UNIVERSITY LIBRARY CATALOGUE

Amazon cover image
Image from Amazon.com

Surveillance in Action : Technologies for Civilian, Military and Cyber Surveillance / edited by Panagiotis Karampelas, Thirimachos Bo urlai.

Contributor(s): Material type: TextTextSeries: Advanced Sciences and Technologies for Security Applications | Advanced Sciences and Technologies for Security Applications Cham : Springer International Publishing : Imprint: Springer, 2018Edition: 1st ed. 2018Description: 1 online resource (XIV, 412 pages 149 illustrations, 128 illustratio ns in color.)Content type:
  • text
Media type:
  • computer
Carrier type:
  • online resource
ISBN:
  • 9783319685335
Subject(s): Additional physical formats: Surveillance in action.; No title; No title; No titleDDC classification:
  • 355  23
Contents:
Part I - Surveillance of Human Features -- A Survey of Using Biometr ics for Smart Visual Surveillance: Gait Recognition -- Comparative Face Soft Biometrics for Human Identification -- Video-Based Human Respirat ory Wavelet Extraction and Identity Recognition -- A Study on Human Rec ognition using Auricle and Side View Face Images -- Cross-spectral Iris Matching for Surveillance Applications -- Facial Surveillance and Reco gnition in the Passive Infrared Bands -- Deep Feature Learning for Clas sification when using Single Sensor Multi-Wavelength based Facial Recog nition Systems in SWIR Band -- Part II - Surveillance for Security and Defense -- Managing Uncertainty from the Sky: Surveillance through thre e Generations of Commercial Earth Observation Satellites -- Drones Surv eillance - Challenges and Techniques -- Early Warning Against Stealth A ircraft, Missiles and Unmanned Aerial Vehicles. Mobile Data Fusion for Maritime Surveillance -- Mobile stand-off and stand-in surveillance aga inst biowarfare and bioterrorism agents -- Social Networks for Surveill ance and Security: 'Using Online Techniques to make something happen in the real or cyber world' -- Surveillance, targeted killing and the fig ht against Terrorism: a fair-played game -- Part III - Cyber Surveillan ce Data Hiding in the Wild: Where Computational Intelligence Meets Digi tal Forensics -- Methods to Detect Cyber threats on Twitter -- Detectin g Users Who Share Extremist Content on Twitter -- An Organizational Vis ualization Profiler Tool Based on Social Interactions -- Cyber-Surveill ance Analysis for Supercomputing Environments.
Summary: This book addresses surveillance in action-related applications, and presents novel research on military, civil and cyber surveillance from an international team of experts. The first part of the book, Surveill ance of Human Features, reviews surveillance systems that use biometric technologies. It discusses various novel approaches to areas including gait recognition, face-based physiology-assisted recognition, face rec ognition in the visible and infrared bands, and cross-spectral iris rec ognition. The second part of the book, Surveillance for Security and De fense, discusses the ethical issues raised by the use of surveillance s ystems in the name of combatting terrorism and ensuring security. It pr esents different generations of satellite surveillance systems and disc usses the requirements for real-time satellite surveillance in military contexts. In addition, it explores the new standards of surveillance u sing unmanned air vehicles and drones, proposes surveillance techniques for detecting stealth aircrafts and drones, and highlights key techniq ues for maritime border surveillance, bio-warfare and bio-terrorism det ection. The last part of the book, Cyber Surveillance, provides a revie w of data hiding techniques that are used to hinder electronic surveill ance. It subsequently presents methods for collecting and analyzing inf ormation from social media sites and discusses techniques for detecting internal and external threats posed by various individuals (such as sp ammers, cyber-criminals, suspicious users or extremists in general). Th e book concludes by examining how high-performance computing environmen ts can be exploited by malicious users, and what surveillance methods n eed to be put in place to protect these valuable infrastructures. The book is primarily intended for military and law enforcement personnel w ho use surveillance-related technologies, as well as researchers, Maste r's and Ph.D. students who are interested in learning about the latest advances in military, civilian and cyber surveillance.
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
No physical items for this record

Part I - Surveillance of Human Features -- A Survey of Using Biometr ics for Smart Visual Surveillance: Gait Recognition -- Comparative Face Soft Biometrics for Human Identification -- Video-Based Human Respirat ory Wavelet Extraction and Identity Recognition -- A Study on Human Rec ognition using Auricle and Side View Face Images -- Cross-spectral Iris Matching for Surveillance Applications -- Facial Surveillance and Reco gnition in the Passive Infrared Bands -- Deep Feature Learning for Clas sification when using Single Sensor Multi-Wavelength based Facial Recog nition Systems in SWIR Band -- Part II - Surveillance for Security and Defense -- Managing Uncertainty from the Sky: Surveillance through thre e Generations of Commercial Earth Observation Satellites -- Drones Surv eillance - Challenges and Techniques -- Early Warning Against Stealth A ircraft, Missiles and Unmanned Aerial Vehicles. Mobile Data Fusion for Maritime Surveillance -- Mobile stand-off and stand-in surveillance aga inst biowarfare and bioterrorism agents -- Social Networks for Surveill ance and Security: 'Using Online Techniques to make something happen in the real or cyber world' -- Surveillance, targeted killing and the fig ht against Terrorism: a fair-played game -- Part III - Cyber Surveillan ce Data Hiding in the Wild: Where Computational Intelligence Meets Digi tal Forensics -- Methods to Detect Cyber threats on Twitter -- Detectin g Users Who Share Extremist Content on Twitter -- An Organizational Vis ualization Profiler Tool Based on Social Interactions -- Cyber-Surveill ance Analysis for Supercomputing Environments.

This book addresses surveillance in action-related applications, and presents novel research on military, civil and cyber surveillance from an international team of experts. The first part of the book, Surveill ance of Human Features, reviews surveillance systems that use biometric technologies. It discusses various novel approaches to areas including gait recognition, face-based physiology-assisted recognition, face rec ognition in the visible and infrared bands, and cross-spectral iris rec ognition. The second part of the book, Surveillance for Security and De fense, discusses the ethical issues raised by the use of surveillance s ystems in the name of combatting terrorism and ensuring security. It pr esents different generations of satellite surveillance systems and disc usses the requirements for real-time satellite surveillance in military contexts. In addition, it explores the new standards of surveillance u sing unmanned air vehicles and drones, proposes surveillance techniques for detecting stealth aircrafts and drones, and highlights key techniq ues for maritime border surveillance, bio-warfare and bio-terrorism det ection. The last part of the book, Cyber Surveillance, provides a revie w of data hiding techniques that are used to hinder electronic surveill ance. It subsequently presents methods for collecting and analyzing inf ormation from social media sites and discusses techniques for detecting internal and external threats posed by various individuals (such as sp ammers, cyber-criminals, suspicious users or extremists in general). Th e book concludes by examining how high-performance computing environmen ts can be exploited by malicious users, and what surveillance methods n eed to be put in place to protect these valuable infrastructures. The book is primarily intended for military and law enforcement personnel w ho use surveillance-related technologies, as well as researchers, Maste r's and Ph.D. students who are interested in learning about the latest advances in military, civilian and cyber surveillance.

Description based on publisher-supplied MARC data.

There are no comments on this title.

to post a comment.
Share