Title :
Mining Suspicious Patterns in Physical Environment
Author_Institution :
Fac. of Sci. & Technol., Univ. of Macau, Macau
Abstract :
In the view of escalating threat in homeland security, it is imperative to have an automated detection system that can pick up suspicious patterns of human movement in physical environments. It can give a forewarning before a planned attack happens or an ultimate security is breached. In the past, significant research on intrusion detection systems was established, but limited to virtual environments like computer networks and operating systems. In this paper, we proposed a general mining model for detecting suspicious patterns in physical environment. Suspicious patterns are subtle, relatively difficult to define and detect. Experiments are currently being conducted.
Keywords :
data mining; security of data; automated detection system; computer networks; homeland security; intrusion detection systems; mining model; operating systems; physical environments; virtual environments; Biomedical monitoring; Computer networks; Data security; Intrusion detection; Joining processes; National security; Operating systems; Permission; Terrorism; Virtual environment; Data-mining; Intrusion Detection; physical environment security;
Conference_Titel :
Anti-counterfeiting, Security, Identification, 2007 IEEE International Workshop on
Conference_Location :
Xiamen, Fujian
Print_ISBN :
1-4244-1035-5
Electronic_ISBN :
1-4244-1035-5
DOI :
10.1109/IWASID.2007.373669