Journal articles on the topic 'Intruder detection systems'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Intruder detection systems.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Shevantikar, Pradnesh, Avinash Udata, and Abhishek Korachagao. "Laser-Enabled Intruder Detection System." Journal of Electrical Engineering and Electronics Design 2, no. 1 (2024): 1–4. http://dx.doi.org/10.48001/joeeed.2024.211-4.
Full textShim, Jaeseok, and Yujin Lim. "WSN-Based Height Estimation of Moving Object in Surveillance Systems." Mobile Information Systems 2016 (2016): 1–7. http://dx.doi.org/10.1155/2016/2127593.
Full textAM, Bharath, V. Dhananjaya, Bharath, and S. Nithyanandhan. "IoT Based Thermal Survillance and Security System." IJISE 1, no. 2 (2019): 93–98. https://doi.org/10.5281/zenodo.2794156.
Full textJinisha, J. Josephin, and S. Jerine. "Intrusion Detection Mechanism for Empowered Intruders Using IDEI." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 8s (2023): 186–93. http://dx.doi.org/10.17762/ijritcc.v11i8s.7189.
Full textRzucidło, Paweł, Grzegorz Jaromi, Tomasz Kapuściński, Damian Kordos, Tomasz Rogalski, and Piotr Szczerba. "In-Flight Tests of Intruder Detection Vision System." Sensors 21, no. 21 (2021): 7360. http://dx.doi.org/10.3390/s21217360.
Full textOladunjoye John Abiodun and Okwori Anthony Okpe. "Smart Home Security using Arduino-based Internet of Things (IoTs) Intrusion Detection System." World Journal of Advanced Research and Reviews 22, no. 3 (2024): 857–64. http://dx.doi.org/10.30574/wjarr.2024.22.3.2000.
Full textOladunjoye, John Abiodun, and Anthony Okpe Okwori. "Smart Home Security using Arduino-based Internet of Things (IoTs) Intrusion Detection System." World Journal of Advanced Research and Reviews 22, no. 3 (2024): 857–64. https://doi.org/10.5281/zenodo.14738955.
Full textPeňaška, Michal, and Milan Kutaj. "EXPERIMENTAL TESTING OF PASSIVE INFRARED DETECTORS AND EXAMINING THE PROBABILITY OF INTRUDER DETECTION." CBU International Conference Proceedings 6 (September 25, 2018): 1139–43. http://dx.doi.org/10.12955/cbup.v6.1306.
Full textRzucidło, Paweł, Tomasz Rogalski, Grzegorz Jaromi, Damian Kordos, Piotr Szczerba, and Andrzej Paw. "Simulation studies of a vision intruder detection system." Aircraft Engineering and Aerospace Technology 92, no. 4 (2020): 621–31. http://dx.doi.org/10.1108/aeat-04-2019-0065.
Full textNaing, Thiri, Kyi Kyi Khaing, and Tin Tin Nwet. "Perimeter intrusion detective system using arduino." APTIKOM Journal on Computer Science and Information Technologies 4, no. 3 (2020): 135–40. http://dx.doi.org/10.34306/csit.v4i3.101.
Full textKhaing, Kyi Kyi, Kyi Kyi Khaing, and Tin Tin Nwet. "Perimeter Intrusion Detective System using Arduino." APTIKOM Journal on Computer Science and Information Technologies 4, no. 3 (2019): 135–40. http://dx.doi.org/10.11591/aptikom.j.csit.154.
Full textMala, V., and K. Meena. "Hybrid classification model to detect advanced intrusions using data mining techniques." International Journal of Engineering & Technology 7, no. 2.4 (2018): 10. http://dx.doi.org/10.14419/ijet.v7i2.4.10031.
Full textForlenza, Lidia, Giancarmine Fasano, Domenico Accardo, and Antonio Moccia. "Flight Performance Analysis of an Image Processing Algorithm for Integrated Sense-and-Avoid Systems." International Journal of Aerospace Engineering 2012 (2012): 1–8. http://dx.doi.org/10.1155/2012/542165.
