust real-time intrusion detection with fuzzy classification,
ICIP02(III: 437-440).
IEEE DOI 0210
BibRef

Makarov, A.[Aleksej],
Comparison of Background Extraction Based Intrusion Detection Algorithms,
ICIP96(I: 521-524).
IEEE DOI BibRef 9600

Makarov, A., Vesin, J.M., Kunt, M.,
Intrusion Detection Using Extraction of Moving Edges,
ICPR94(A:804-807).
IEEE DOI BibRef 9400

Rosin, P.L.[Paul L.], Ellis, T.[Tim],
Detecting and Classifying Intruders in Image Sequences,
BMVC91(xx-yy).
PDF File. 9109
BibRef

Chapter on Motion -- Human Motion, Surveillance, Tracking, Surveillance, Activities continues in
Human Activities, Interactions between People .


Last update:Nov 26, 2024 at 16:40:19