{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,11,5]],"date-time":"2024-11-05T05:05:44Z","timestamp":1730783144863,"version":"3.28.0"},"publisher-location":"Cham","reference-count":25,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031488788"},{"type":"electronic","value":"9783031488795"}],"license":[{"start":{"date-parts":[[2023,11,30]],"date-time":"2023-11-30T00:00:00Z","timestamp":1701302400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,11,30]],"date-time":"2023-11-30T00:00:00Z","timestamp":1701302400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-031-48879-5_13","type":"book-chapter","created":{"date-parts":[[2023,11,29]],"date-time":"2023-11-29T08:03:12Z","timestamp":1701244992000},"page":"156-170","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Authentication and Access Control by Face Recognition and Intrusion Detection System"],"prefix":"10.1007","author":[{"given":"Indrajit","family":"Das","sequence":"first","affiliation":[]},{"given":"Papiya","family":"Das","sequence":"additional","affiliation":[]},{"given":"Ritabrata","family":"Roychowdhury","sequence":"additional","affiliation":[]},{"given":"Subhrapratim","family":"Nath","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,11,30]]},"reference":[{"key":"13_CR1","doi-asserted-by":"crossref","unstructured":"Wang, Z., Gao, F.: An embedded parallel face detection system based on multicore processor. In: IEEE 2nd Advanced Information Technology, Electronic and Automation Control Conference (IAEAC), pp. 2684\u20132688 (2017). ISBN: 978-1-4673-8979-2","DOI":"10.1109\/IAEAC.2017.8054513"},{"key":"13_CR2","doi-asserted-by":"crossref","unstructured":"Ji, P., Kim, Y., Yang, Y., Kim, Y.S.: Face occlusion detection using skin color ratio and LBP features for intelligent video surveillance systems. In: Federated Conference on Computer Science and Information Systems (FedCSIS), pp. 253\u2013259 (2016). ISBN: 978-8-3608-1090-3","DOI":"10.15439\/2016F508"},{"key":"13_CR3","unstructured":"Li, T., Hou, W., Lyu, F., Lei, Y., Xiao, C.: Face detection based-on depth information using HOG-LBP. In: 6th International Conference on Instrumentation and Measurement, Computer, Communication and Control, pp.779\u2013784 (2016). ISBN: 978-1-5090-1195-7"},{"key":"13_CR4","doi-asserted-by":"crossref","unstructured":"Thiyagarajan, B.V., Mayur, A., Ravina, B., Akilesh, G.: LBP-Haar multi-feature pedestrian detection for AutoBraking and steering control system. In: International Conference on Computational Intelligence and Communication Networks (CICN), pp. 1527\u20131531 (2015). ISBN: 978-1-5090-0077-7","DOI":"10.1109\/CICN.2015.340"},{"key":"13_CR5","doi-asserted-by":"crossref","unstructured":"Faudzi, S.A.A.M., Yahya, N.: Evaluation of LBP \u2013 based face recognition techniques. In: International Conference on Intelligent and Advanced Systems (ICIAS), pp. 1\u20136 (2014). ISBN: 978-1-4799-4653-2","DOI":"10.1109\/ICIAS.2014.6869522"},{"issue":"1","key":"13_CR6","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1162\/jocn.1991.3.1.71","volume":"3","author":"M Turk","year":"1991","unstructured":"Turk, M., Pentland, A.: Eigenfaces for recognition. J. Cogn. Neurosci. 3(1), 71\u201386 (1991)","journal-title":"J. Cogn. Neurosci."},{"key":"13_CR7","doi-asserted-by":"crossref","unstructured":"Kumar, D.: Ddos attacks and their types. In: Network Security Attacks and Countermeasures, p. 197 (2016)","DOI":"10.4018\/978-1-4666-8761-5.ch007"},{"issue":"3","key":"13_CR8","doi-asserted-by":"publisher","first-page":"1496","DOI":"10.1109\/SURV.2013.102913.00020","volume":"16","author":"E Bou-Harb","year":"2014","unstructured":"Bou-Harb, E., Debbabi, M., Assi, C.: Cyber scanning: a comprehensive survey. IEEE Commun. Surv. Tutor. 