A Security Model for Detecting Suspicious Patterns in Physical Environment.
Simon FongZhuang YanPublished in: IAS (2007)
Keyphrases
- physical environment
- security model
- virtual environment
- public key
- access control
- security requirements
- ubiquitous computing
- daily life
- human interaction
- security analysis
- data mining techniques
- security architecture
- authentication and key agreement
- real world
- public key cryptography
- anomaly detection
- image quality
- wireless sensor networks
- data mining