Surveillance in Action

Surveillance in Action

Technologies for Civilian, Military and Cyber Surveillance

Bourlai, Thirimachos; Karampelas, Panagiotis

Springer International Publishing AG

09/2018

412

Mole

Inglês

9783319886183

15 a 20 dias

652

Descrição não disponível.
Part I - Surveillance of Human Features.- A Survey of Using Biometrics for Smart Visual Surveillance: Gait Recognition.- Comparative Face Soft Biometrics for Human Identification.- Video-Based Human Respiratory Wavelet Extraction and Identity Recognition.- A Study on Human Recognition using Auricle and Side View Face Images.- Cross-spectral Iris Matching for Surveillance Applications.- Facial Surveillance and Recognition in the Passive Infrared Bands.- Deep Feature Learning for Classification when using Single Sensor Multi-Wavelength based Facial Recognition Systems in SWIR Band.- Part II - Surveillance for Security and Defense.- Managing Uncertainty from the Sky: Surveillance through three Generations of Commercial Earth Observation Satellites.- Drones Surveillance - Challenges and Techniques.- Early Warning Against Stealth Aircraft, Missiles and Unmanned Aerial Vehicles. Mobile Data Fusion for Maritime Surveillance.- Mobile stand-off and stand-in surveillance against biowarfare and bioterrorism agents.- Social Networks for Surveillance and Security: 'Using Online Techniques to make something happen in the real or cyber world'.- Surveillance, targeted killing and the fight against Terrorism: a fair-played game.- Part III - Cyber Surveillance Data Hiding in the Wild: Where Computational Intelligence Meets Digital Forensics.- Methods to Detect Cyber threats on Twitter.- Detecting Users Who Share Extremist Content on Twitter.- An Organizational Visualization Profiler Tool Based on Social Interactions.- Cyber-Surveillance Analysis for Supercomputing Environments.
Este título pertence ao(s) assunto(s) indicados(s). Para ver outros títulos clique no assunto desejado.
electronic surveillance;homeland security;privacy and surveillance;border surveillance;biometrics for surveillance;cyber threats;cybersecurity;ethics of surveillance;surveillance and privacy;surveillance-related technologies