Full textKanoje, Shubhankar, Soham Chakraborty, Jerrin Jiju Chacko, Mohit Hitendra Bisht, and Dr Shaveta Malik. "Intruder Detection System Using Image Processing." International Journal for Research in Applied Science and Engineering Technology 10, no. 8 (2022): 774–81. http://dx.doi.org/10.22214/ijraset.2022.46288.
Full textCao, Lai Cheng, Wei Han, and Sheng Dong. "A New Intrusion Detection Method Based on Machine Learning in Mobile Ad Hoc NETwork." Applied Mechanics and Materials 548-549 (April 2014): 1304–10. http://dx.doi.org/10.4028/www.scientific.net/amm.548-549.1304.
Full textVasuki, P., Sesu Priya A, and Soundarya R. "A Smart Watchdog - Intruder Detection System." International Journal of Engineering & Technology 7, no. 3.34 (2018): 231. http://dx.doi.org/10.14419/ijet.v7i3.34.18971.
Full textZaiets, I., V. Brydinskyi, D. Sabodashko, Yu Khoma, Kh Ruda, and M. Shved. "UTILIZATION OF VOICE EMBEDDINGS IN INTEGRATED SYSTEMS FOR SPEAKER DIARIZATION AND MALICIOUS ACTOR DETECTION." Computer systems and network 6, no. 1 (2024): 54–66. http://dx.doi.org/10.23939/csn2024.01.054.
Full textShree Goyal, Sangya Medhavi, Tanish Mathur, Shwetha S, and Sharadadevi K S. "Secure Authentication Process with Intruder Detection and Reporting Mechanism." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 07, no. 10 (2023): 1–11. http://dx.doi.org/10.55041/ijsrem26213.
Full textNirmala, P., T. Manimegalai, J. R. Arunkumar, S. Vimala, G. Vinoth Rajkumar, and Raja Raju. "A Mechanism for Detecting the Intruder in the Network through a Stacking Dilated CNN Model." Wireless Communications and Mobile Computing 2022 (April 12, 2022): 1–13. http://dx.doi.org/10.1155/2022/1955009.
Full textBen-Zvi, T., and J. V. Nickerson. "Intruder Detection: An Optimal Decision Analysis Strategy." IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews) 42, no. 2 (2012): 249–53. http://dx.doi.org/10.1109/tsmcc.2011.2126043.
Full textTeixidó, Pedro, Juan Antonio Gómez-Galán, Rafael Caballero, et al. "Secured Perimeter with Electromagnetic Detection and Tracking with Drone Embedded and Static Cameras." Sensors 21, no. 21 (2021): 7379. http://dx.doi.org/10.3390/s21217379.
Full textRodelas, Nelson C., and Melvin A. Ballera. "Intruder detection and recognition using different image processing techniques for a proactive surveillance." Indonesian Journal of Electrical Engineering and Computer Science 24, no. 2 (2021): 843. http://dx.doi.org/10.11591/ijeecs.v24.i2.pp843-852.
Full textYadav, Abhinesh Kumar, Anuj Maurya, Amit Verma, and Aman Tomar. "Facial Recognition Based Automated Door." International Research Journal of Computer Science 11, no. 01 (2024): 06–10. http://dx.doi.org/10.26562/irjcs.2024.v1101.02.
Full textWang, Lixin, Jianhua Yang, Michael Workman, and Peng-Jun Wan. "A Framework to Test Resistency of Detection Algorithms for Stepping-Stone Intrusion on Time-Jittering Manipulation." Wireless Communications and Mobile Computing 2021 (August 6, 2021): 1–8. http://dx.doi.org/10.1155/2021/1807509.
Full textWidodo, Rio, and Imam Riadi. "Intruder Detection Systems on Computer Networks Using Host Based Intrusion Detection System Techniques." Buletin Ilmiah Sarjana Teknik Elektro 3, no. 1 (2021): 21. http://dx.doi.org/10.12928/biste.v3i1.1752.
Full textHorielyshev, Stanislav, Pavlo Volkov, Igor Boikov, et al. "Study of the secondary characteristics of the bistatic scattering of a combined object in a covert radar surveillance system." EUREKA: Physics and Engineering, no. 4 (July 30, 2022): 137–51. http://dx.doi.org/10.21303/2461-4262.2022.002493.
