default search action
ICCST 2012: Newton, MA, USA
- IEEE International Carnahan Conference on Security Technology, ICCST 2012, Newton, MA, USA, October 15-18, 2012. IEEE 2012, ISBN 978-1-4673-2450-2
- Keith Harman, Wayne K. Messner:
Outdoor perimeter security sensors a forty year perspective. 1-9 - Dean Dominguez, Mancel Jordan Parks, Adam D. Williams, Susan Washburn:
Special Nuclear material and critical infrastructure security modeling and simulation of physical protection systems. 10-14 - Zdenek Vintr, Michal Vintr, Jindrich Malach:
Evaluation of physical protection system effectiveness. 15-21 - Mark D. Murton, Dale T. van Dongen, Michael P. Ross, Francis A. Bouchier:
Toward a performance requirement for sensored conformable apertures. 22-26 - Han Lin, Moses Schwartz, John Michalski, Mayuri Shakamuri, Philip Campbell:
Leveraging a crowd sourcing methodology to enhance supply chain integrity. 27-33 - Jeffrey G. Dabling, James O. McLaughlin, Jason J. Andersen:
Design and performance testing of an integrated detection and assessment perimeter system. 34-42 - Felicia A. Durán:
Probabilistic basis and assessment methodology for effectiveness of protecting nuclear materials. 43-52 - Eric D. Vugrin, Kevin L. Stamber, Michael J. Baca, Gio Kao, Hai Le, Michael Mtchell, Rick Ramirez, Kim Welch:
A mission resilience assessment methodology for infrastructure disruptions. 53-58 - Zdenek Vintr, David Valis, Jindrich Malach:
Attack tree-based evaluation of physical protection systems vulnerability. 59-65 - Kenneth K. Yamamoto, Sergey N. Vecherin, D. Keith Wilson, Christian T. Borden, Elizabeth Bettencourt, Chris L. Pettit:
General software for multimodal signal modeling and optimal sensor placement: Environmental Awareness for Sensor and Emitter Employment (EASEE). 66-77 - Andre Gagnon, René Schmidt:
Trial results conducted by multiple Canadian government agencies of the recent covert technology developped by Tektrap to trace and track the integrity of maritime containers worldwide. 78-82 - Jia-Guu Leu, Liang-tsair Geeng, Chang En Pu, Jyh-Bin Shiau:
Tracking formants in spectrograms and its application in speaker verification. 83-89 - Anika Pflug, Philip Michael Back, Christoph Busch:
Towards making HCS ear detection robust against rotation. 90-96 - Esther González, Luis Álvarez, Luis Mazorra:
Normalization and feature extraction on ear images. 97-104 - Marcos Faúndez-Zanuy, Enric Sesa-Nogueras, Josep Roure Alcobé:
On the relevance of age in handwritten biometric recognition. 105-109 - Mofreh A. Hogo:
Biometrie keys based on pseudorandom sequences. 110-118 - Maurizio Talamo, Maulahikmah Galinium, Christian H. Schunck, Franco Arcieri:
State space blow-up in the verification of secure smartcard interoperability. 119-125 - Lisa A. Shay, Gregory J. Conti, Dominic M. Larkin, John Nelson:
A framework for analysis of quotidian exposure in an instrumented world. 126-134 - Chang-Lung Tsai, Chun-Jung Chen, Wei-Lieh Hsu:
Multi-morphological image data hiding based on the application of Rubik's cubic algorithm. 135-139 - Mohammed Bougrine, Fouzia Omaiy, Salima Trichni, Bouchra Boulahiat:
New evolutionary tools for a new ciphering system SEC version. 140-146 - Sung Choi, David Zage:
Addressing insider threat using "where you are" as fourth factor authentication. 147-153 - Fabio Garzia, Roberto Cusani, Enzo Sammarco:
Advanced access control system for ports. 154-162 - Keiji Takeda:
User Identification and Tracking with online device fingerprints fusion. 163-167 - Xuebing Zhou, Christoph Busch:
Measuring privacy and security of iris fuzzy commitment. 168-173 - Ramon Blanco-Gonzalo, Oscar Miguel-Hurtado, Aitor Mendaza-Ormaza, Raul Sánchez-Reillo:
Handwritten signature recognition in mobile scenarios: Performance evaluation. 174-179 - Brett C. Tjaden, Robert Floodeen:
Communication among incident responders - A study. 1-6 - Martin Henzl, Petr Hanácek, Peter Jurnecka, Matej Kacic:
A concept of automated vulnerability search in contactless communication applications. 180-186 - Philip Campbell:
