C4.5: programs for machine learning
C4.5: programs for machine learning
LOF: identifying density-based local outliers
SIGMOD '00 Proceedings of the 2000 ACM SIGMOD international conference on Management of data
Semantic Web: Concepts, Technologies and Applications (NASA Monographs in Systems and Software Engineering)
Intrusion detection in web applications using text mining
Engineering Applications of Artificial Intelligence
Using backpropagation neural network for face recognition with 2D+3D hybrid information
Expert Systems with Applications: An International Journal
Ambient Intelligence—the Next Step for Artificial Intelligence
IEEE Intelligent Systems
Hi-index | 0.00 |
We present a security system consisting of an arbitrary number of entries, sensors and agents. The intelligent integrated system is based on user modeling, i.e. models of their previous entries, using several levels of description and several single machine learning agents. The system is specialized for high-security tasks, e.g. controlling entry to a headquarter and for scenarios including terrorist attacks or kidnapping, when the attackers formally bypass the existing sensors, but fail to imitate normal movement of an employee. An experimental setup was implemented to verify the successfulness of the approach.