Return to Article Details A Novel Approach for Identifying Intruder based on Multiple Approaches Download Download PDF