{"id":"https://openalex.org/W1995187635","doi":"https://doi.org/10.1109/bcfic.2012.6218000","title":"Cloud controlled intrusion detection and burglary prevention stratagems in home automation systems","display_name":"Cloud controlled intrusion detection and burglary prevention stratagems in home automation systems","publication_year":2012,"publication_date":"2012-04-01","ids":{"openalex":"https://openalex.org/W1995187635","doi":"https://doi.org/10.1109/bcfic.2012.6218000","mag":"1995187635"},"language":"en","primary_location":{"id":"doi:10.1109/bcfic.2012.6218000","is_oa":false,"landing_page_url":"https://doi.org/10.1109/bcfic.2012.6218000","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2012 2nd Baltic Congress on Future Internet Communications","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5003410244","display_name":"Ananda Maiti","orcid":"https://orcid.org/0000-0003-0785-5282"},"institutions":[{"id":"https://openalex.org/I876193797","display_name":"Vellore Institute of Technology University","ror":"https://ror.org/00qzypv28","country_code":"IN","type":"education","lineage":["https://openalex.org/I876193797"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"A. Maiti","raw_affiliation_strings":["School of Computing Science & Engineering, VIT University, Vellore, India","School of Computing Science and Engineering VIT University  Vellore India"],"affiliations":[{"raw_affiliation_string":"School of Computing Science & Engineering, VIT University, Vellore, India","institution_ids":["https://openalex.org/I876193797"]},{"raw_affiliation_string":"School of Computing Science and Engineering VIT University  Vellore India","institution_ids":["https://openalex.org/I876193797"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5076142747","display_name":"S. Sivanesan","orcid":null},"institutions":[{"id":"https://openalex.org/I876193797","display_name":"Vellore Institute of Technology University","ror":"https://ror.org/00qzypv28","country_code":"IN","type":"education","lineage":["https://openalex.org/I876193797"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"S. Sivanesan","raw_affiliation_strings":["School of Computing Science & Engineering, VIT University, Vellore, India","School of Computing Science and Engineering VIT University  Vellore India"],"affiliations":[{"raw_affiliation_string":"School of Computing Science & Engineering, VIT University, Vellore, India","institution_ids":["https://openalex.org/I876193797"]},{"raw_affiliation_string":"School of Computing Science and Engineering VIT University  Vellore India","institution_ids":["https://openalex.org/I876193797"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5003410244"],"corresponding_institution_ids":["https://openalex.org/I876193797"],"apc_list":null,"apc_paid":null,"fwci":1.964,"has_fulltext":false,"cited_by_count":27,"citation_normalized_percentile":{"value":0.8682203,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"182","last_page":"186"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12222","display_name":"IoT-based Smart Home Systems","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12222","display_name":"IoT-based Smart Home Systems","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9986000061035156,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9976999759674072,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.7540886402130127},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.746751606464386},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7339591979980469},{"id":"https://openalex.org/keywords/home-security","display_name":"Home security","score":0.5801541209220886},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5662736296653748},{"id":"https://openalex.org/keywords/event","display_name":"Event (particle physics)","score":0.5105803608894348},{"id":"https://openalex.org/keywords/automation","display_name":"Automation","score":0.5076082944869995},{"id":"https://openalex.org/keywords/home-automation","display_name":"Home automation","score":0.4633759558200836},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.45067834854125977},{"id":"https://openalex.org/keywords/service","display_name":"Service (business)","score":0.43039470911026},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.3645588159561157},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.2303828001022339},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.2007465660572052},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.16671976447105408}],"concepts":[{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.7540886402130127},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.746751606464386},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7339591979980469},{"id":"https://openalex.org/C2779750879","wikidata":"https://www.wikidata.org/wiki/Q22908936","display_name":"Home