語系:
繁體中文
English
說明(常見問題)
回圖書館首頁
手機版館藏查詢
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Surveillance in action = technologie...
~
Karampelas, Panagiotis.
FindBook
Google Book
Amazon
博客來
Surveillance in action = technologies for civilian, military and cyber surveillance /
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
Surveillance in action/ edited by Panagiotis Karampelas, Thirimachos Bourlai.
其他題名:
technologies for civilian, military and cyber surveillance /
其他作者:
Karampelas, Panagiotis.
出版者:
Cham :Springer International Publishing : : 2018.,
面頁冊數:
xiv, 412 p. :ill., digital ;24 cm.
內容註:
Part I - Surveillance of Human Features -- A Survey of Using Biometrics for Smart Visual Surveillance: Gait Recognition -- Comparative Face Soft Biometrics for Human Identification -- Video-Based Human Respiratory Wavelet Extraction and Identity Recognition -- A Study on Human Recognition using Auricle and Side View Face Images -- Cross-spectral Iris Matching for Surveillance Applications -- Facial Surveillance and Recognition in the Passive Infrared Bands -- Deep Feature Learning for Classification when using Single Sensor Multi-Wavelength based Facial Recognition Systems in SWIR Band -- Part II - Surveillance for Security and Defense -- Managing Uncertainty from the Sky: Surveillance through three Generations of Commercial Earth Observation Satellites -- Drones Surveillance - Challenges and Techniques -- Early Warning Against Stealth Aircraft, Missiles and Unmanned Aerial Vehicles. Mobile Data Fusion for Maritime Surveillance -- Mobile stand-off and stand-in surveillance against biowarfare and bioterrorism agents -- Social Networks for Surveillance and Security: 'Using Online Techniques to make something happen in the real or cyber world' -- Surveillance, targeted killing and the fight against Terrorism: a fair-played game -- Part III - Cyber Surveillance Data Hiding in the Wild: Where Computational Intelligence Meets Digital Forensics -- Methods to Detect Cyber threats on Twitter -- Detecting Users Who Share Extremist Content on Twitter -- An Organizational Visualization Profiler Tool Based on Social Interactions -- Cyber-Surveillance Analysis for Supercomputing Environments.
Contained By:
Springer eBooks
標題:
Electronic surveillance. -
電子資源:
http://dx.doi.org/10.1007/978-3-319-68533-5
ISBN:
9783319685335
Surveillance in action = technologies for civilian, military and cyber surveillance /
Surveillance in action
technologies for civilian, military and cyber surveillance /[electronic resource] :edited by Panagiotis Karampelas, Thirimachos Bourlai. - Cham :Springer International Publishing :2018. - xiv, 412 p. :ill., digital ;24 cm. - Advanced sciences and technologies for security applications,1613-5113. - Advanced sciences and technologies for security applications..
Part I - Surveillance of Human Features -- A Survey of Using Biometrics for Smart Visual Surveillance: Gait Recognition -- Comparative Face Soft Biometrics for Human Identification -- Video-Based Human Respiratory Wavelet Extraction and Identity Recognition -- A Study on Human Recognition using Auricle and Side View Face Images -- Cross-spectral Iris Matching for Surveillance Applications -- Facial Surveillance and Recognition in the Passive Infrared Bands -- Deep Feature Learning for Classification when using Single Sensor Multi-Wavelength based Facial Recognition Systems in SWIR Band -- Part II - Surveillance for Security and Defense -- Managing Uncertainty from the Sky: Surveillance through three Generations of Commercial Earth Observation Satellites -- Drones Surveillance - Challenges and Techniques -- Early Warning Against Stealth Aircraft, Missiles and Unmanned Aerial Vehicles. Mobile Data Fusion for Maritime Surveillance -- Mobile stand-off and stand-in surveillance against biowarfare and bioterrorism agents -- Social Networks for Surveillance and Security: 'Using Online Techniques to make something happen in the real or cyber world' -- Surveillance, targeted killing and the fight against Terrorism: a fair-played game -- Part III - Cyber Surveillance Data Hiding in the Wild: Where Computational Intelligence Meets Digital Forensics -- Methods to Detect Cyber threats on Twitter -- Detecting Users Who Share Extremist Content on Twitter -- An Organizational Visualization Profiler Tool Based on Social Interactions -- Cyber-Surveillance Analysis for Supercomputing Environments.
