Critical Infrastructure Security Using Computer Vision Technologies (English)
- New search for: Zhang, Xindi
- New search for: Izquierdo, Ebroul
- New search for: Chandramouli, Krishna
- New search for: Markarian, Garik
- New search for: Karlović, Ruža
- New search for: Nitsch, Holger
- New search for: Chandramouli, Krishna
- New search for: Zhang, Xindi
- New search for: Izquierdo, Ebroul
- New search for: Chandramouli, Krishna
In:
Security Technologies and Social Implications
;
149-180
;
2022
-
ISBN:
- Article/Chapter (Book) / Electronic Resource
-
Title:Critical Infrastructure Security Using Computer Vision Technologies
-
Contributors:Markarian, Garik ( editor ) / Karlović, Ruža ( editor ) / Nitsch, Holger ( editor ) / Chandramouli, Krishna ( editor ) / Zhang, Xindi ( author ) / Izquierdo, Ebroul ( author ) / Chandramouli, Krishna ( author )
-
Published in:
-
Publisher:
- New search for: John Wiley & Sons, Inc.
-
Place of publication:Hoboken, NJ, USA
-
Publication date:2022-09-29
-
Size:32 pages
-
ISBN:
-
DOI:
-
Type of media:Article/Chapter (Book)
-
Type of material:Electronic Resource
-
Language:English
-
Keywords:
-
Source:
Table of contents eBook
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 1
-
The Circle of ChangeSučić, Ines et al. | 2022
- 32
-
Data Protection Impact Assessments in Law EnforcementMarquenie, Thomas / Quezada‐Tavárez, Katherine et al. | 2022
- 61
-
Methods of Stakeholder Engagement for the Co‐Design of Security TechnologiesIannone, Andrea / Briguglio, Luigi / Occhipinti, Carmela / Cesaroni, Valeria et al. | 2022
- 82
-
Performance Assessment of Soft Biometrics Technologies for Border CrossingHassan, Bilal / Izquierdo, Ebroul / Chandramouli, Krishna et al. | 2022
- 122
-
Counter‐Unmanned Aerial Vehicle SystemsFortune, David / Nitsch, Holger / Markarian, Garik / Osterman, Damir / Staniforth, Andrew et al. | 2022
- 149
-
Critical Infrastructure Security Using Computer Vision TechnologiesZhang, Xindi / Izquierdo, Ebroul / Chandramouli, Krishna et al. | 2022
- 181
-
Evaluation of Content Fusion Algorithms for Large and Heterogeneous DatasetsAlexakis, Theodoros / Peppes, Nikolaos / Adamopoulou, Evgenia / Demestichas, Konstantinos / Remoundou, Konstantina et al. | 2022
- 198
-
Stakeholder Engagement Model to Facilitate the Uptake by End Users of Crisis Communication SystemsHavârneanu, Grigore M. / Petersen, Laura / McCrone, Natasha et al. | 2022
- 222
-
Crime Mapping in Crime AnalysisMeško, Gorazd / Eman, Katja / Hacin, Rok et al. | 2022
- 247
-
The Threat of Behavioral Radicalization OnlineKarlović, Ruža / Nitsch, Holger / Fikenscher, Sven‐Eric / Osterman, Damir / Menexis, Sotirios / Tsikrika, Theodora / Vrochidis, Stefanos / Kompatsiaris, Ioannis / Sahar, Arif et al. | 2022
- 262
-
Blockchain Technologies for Chain of Custody AuthenticationChandramouli, Krishna / Horincar, Roxana / de Naurois, Charlotte Jacobe / Pallmer, Dirk / Faure, David / Müller, Wilmuth / Demestichas, Konstantinos et al. | 2022
- 290
-
Chances and Challenges of Predictive Policing for Law Enforcement AgenciesAllertseder, Sebastian / Okon, Guenter / Schweer, Thomas et al. | 2022
- 314
-
Index| 2022
- i
-
Front Matter| 2022