16(3), 1496\u20131519 (2014)","journal-title":"IEEE Commun. Surv. Tutor."},{"issue":"3","key":"13_CR9","doi-asserted-by":"publisher","first-page":"371","DOI":"10.1109\/TSE.2010.60","volume":"37","author":"K Manadhata","year":"2011","unstructured":"Manadhata, K., Wing, J.M.: An attack surface metric. IEEE Trans. Softw. Eng. 37(3), 371\u2013386 (2011)","journal-title":"IEEE Trans. Softw. Eng."},{"issue":"5","key":"13_CR10","first-page":"1","volume":"9","author":"S Singh","year":"2009","unstructured":"Singh, S., Silakari, S.: A survey of cyberattack detection systems. Int. J. Comput. Sci. Netw. Secur. 9(5), 1\u201310 (2009)","journal-title":"Int. J. Comput. Sci. Netw. Secur."},{"key":"13_CR11","doi-asserted-by":"crossref","unstructured":"Rostamipour, M., Sadeghiyan, B.: Network attack origin forensics with fuzzy logic. In: 2015 5th International Conference on Computer and Knowledge Engineering (ICCKE), pp. 67\u201372. IEEE (2015)","DOI":"10.1109\/ICCKE.2015.7365863"},{"key":"13_CR12","doi-asserted-by":"publisher","first-page":"221","DOI":"10.1007\/978-1-4842-1712-2_8","volume-title":"Enterprise Mac Security","author":"C Edge","year":"2016","unstructured":"Edge, C., O\u2019Donnell, D.: Malware security: combating viruses, worms, and root kits. In: Enterprise Mac Security, pp. 221\u2013242. Apress, Berkeley (2016). https:\/\/doi.org\/10.1007\/978-1-4842-1712-2_8"},{"key":"13_CR13","series-title":"Advances in Intelligent Systems and Computing","doi-asserted-by":"publisher","first-page":"337","DOI":"10.1007\/978-81-322-2523-2_32","volume-title":"Proceedings of the Second International Conference on Computer and Communication Technologies","author":"S Bahl","year":"2016","unstructured":"Bahl, S., Sharma, S.K.: A minimal subset of features using correlation feature selection model for intrusion detection system. In: Satapathy, S.C., Raju, K.S., Mandal, J.K., Bhateja, V. (eds.) Proceedings of the Second International Conference on Computer and Communication Technologies. AISC, vol. 380, pp. 337\u2013346. Springer, New Delhi (2016). https:\/\/doi.org\/10.1007\/978-81-322-2523-2_32"},{"key":"13_CR14","doi-asserted-by":"crossref","unstructured":"Surve, M., Joshi, P., Jamadar, S., Vharkate, M.: Automatic attendance system using face recognition technique. Int. J. Recent Technol. Eng. (IJRTE). IEEE 9(1) (2020)","DOI":"10.35940\/ijrte.A2644.059120"},{"key":"13_CR15","doi-asserted-by":"crossref","unstructured":"Palanivel, N., Aswinkumar, S., Balaji, J.: Automated attendance systems using face recognition by K-means algorithms. In: International Conference on System Computation Automation and Networking. IEEE (2019)","DOI":"10.1109\/ICSCAN.2019.8878790"},{"key":"13_CR16","doi-asserted-by":"crossref","unstructured":"Jenif, D., Souza, W.S., Jothi, S., Chandrasekar, A.: Automated attendance marking and management system by facial recognition using histogram. In: 5th International Conference on Advanced Computing & Communication Systems (ICACCS). IEEE (2019)","DOI":"10.1109\/ICACCS.2019.8728399"},{"issue":"5","key":"13_CR17","first-page":"1377","volume":"120","author":"M Kasiselvanathan","year":"2018","unstructured":"Kasiselvanathan, M., Kalaiselvi, A., Vimal, S.P., Sangeetha, V.: Smart attendance management system based on face recognition algorithm. Int. J. Pure Appl. Math. 120(5), 1377\u20131384 (2018)","journal-title":"Int. J. Pure Appl. Math."},{"key":"13_CR18","unstructured":"Li, X.