IEEE International Conference on E-Technology, E-Commerce and E-Service, 2004. EEE '04. 2004 2004
DOI: 10.1109/eee.2004.1287363
|View full text |Cite
|
Sign up to set email alerts
|

Smart card-based irregular access patterns detection system

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2007
2007
2012
2012

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 7 publications
0
2
0
Order By: Relevance
“…These works although in a somewhat early stage, have shed some light on modeling user behavior especially the abnormal ones in a physical environment. For instance, [3] defined a real-time detection model for inspecting irregular access patterns of users movements.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…These works although in a somewhat early stage, have shed some light on modeling user behavior especially the abnormal ones in a physical environment. For instance, [3] defined a real-time detection model for inspecting irregular access patterns of users movements.…”
Section: Introductionmentioning
confidence: 99%
“…However relatively little work is on intrusion detection in physical environment. Some pioneers are [3] and [4] who developed logical models for detecting suspicious patterns in contact-based smart cards and contactless RFID cards in physical access environments respectively. Tamas in [5] developed profiles that describe user behavior in Computer Forensic investigations.…”
Section: Introductionmentioning
confidence: 99%