Department of Defense Instruction 8500.2 "Information Assurance (IA) Implementation: " A retrospective. 187-194 - Min-Ku Kim, Dong-Guk Han, Jeong Choon Ryoo, Okyeon Yi:
CPA performance enhancement based on spectrogram. 195-200 - Aesun Park, Dong-Guk Han, Jeong Choon Ryoo:
CPA performance comparison based on Wavelet Transform. 201-206 - Addisson Salazar, Gonzalo Safont, Antonio Soriano, Luis Vergara:
Automatic credit card fraud detection based on non-linear signal processing. 207-212 - Richard M. Guest, Oscar Miguel-Hurtado:
Enhancing static biometric signature verification using Speeded-Up Robust Features. 213-217 - Antonio M. Rojas, Carlos M. Travieso, Jesús B. Alonso, Miguel A. Ferrer:
Automatic lip identification applied under soft facial emotion conditions. 218-223 - Aythami Morales, Miguel A. Ferrer, Carlos M. Travieso, Jesús B. Alonso:
Multisampling approach applied to contactless hand biometrics. 224-229 - Gonzalo Safont, Addisson Salazar, Antonio Soriano, Luis Vergara:
Combination of multiple detectors for EEG based biometric identification/authentication. 230-236 - Sylvio Bisson, Pushkar E. Godbole, Matthew McKee, Marc St-Amand:
Methods for the prevention of the use of mobile phones in Correctional institutions. 237-245 - Lester A. Cano:
Using Neural Networks for Extended Detection. 246-250 - Edward L. Witzke, Joseph P. Brenkosh, Karl L. Green, Loren E. Riblett, James M. Wiseman:
Encryption in mobile wireless mesh networks. 251-256 - Paul C. Haddock, John W. Hatley, William D. Morse, Robert D. Tooley:
Integrated communications and navigation module. 1-5 - Paul C. Haddock:
A radio frequency measurement technique utilizing audio distortion to access the instantaneous sensitivity of a security systems receiver. 257-260 - Ed Rao:
Air cargo screening for stowaway detection: Carbon dioxide monitors and Heartbeat Monitor assessment and qualification. 261-266 - Marcia Mendes, Adrian Schwaninger, Nadine Strebel, Stefan Michel:
Why laptops should be screened separately when conventional x-ray screening is used. 267-273 - Philipp Sury, Sandrina Ritzmann, Adrian Schwaninger:
Initial results of web based blended learning in the field of air cargo security. 274-279 - Jonny A. Uribe, Luis Fonseca, J. F. Vargas:
Video based system for railroad collision warning. 280-285 - Mike Rhead, Robert Gurney, Soodamani Ramalingam, Neil Cohen:
Accuracy of automatic number plate recognition (ANPR) and real world UK number plate problems. 286-291 - Donald A. Sheaffer, David C. Burnett:
Improved surface swimmer detection through multimodal data fusion. 292-296 - Ernesto Gonzaga, Harold J. Cossette:
Plasma barrier force-field access denial system. 297-304 - Rich Messenger, Rick Dove:
Basic Genetic Algorithm pattern for use in self-organizing agile security. 305-311 - David Streisand, Rick Dove:
Basic genetic-algorithm-neural-network (GANN) pattern with a self-organizing security example. 312-318 - Jeff Hamar, Rick Dove:
A quorum sensing pattern for multi-agent self-organizing security systems. 319-324 - S. Rankin, N. Cohen, K. MacLennan-Brown, K. Sage:
CCTV Operator Performance Benchmarking. 325-330 - Robert Gurney, Mike Rhead, Soodamani Ramalingam, Neil Cohen:
Working towards an international ANPR Standard - An initial investigation into the UK standard. 331-337 - Yuichiro Yamada, Daisuke Sasagawa:
Super-resolution processing of the partial pictorial image of the single pictorial image which eliminated artificiality. 338-344 - Matthew Ibekwe, Stanislav Vítek, Milos Klima, Petr Dostál:
Modeling and evaluation of image quality in wireless surveillance networks. 345-362 - Stanislav Vítek, Milos Klima, Petr Dostál:
Cost-effective automatic stereoscopic security video system 3DSec. 353-358 - Bradley C. Norman:
Assessment of video analytics for exterior intrusion detection applications. 359-362 - Virginia Espinosa-Duro, Marcos Faúndez-Zanuy, Jirí Mekyska:
Contribution of the temperature of the objects to the problem of thermal imaging focusing. 363-366 - Petr Dostál, Lukas Krasula, Milos Klima:
HLFSIM: Objective image quality metric based on ROI analysis. 367-375
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.