-Y.: Face recognition supported HOG and quick PCA rule. In: Euro China Conference on Intelligent Data Analysis and Applications (2017)"},{"key":"13_CR19","doi-asserted-by":"crossref","unstructured":"Kumar, V.D.A., Ashok Kumar, V.D., Malathi, S., Vengatesan, K., Ramakrishnan, M.: Facial recognition system for suspect identification using a surveillance camera. Pattern Recognit. Image Anal. 28, 410\u2013420 (2018)","DOI":"10.1134\/S1054661818030136"},{"key":"13_CR20","doi-asserted-by":"crossref","unstructured":"Kumar, V.D.A., Ramya, S., Divakar, H., Rajeswari, G.K.: A survey on face recognition in video surveillance. In: International Conference on ISMAC in Computational Vision and Bioengineering, pp. 699\u2013708 (2018)","DOI":"10.1007\/978-3-030-00665-5_69"},{"key":"13_CR21","doi-asserted-by":"crossref","unstructured":"Venkatesan, R., Anni Princy, B., Kumar, V.D.A., Raghuraman, M., Gupta, M.K., Kumar, A.: Secure online payment through facial recognition and proxy detection with the help of Triple DES encryption. J. Discr. Math. Sci. Cryptogr. 24(8), 2195\u20132205 (2021)","DOI":"10.1080\/09720529.2021.2011096"},{"key":"13_CR22","doi-asserted-by":"crossref","unstructured":"Brahmi, H., Imen, B., Sadok, B.: OMC-IDS: at the cross-roads of OLAP mining and intrusion detection. In: Advances in Knowledge Discovery and Data Mining, pp. 13\u201324. Springer, New York (2012)","DOI":"10.1007\/978-3-642-30220-6_2"},{"key":"13_CR23","doi-asserted-by":"publisher","first-page":"360","DOI":"10.1016\/j.asoc.2015.10.011","volume":"38","author":"AA Aburomman","year":"2016","unstructured":"Aburomman, A.A., Reaz, M.B.I.: A novel svm-K-NN-pso ensemble method for intrusion detection system. Appl. Soft Comput. 38, 360\u2013372 (2016)","journal-title":"Appl. Soft Comput."},{"issue":"6","key":"13_CR24","first-page":"25","volume":"98","author":"H Saxena","year":"2014","unstructured":"Saxena, H., Richariya, V.: Intrusion detection in KDD99 dataset using SVM-PSO and feature reduction with information gain. Int. J. Comput. Appl. 98(6), 25\u201329 (2014)","journal-title":"Int. J. Comput. Appl."},{"key":"13_CR25","doi-asserted-by":"crossref","unstructured":"Das, I., Sarkar, A., Singh, S., Sawant, S.K.: Authentication and secure communication by Haar Cascade classifier, eigen face, LBP histogram and variable irreducible polynomial in (28) finite field. In: 2021 Devices for Integrated Circuit (DevIC), Kalyani, pp. 536\u2013540 (2021)","DOI":"10.1109\/DevIC50843.2021.9455927"}],"container-title":["Communications in Computer and Information Science","Computational Intelligence in Communications and Business Analytics"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-48879-5_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,4]],"date-time":"2024-11-04T06:56:59Z","timestamp":1730703419000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-48879-5_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,30]]},"ISBN":["9783031488788","9783031488795"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-48879-5_13","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2023,11,30]]},"assertion":[{"value":"30 November 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"CICBA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Computational Intelligence in Communications and Business Analytics","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Kalyani","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"India","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27 January 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28 January 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"cicba2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.cicba.in","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"https:\/\/easychair.org\/","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"187","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"52","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"28% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2.6","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2.5","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}