In this paper, we propose a method for intrusion de-tection in a video surveillance scenario. For this pur-pose, we train a conditional random field (CRF) on features extracted from a video stream. CRFs estimate a state sequence, given a feature sequence. To detect intrusions, we analyze this state sequence. CRFs are usually trained in a supervised manner. Here, we espe-cially propose a new training algorithm for CRFs based on expectation maximization, which can be used with unlabeled data. We apply the resulting trained CRF to separate normal activities from suspicious behavior. We have successfully tested our algorithm on 169 se-quences.
Sequential anomaly detection is a challenging problem due to the one-class nature of the data (i.e.,...
Activity recognition is an important issue in building intelligent monitoring systems. We address th...
Intrusions pose a serious security threat in a network environment, and therefore need to be promptl...
Abstract- Intrusion detection systems have become a key component in ensuring the safety of systems ...
Abstract- Intrusion detection systems have become a key component in ensuring the safety of systems ...
[[abstract]]This paper proposes a real-time abnormal behavior detection using Conditional Random Fie...
Intrusion detection faces a number of challenges. An intrusion detection system must reliably detect...
This paper introduces a method for Multimedia Event De-tection (MED). Given training videos for a ce...
© 2009 Dr. Kapil Kumar GuptaIntrusion Detection systems are now an essential component in the overal...
ABSTRACT Intrusion detection faces a number of challenges; an intrusion detection system must reliab...
Modern computer systems are plagued by security vulnerabilities and flaws on many levels. Those vuln...
We propose and evaluate an efficient method for automatic identification of suspicious behavior in v...
IEEE International Conference on Advanced Information Networking and Applications (AINA
Due to continuous growth of the Internettechnology, it needs to establish securitymechanism. However...
365-368Decision making for intrusion detection is critical in a distributed environment such as clou...
Sequential anomaly detection is a challenging problem due to the one-class nature of the data (i.e.,...
Activity recognition is an important issue in building intelligent monitoring systems. We address th...
Intrusions pose a serious security threat in a network environment, and therefore need to be promptl...
Abstract- Intrusion detection systems have become a key component in ensuring the safety of systems ...
Abstract- Intrusion detection systems have become a key component in ensuring the safety of systems ...
[[abstract]]This paper proposes a real-time abnormal behavior detection using Conditional Random Fie...
Intrusion detection faces a number of challenges. An intrusion detection system must reliably detect...
This paper introduces a method for Multimedia Event De-tection (MED). Given training videos for a ce...
© 2009 Dr. Kapil Kumar GuptaIntrusion Detection systems are now an essential component in the overal...
ABSTRACT Intrusion detection faces a number of challenges; an intrusion detection system must reliab...
Modern computer systems are plagued by security vulnerabilities and flaws on many levels. Those vuln...
We propose and evaluate an efficient method for automatic identification of suspicious behavior in v...
IEEE International Conference on Advanced Information Networking and Applications (AINA
Due to continuous growth of the Internettechnology, it needs to establish securitymechanism. However...
365-368Decision making for intrusion detection is critical in a distributed environment such as clou...
Sequential anomaly detection is a challenging problem due to the one-class nature of the data (i.e.,...
Activity recognition is an important issue in building intelligent monitoring systems. We address th...
Intrusions pose a serious security threat in a network environment, and therefore need to be promptl...