Cargando…

Surveillance in Action : Technologies for Civilian, Military and Cyber Surveillance /

This book addresses surveillance in action-related applications, and presents novel research on military, civil and cyber surveillance from an international team of experts. The first part of the book, Surveillance of Human Features, reviews surveillance systems that use biometric technologies. It d...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Otros Autores: Karampelas, Panagiotis (Editor ), Bourlai, Thirimachos (Editor )
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Cham : Springer International Publishing : Imprint : Springer, 2018.
Colección:Advanced sciences and technologies for security applications,
Temas:
Acceso en línea:Texto completo
Tabla de Contenidos:
  • Part I
  • Surveillance of Human Features
  • A Survey of Using Biometrics for Smart Visual Surveillance: Gait Recognition
  • Comparative Face Soft Biometrics for Human Identification
  • Video-Based Human Respiratory Wavelet Extraction and Identity Recognition
  • A Study on Human Recognition using Auricle and Side View Face Images
  • Cross-spectral Iris Matching for Surveillance Applications
  • Facial Surveillance and Recognition in the Passive Infrared Bands
  • Deep Feature Learning for Classification when using Single Sensor Multi-Wavelength based Facial Recognition Systems in SWIR Band
  • Part II
  • Surveillance for Security and Defense
  • Managing Uncertainty from the Sky: Surveillance through three Generations of Commercial Earth Observation Satellites
  • Drones Surveillance
  • Challenges and Techniques
  • Early Warning Against Stealth Aircraft, Missiles and Unmanned Aerial Vehicles. Mobile Data Fusion for Maritime Surveillance
  • Mobile stand-off and stand-in surveillance against biowarfare and bioterrorism agents
  • Social Networks for Surveillance and Security: 'Using Online Techniques to make something happen in the real or cyber world'
  • Surveillance, targeted killing and the fight against Terrorism: a fair-played game
  • Part III
  • Cyber Surveillance Data Hiding in the Wild: Where Computational Intelligence Meets Digital Forensics
  • Methods to Detect Cyber threats on Twitter
  • Detecting Users Who Share Extremist Content on Twitter
  • An Organizational Visualization Profiler Tool Based on Social Interactions
  • Cyber-Surveillance Analysis for Supercomputing Environments.