Bourlai, Thirimachos
Surveillance in Action
Part I. Surveillance of Human Features
1. A Survey of Using Biometrics for Smart Visual Surveillance: Gait Recognition
Imed Bouchrika
2. Comparative Face Soft Biometrics for Human Identification
Nawaf Yousef Almudhahka, Mark S. Nixon, Jonathon S. Hare
3. Video-Based Human Respiratory Wavelet Extraction and Identity Recognition
Xue Yang, Thirimachos Bourlai
4. A Study on Human Recognition Using Auricle and Side View Face Images
Susan El-Naggar, Ayman Abaza, Thirimachos Bourlai
5. Cross-Spectral Iris Matching for Surveillance Applications
Mohammed A. M. Abdullah, Raid R. Al-Nima, Satnam S. Dlay, Wai L. Woo, Jonathon A. Chambers
6. Facial Surveillance and Recognition in the Passive Infrared Bands
Nnamdi Osia, Thirimachos Bourlai, Lawrence Hornak
7. Deep Feature Learning for Classification When Using Single Sensor Multi-wavelength Based Facial Recognition Systems in SWIR Band
Neeru Narang, Thirimachos Bourlai
Part II. Surveillance for Security and Defense
8. Managing Uncertainty from the Sky: Surveillance Through Three Generations of Commercial Earth Observation Satellites
Alexandros Kolovos
9. Drones Surveillance—Challenges and Techniques
Anastasios Kokkalis, Theodore I. Lekas
10. Early Warning Against Stealth Aircraft, Missiles and Unmanned Aerial Vehicles
Konstantinos C. Zikidis
11. Mobile Data Fusion for Maritime Surveillance
Evangelos Sakkopoulos, Emmanouil Viennas, Zafeiria-Marina Ioannou, Vassiliki Gkantouna, Efrosini Sourla, Mersini Paschou, Athanasios Tsakalidis, Giannis Tzimas, Spyros Sioutas
12. Mobile Stand-off and Stand-in Surveillance Against Biowarfare and Bioterrorism Agents
Manousos E. Kambouris
13. Social Networks for Surveillance and Security: ‘Using Online Techniques to Make Something Happen in the Real or Cyber World’
Ben Harbisher
14. Surveillance, Targeted Killing and the Fight Against Terrorism: A Fair-Played Game?
Ioanna K. Lekea
Part III. Cyber Surveillance
15. Data Hiding in the Wild: Where Computational Intelligence Meets Digital Forensics
Victor Pomponiu, Davide Cavagnino, Marco Botta
16. Methods to Detect Cyberthreats on Twitter
Praveen Rao, Charles Kamhoua, Laurent Njilla, Kevin Kwiat
17. Detecting Users Who Share Extremist Content on Twitter
Yifang Wei, Lisa Singh
18. An Organizational Visualization Profiler Tool Based on Social Interactions
Panagiotis Karampelas
19. Cyber-Surveillance Analysis for Supercomputing Environments
A. D. Clark, J. M. Absher
Avainsanat: Political Science and International Relations, Military and Defence Studies, Cybercrime, Pattern Recognition, Biometrics, Security Science and Technology
- Toimittaja
- Bourlai, Thirimachos
- Karampelas, Panagiotis
- Julkaisija
- Springer
- Julkaisuvuosi
- 2018
- Kieli
- en
- Painos
- 1
- Sarja
- Advanced Sciences and Technologies for Security Applications
- Sivumäärä
- 14 sivua
- Kategoria
- Yhteiskunta
- Tiedostomuoto
- E-kirja
- eISBN (PDF)
- 9783319685335
- Painetun ISBN
- 978-3-319-68532-8