Biometrics on smart cards: an approach to keyboard behavioral signature
Future Generation Computer Systems - Special issue on smart cards
A perspective view and survey of meta-learning
Artificial Intelligence Review
Adapted user-dependent multimodal biometric authentication exploiting general information
Pattern Recognition Letters
Using backpropagation neural network for face recognition with 2D+3D hybrid information
Expert Systems with Applications: An International Journal
Real-time credit card fraud detection using computational intelligence
Expert Systems with Applications: An International Journal
A local experts organization model with application to face emotion recognition
Expert Systems with Applications: An International Journal
Unusual human behavior recognition using evolutionary technique
Computers and Industrial Engineering
Expert Systems with Applications: An International Journal
An ambient software monitoring system for unsupervised user modelling
Expert Systems with Applications: An International Journal
Irregular behavior recognition based on two types of treading tracks under particular scenes
KSEM'07 Proceedings of the 2nd international conference on Knowledge science, engineering and management
Metalearning: Applications to Data Mining
Metalearning: Applications to Data Mining
Hi-index | 12.05 |
Entry control is an important security measure that prevents undesired persons from entering secure areas. The advanced risk analysis presented in this paper makes it possible to distinguish between acceptable and unacceptable entries, based on several entry sensors, such as fingerprint readers, and intelligent methods that learn behavior from previous entries. We have extended the intelligent layer in two ways: first, by adding a meta-learning layer that combines the output of specific intelligent modules, and second, by constructing a Bayesian network to integrate the predictions of the learning and meta-learning modules. The obtained results represent an important improvement in detecting security attacks.