{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T11:01:15Z","timestamp":1730199675950,"version":"3.28.0"},"reference-count":16,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,8]]},"DOI":"10.1109\/avss.2011.6027304","type":"proceedings-article","created":{"date-parts":[[2011,10,3]],"date-time":"2011-10-03T15:34:13Z","timestamp":1317656053000},"page":"113-118","source":"Crossref","is-referenced-by-count":5,"title":["Detection of abnormal behaviour in a surveillance environment using control charts"],"prefix":"10.1109","author":[{"given":"Stefan","family":"Hommes","sequence":"first","affiliation":[]},{"given":"Radu","family":"State","sequence":"additional","affiliation":[]},{"given":"Andreas","family":"Zinnen","sequence":"additional","affiliation":[]},{"given":"Thomas","family":"Engel","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"15","DOI":"10.1109\/CVPR.2001.990517"},{"key":"16","article-title":"Multivariate statistical analysis of audit trails for host-based intrusion detection. Computers","volume":"51","author":"ye","year":"2002","journal-title":"IEEE Transactions on"},{"doi-asserted-by":"publisher","key":"13","DOI":"10.1109\/AVSS.2010.39"},{"doi-asserted-by":"publisher","key":"14","DOI":"10.1007\/s11263-007-0090-8"},{"doi-asserted-by":"publisher","key":"11","DOI":"10.1109\/AVSS.2010.74"},{"doi-asserted-by":"publisher","key":"12","DOI":"10.1109\/AVSS.2010.15"},{"key":"3","first-page":"1","article-title":"Finding behavioural anomalies in public areas using video surveillance data","author":"brax","year":"2008","journal-title":"2008 11th International Conference on Information Fusion FUSION"},{"year":"2008","author":"bradski","journal-title":"Learning OpenCV","key":"2"},{"doi-asserted-by":"publisher","key":"1","DOI":"10.1109\/TPAMI.2007.70825"},{"year":"2008","author":"oakland","journal-title":"Statistical Process Control","key":"10"},{"doi-asserted-by":"publisher","key":"7","DOI":"10.1080\/00401706.1990.10484583"},{"doi-asserted-by":"publisher","key":"6","DOI":"10.1109\/ICDCSW.2005.112"},{"year":"1956","author":"electric","journal-title":"Statistical Quality Control Handbook","key":"5"},{"year":"2008","author":"elbasi","journal-title":"Control Charts Approach for Scenario Recognition in Video Sequences","key":"4"},{"key":"9","first-page":"88","article-title":"Automated visual surveillance using hidden markov models","author":"nair","year":"2002","journal-title":"Vision Interface"},{"doi-asserted-by":"publisher","key":"8","DOI":"10.1109\/34.946990"}],"event":{"name":"2011 8th IEEE International Conference on Advanced Video and Signal Based Surveillance (AVSS)","start":{"date-parts":[[2011,8,30]]},"location":"Klagenfurt, Austria","end":{"date-parts":[[2011,9,2]]}},"container-title":["2011 8th IEEE International Conference on Advanced Video and Signal Based Surveillance (AVSS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6022616\/6027273\/06027304.pdf?arnumber=6027304","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,21]],"date-time":"2017-03-21T08:31:43Z","timestamp":1490085103000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6027304\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,8]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/avss.2011.6027304","relation":{},"subject":[],"published":{"date-parts":[[2011,8]]}}}