2020 5th International Conference on Communication and Electronics Systems (ICCES) 2020
DOI: 10.1109/icces48766.2020.9137923
|View full text |Cite
|
Sign up to set email alerts
|

Intruder Detection System - A LoRa Based Approach

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 7 publications
0
3
0
Order By: Relevance
“…(iii) Intruders: Security of applications against intruders and intruder detection [102] is an immense and dynamic problem in several domains including IoT scenarios. In the context of SARA/SNAPS, it is important to strike an operational balance between the infinite breadth of this problem versus a feasible inclusion of a verification system which can authenticate and authorize users accessing various parts of the SNAPS network/application.…”
Section: Decision Support Application-cybersecuritymentioning
confidence: 99%
“…(iii) Intruders: Security of applications against intruders and intruder detection [102] is an immense and dynamic problem in several domains including IoT scenarios. In the context of SARA/SNAPS, it is important to strike an operational balance between the infinite breadth of this problem versus a feasible inclusion of a verification system which can authenticate and authorize users accessing various parts of the SNAPS network/application.…”
Section: Decision Support Application-cybersecuritymentioning
confidence: 99%
“…Mallikarjun et al [21] proposed an automated NLP-based text processing approach. Their approach can successfully convert an excel datasheet into a DBMS.…”
Section: Related Workmentioning
confidence: 99%
“…The system gives flexibility to the farmers for guaranteeing full protection of their farmlands from any suspicious activities or attacks. Mallikarjun et al [15] implemented an intruder detection system based on long range (LoRa) approach, which marks the usages of PIR sensor to sense the intruder and their nearby environment. They use the LoRa approach to send the information to the control system for further processing, to make an appropriate decision.…”
Section: Related Workmentioning
confidence: 99%