Bourlai, Thirimachos

Surveillance in Action

Bourlai, Thirimachos - Surveillance in Action, ebook


Ebook, PDF with Adobe DRM
ISBN: 9783319685335
DRM Restrictions

PrintingNot allowed
Copy to clipboardNot allowed

Table of contents

Part I. Surveillance of Human Features

1. A Survey of Using Biometrics for Smart Visual Surveillance: Gait Recognition
Imed Bouchrika

2. Comparative Face Soft Biometrics for Human Identification
Nawaf Yousef Almudhahka, Mark S. Nixon, Jonathon S. Hare

3. Video-Based Human Respiratory Wavelet Extraction and Identity Recognition
Xue Yang, Thirimachos Bourlai

4. A Study on Human Recognition Using Auricle and Side View Face Images
Susan El-Naggar, Ayman Abaza, Thirimachos Bourlai

5. Cross-Spectral Iris Matching for Surveillance Applications
Mohammed A. M. Abdullah, Raid R. Al-Nima, Satnam S. Dlay, Wai L. Woo, Jonathon A. Chambers

6. Facial Surveillance and Recognition in the Passive Infrared Bands
Nnamdi Osia, Thirimachos Bourlai, Lawrence Hornak

7. Deep Feature Learning for Classification When Using Single Sensor Multi-wavelength Based Facial Recognition Systems in SWIR Band
Neeru Narang, Thirimachos Bourlai

Part II. Surveillance for Security and Defense

8. Managing Uncertainty from the Sky: Surveillance Through Three Generations of Commercial Earth Observation Satellites
Alexandros Kolovos

9. Drones Surveillance—Challenges and Techniques
Anastasios Kokkalis, Theodore I. Lekas

10. Early Warning Against Stealth Aircraft, Missiles and Unmanned Aerial Vehicles
Konstantinos C. Zikidis

11. Mobile Data Fusion for Maritime Surveillance
Evangelos Sakkopoulos, Emmanouil Viennas, Zafeiria-Marina Ioannou, Vassiliki Gkantouna, Efrosini Sourla, Mersini Paschou, Athanasios Tsakalidis, Giannis Tzimas, Spyros Sioutas

12. Mobile Stand-off and Stand-in Surveillance Against Biowarfare and Bioterrorism Agents
Manousos E. Kambouris

13. Social Networks for Surveillance and Security: ‘Using Online Techniques to Make Something Happen in the Real or Cyber World’
Ben Harbisher

14. Surveillance, Targeted Killing and the Fight Against Terrorism: A Fair-Played Game?
Ioanna K. Lekea

Part III. Cyber Surveillance

15. Data Hiding in the Wild: Where Computational Intelligence Meets Digital Forensics
Victor Pomponiu, Davide Cavagnino, Marco Botta

16. Methods to Detect Cyberthreats on Twitter
Praveen Rao, Charles Kamhoua, Laurent Njilla, Kevin Kwiat

17. Detecting Users Who Share Extremist Content on Twitter
Yifang Wei, Lisa Singh

18. An Organizational Visualization Profiler Tool Based on Social Interactions
Panagiotis Karampelas

19. Cyber-Surveillance Analysis for Supercomputing Environments
A. D. Clark, J. M. Absher

Keywords: Political Science and International Relations, Military and Defence Studies, Cybercrime, Pattern Recognition, Biometrics, Security Science and Technology

Publication year
Advanced Sciences and Technologies for Security Applications
Page amount
14 pages
Printed ISBN

Similar titles