Full textHorielyshev, Stanislav, Pavlo Volkov, Igor Boikov, et al. "Study of the secondary characteristics of the bistatic scattering of a combined object in a covert radar surveillance system." EUREKA: Physics and Engineering, no. 4 (July 30, 2022): 137–51. https://doi.org/10.21303/2461-4262.2022.002493.
Full textAhanger, Tariq Ahamed, Usman Tariq, Atef Ibrahim, Imdad Ullah, and Yassine Bouteraa. "IoT-Inspired Framework of Intruder Detection for Smart Home Security Systems." Electronics 9, no. 9 (2020): 1361. http://dx.doi.org/10.3390/electronics9091361.
Full textLan, Chien-Wu, and Chi-Yao Chang. "Development of a Low Cost and Path-free Autonomous Patrol System Based on Stereo Vision System and Checking Flags." Applied Sciences 10, no. 3 (2020): 974. http://dx.doi.org/10.3390/app10030974.
Full textKeerthanna, G. S., Kumar P. Praveen, and Prasad K. |. Ms. S. Sri Heera Vishnu. "A Modern Technique for Unauthorized Human Detection and Intimation." International Journal of Trend in Scientific Research and Development 3, no. 3 (2019): 170–74. https://doi.org/10.31142/ijtsrd21659.
Full textreddy, N. Ajay kumar, T. Ajay kumar, Mohammad Usman, and U. Soma Naidu. "IoT-Driven Smart Home Security with Voice Commands." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 12 (2024): 1–9. https://doi.org/10.55041/ijsrem40274.
Full textYang, Jianhua, Lixin Wang, Maochang Qin, and Noah Neundorfer. "Detecting Stepping-Stone Intrusion and Resisting Intruders’ Manipulation via Cross-Matching Network Traffic and Random Walk." Electronics 12, no. 2 (2023): 394. http://dx.doi.org/10.3390/electronics12020394.
Full textMinwalla, Cyrus, Dan Tulpan, Nabil Belacel, Fazel Famili, and Kristopher Ellis. "Detection of Airborne Collision-Course Targets for Sense and Avoid on Unmanned Aircraft Systems Using Machine Vision Techniques." Unmanned Systems 04, no. 04 (2016): 255–72. http://dx.doi.org/10.1142/s2301385016500102.
Full textOwoeye, Samuel, Folasade Durodola, Adekunle Oyelami, et al. "Implementation of a Smart Home Intruder Detection System using a Vibrometer and ESP 32 CAM." ABUAD Journal of Engineering Research and Development (AJERD) 8, no. 1 (2025): 14–20. https://doi.org/10.53982/ajerd.2025.0801.02-j.
Full textMane, Prof Dipali, Chaitanya Chaudhari, Saurabh Shitole, Mubin Shaikh, and Shivam Sashte. "A Machine Learning Approach for Intrusion Detection." International Journal for Research in Applied Science and Engineering Technology 11, no. 4 (2023): 3811–14. http://dx.doi.org/10.22214/ijraset.2023.51086.
Full textNajbile, Rakshit, Twinkle Rawalani, Vedant Panda, Pratyush Mishra, and Dr Prasanna Deshpande. "Multi-layer Anti-Theft System with an Intruder System." International Journal for Research in Applied Science and Engineering Technology 11, no. 3 (2023): 1445–52. http://dx.doi.org/10.22214/ijraset.2023.49673.
Full textChueh, Hao-En, Shun-Chuan Ho, Shih-Peng Chang, and Ping-Yu Hsu. "Online Intrusion Behaviors: Sequences and Time Intervals." Social Behavior and Personality: an international journal 38, no. 10 (2010): 1307–12. http://dx.doi.org/10.2224/sbp.2010.38.10.1307.
Full textKumar, M. Adarsh, K. Nithin Kumar, N. Sandeep, and Mr B. Sai Reddy. "Advanced Alerting System by Motion Detection." International Journal for Research in Applied Science and Engineering Technology 11, no. 4 (2023): 3504–7. http://dx.doi.org/10.22214/ijraset.2023.51008.