security","level":2,"score":0.5801541209220886},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5662736296653748},{"id":"https://openalex.org/C2779662365","wikidata":"https://www.wikidata.org/wiki/Q5416694","display_name":"Event (particle physics)","level":2,"score":0.5105803608894348},{"id":"https://openalex.org/C115901376","wikidata":"https://www.wikidata.org/wiki/Q184199","display_name":"Automation","level":2,"score":0.5076082944869995},{"id":"https://openalex.org/C507571656","wikidata":"https://www.wikidata.org/wiki/Q848436","display_name":"Home automation","level":2,"score":0.4633759558200836},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.45067834854125977},{"id":"https://openalex.org/C2780378061","wikidata":"https://www.wikidata.org/wiki/Q25351891","display_name":"Service (business)","level":2,"score":0.43039470911026},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3645588159561157},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.2303828001022339},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.2007465660572052},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.16671976447105408},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C78519656","wikidata":"https://www.wikidata.org/wiki/Q101333","display_name":"Mechanical engineering","level":1,"score":0.0},{"id":"https://openalex.org/C136264566","wikidata":"https://www.wikidata.org/wiki/Q159810","display_name":"Economy","level":1,"score":0.0},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/bcfic.2012.6218000","is_oa":false,"landing_page_url":"https://doi.org/10.1109/bcfic.2012.6218000","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2012 2nd Baltic Congress on Future Internet Communications","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.7799999713897705}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":12,"referenced_works":["https://openalex.org/W2031328395","https://openalex.org/W2079698029","https://openalex.org/W2105545194","https://openalex.org/W2106832620","https://openalex.org/W2111471723","https://openalex.org/W2114296561","https://openalex.org/W2115115541","https://openalex.org/W2147838857","https://openalex.org/W2160620864","https://openalex.org/W4242388542","https://openalex.org/W6676497171","https://openalex.org/W6676703474"],"related_works":["https://openalex.org/W4205726527","https://openalex.org/W74097913","https://openalex.org/W3158356294","https://openalex.org/W4206112541","https://openalex.org/W2920725863","https://openalex.org/W4382774465","https://openalex.org/W2104360586","https://openalex.org/W4382315589","https://openalex.org/W3191125764","https://openalex.org/W2588856805"],"abstract_inverted_index":{"Security":[0],"surveillance":[1],"partakes":[2],"in":[3,86],"significant":[4],"number":[5],"of":[6,38,64,90],"home":[7,44,66,143],"automation":[8,45,67,144],"systems,":[9],"deploying":[10],"digital":[11],"cameras":[12],"and":[13,17,21,36,52,76],"sensors":[14],"to":[15,81,135,152],"monitor":[16,108],"report":[18,151],"intrusion":[19,50,74,92,110,126],"events":[20],"thereby":[22],"reducing":[23],"damages":[24],"caused":[25],"by":[26,118],"burglary.":[27],"In":[28,88],"this":[29],"paper,":[30],"we":[31],"present":[32],"the":[33,98,109,120,125,129,153],"design,":[34],"implementation":[35],"operation":[37],"a":[39,82,101],"cloud":[40,84,95],"connected":[41],"adhoc":[42],"wireless":[43],"system":[46,68],"with":[47,57,100,133],"en":[48],"suite":[49],"detection":[51,75],"burglary":[53,158],"prevention":[54],"stratagems.":[55],"Along":[56],"an":[58,91],"improved":[59],"infrared":[60],"camera,":[61],"each":[62],"node":[63],"our":[65,142],"has":[69],"devised":[70],"intelligent":[71],"algorithms":[72],"for":[73],"subsequently":[77],"reports":[78],"any":[79,114],"event":[80],"location-aware":[83],"service":[85,96],"real-time.":[87],"case":[89],"event,":[93],"another":[94],"alerts":[97],"user":[99,105,130],"SMS":[102],"conversation.":[103],"The":[104],"can":[106,159],"then":[107],"from":[111],"anywhere,":[112],"on":[113],"Internet":[115],"enable":[116],"device":[117],"accessing":[119],"cloud's":[121],"web":[122],"interface.":[123],"If":[124],"is":[127,131],"genuine,":[128],"provided":[132],"options":[134],"stealthily":[136],"alert":[137],"neighbors":[138],"(who":[139],"are":[140],"using":[141],"system),":[145],"play":[146],"alarm":[147],"sounds":[148],"or":[149],"even":[150],"police.":[154],"Using":[155],"these":[156],"techniques,":[157],"be":[160],"evaded":[161],"effectively.":[162]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":2},{"year":2019,"cited_by_count":2},{"year":2018,"cited_by_count":4},{"year":2017,"cited_by_count":3},{"year":2016,"cited_by_count":2},{"year":2015,"cited_by_count":2},{"year":2014,"cited_by_count":2},{"year":2013,"cited_by_count":2},{"year":2012,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