Full textBhati, Nitesh Singh, Manju Khari, Vicente García-Díaz, and Elena Verdú. "A Review on Intrusion Detection Systems and Techniques." International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems 28, Supp02 (2020): 65–91. http://dx.doi.org/10.1142/s0218488520400140.
Full textShterenberg, S. I., and M. A. Poltavtseva. "A Distributed Intrusion Detection System with Protection from an Internal Intruder." Automatic Control and Computer Sciences 52, no. 8 (2018): 945–53. http://dx.doi.org/10.3103/s0146411618080230.
Full textBabar, Muhammad, Sarah Kaleem, Adnan Sohail, Muhammad Asim, and Muhammad Usman Tariq. "An Improved Big Data Analytics Architecture for Intruder Classification Using Machine Learning." Security and Communication Networks 2023 (December 4, 2023): 1–7. http://dx.doi.org/10.1155/2023/1216192.
Full textLaiby, Thomas, and Bhat Subrahmanya. "Machine Learning and Deep Learning Techniques for IoT-based Intrusion Detection Systems: A Literature Review." International Journal of Management, Technology, and Social Sciences (IJMTS) 6, no. 2 (2022): 296–314. https://doi.org/10.5281/zenodo.5814702.
Full textNurellari, Edmond, Daniel Bonilla Licea, Mounir Ghogho, and Mario Eduardo Rivero-Angeles. "On Trajectory Design for Intruder Detection in Wireless Mobile Sensor Networks." IEEE Transactions on Signal and Information Processing over Networks 7 (2021): 236–48. http://dx.doi.org/10.1109/tsipn.2021.3067305.
Full textVitalii, Martovytskyi, Sievierinov Оleksandr, Liashenko Oleksii, et al. "Devising an approach to the identification of system users by their behavior using machine learning methods." Eastern-European Journal of Enterprise Technologies 3, no. 3 (117) (2022): 23–34. https://doi.org/10.15587/1729-4061.2022.259099.
Full textCheong, Kah-Meng, Yih-Liang Shen, and Tai-Shih Chi. "Active acoustic scene monitoring through spectro-temporal modulation filtering for intruder detection." Journal of the Acoustical Society of America 151, no. 4 (2022): 2444–52. http://dx.doi.org/10.1121/10.0010070.
Full textVenkatesh, S., and N. Bhalaji. "A Distance Vector Hop and Differential Evolution based Interception Strategy for detecting Cross Border Infiltration in Underground Tunnel." Defence Science Journal 72, no. 3 (2022): 392–401. http://dx.doi.org/10.14429/dsj.72.17207.
Full textArmoogum, Sheeba, and Nawaz Mohamudally. "A Comprehensive Review of Intrusion Detection and Prevention Systems against Single Flood Attacks in SIP-Based Systems." International Journal of Computer Network and Information Security 13, no. 6 (2021): 13–25. http://dx.doi.org/10.5815/ijcnis.2021.06.02.
Full textAlmanza-Ortega, Nelva Nely, Joaquin Perez-Ortega, Monterrubio Sergio Mauricio Martínez, and Juan A. Recio-Garcia. "Clustering-Based Cyber Situational Awareness: A Practical Approach for Masquerade Attack Detection." Journal of Artificial Intelligence and Computing Applications 2, no. 1 (2024): 35–39. https://doi.org/10.5281/zenodo.14933955.
Full textAbraham, Aibin, Bibin Mathew, Devika Panikkar, and Jaya John. "Literature Review on Detection Systems for Wild Animal Intrusions." March 2023 5, no. 1 (2023): 50–59. http://dx.doi.org/10.36548/jscp.2023.1.005.
Full textNetinant, Paniti, Thitipong Utsanok, Meennapa Rukhiran, and Suttipong Klongdee. "Development and Assessment of Internet of Things-Driven Smart Home Security and Automation with Voice Commands." IoT 5, no. 1 (2024): 79–99. http://dx.doi.org/10.3390/iot5010005.
Full text