This book addresses surveillance in action-related applications, and presents novel research on military, civil and cyber surveillance from an international team of experts. The first part of the book, Surveillance of Human Features, reviews surveillance systems that use biometric technologies. It discusses various novel approaches to areas including gait recognition, face-based physiology-assisted recognition, face recognition in the visible and infrared bands, and cross-spectral iris recognition. The second part of the book, Surveillance for Security and Defense, discusses the ethical issues raised by the use of surveillance systems in the name of combatting terrorism and ensuring security. It presents different generations of satellite surveillance systems and discusses the requirements for real-time satellite surveillance in military contexts. In addition, it explores the new standards of surveillance using unmanned air vehicles and drones, proposes surveillance techniques for detecting stealth aircrafts and drones, and highlights key techniques for maritime border surveillance, bio-warfare and bio-terrorism detection. The last part of the book, Cyber Surveillance, provides a review of data hiding techniques that are used to hinder electronic surveillance. It subsequently presents methods for collecting and analyzing information from social media sites and discusses techniques for detecting internal and external threats posed by various individuals (such as spammers, cyber-criminals, suspicious users or extremists in general) The book concludes by examining how high-performance computing environments can be exploited by malicious users, and what surveillance methods need to be put in place to protect these valuable infrastructures. The book is primarily intended for military and law enforcement personnel who use surveillance-related technologies, as well as researchers, Master's and Ph.D. students who are interested in learning about the latest advances in military, civilian and cyber surveillance.
ISBN: 9783319685335
Standard No.: 10.1007/978-3-319-68533-5doiSubjects--Topical Terms:
552360
Electronic surveillance.
LC Class. No.: TK7882.E2 / S878 2018
Dewey Class. No.: 621.38928
Surveillance in action = technologies for civilian, military and cyber surveillance /
LDR
:04764nmm a2200325 a 4500
001
2132555
003
DE-He213
005
20180727161936.0
006
m d
007
cr nn 008maaau
008
181005s2018 gw s 0 eng d
020
$a
9783319685335
$q
(electronic bk.)
020
$a
9783319685328
$q
(paper)
024
7
$a
10.1007/978-3-319-68533-5
$2
doi
035
$a
978-3-319-68533-5
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
TK7882.E2
$b
S878 2018
072
7
$a
JW
$2
bicssc
072
7
$a
POL012000
$2
bisacsh
082
0 4
$a
621.38928
$2
23
090
$a
TK7882.E2
$b
S963 2018
245
0 0
$a
Surveillance in action
$h
[electronic resource] :
$b
technologies for civilian, military and cyber surveillance /
$c
edited by Panagiotis Karampelas, Thirimachos Bourlai.
260
$a
Cham :
$b
Springer International Publishing :
$b
Imprint: Springer,
$c
2018.
300
$a
xiv, 412 p. :
$b
ill., digital ;
$c
24 cm.
490
1
$a
Advanced sciences and technologies for security applications,
$x
1613-5113
505
0
$a
Part I - Surveillance of Human Features -- A Survey of Using Biometrics for Smart Visual Surveillance: Gait Recognition -- Comparative Face Soft Biometrics for Human Identification -- Video-Based Human Respiratory Wavelet Extraction and Identity Recognition -- A Study on Human Recognition using Auricle and Side View Face Images -- Cross-spectral Iris Matching for Surveillance Applications -- Facial Surveillance and Recognition in the Passive Infrared Bands -- Deep Feature Learning for Classification when using Single Sensor Multi-Wavelength based Facial Recognition Systems in SWIR Band -- Part II - Surveillance for Security and Defense -- Managing Uncertainty from the Sky: Surveillance through three Generations of Commercial Earth Observation Satellites -- Drones Surveillance - Challenges and Techniques -- Early Warning Against Stealth Aircraft, Missiles and Unmanned Aerial Vehicles. Mobile Data Fusion for Maritime Surveillance -- Mobile stand-off and stand-in surveillance against biowarfare and bioterrorism agents -- Social Networks for Surveillance and Security: 'Using Online Techniques to make something happen in the real or cyber world' -- Surveillance, targeted killing and the fight against Terrorism: a fair-played game -- Part III - Cyber Surveillance Data Hiding in the Wild: Where Computational Intelligence Meets Digital Forensics -- Methods to Detect Cyber threats on Twitter -- Detecting Users Who Share Extremist Content on Twitter -- An Organizational Visualization Profiler Tool Based on Social Interactions -- Cyber-Surveillance Analysis for Supercomputing Environments.
520
$a
This book addresses surveillance in action-related applications, and presents novel research on military, civil and cyber surveillance from an international team of experts. The first part of the book, Surveillance of Human Features, reviews surveillance systems that use biometric technologies. It discusses various novel approaches to areas including gait recognition, face-based physiology-assisted recognition, face recognition in the visible and infrared bands, and cross-spectral iris recognition. The second part of the book, Surveillance for Security and Defense, discusses the ethical issues raised by the use of surveillance systems in the name of combatting terrorism and ensuring security. It presents different generations of satellite surveillance systems and discusses the requirements for real-time satellite surveillance in military contexts. In addition, it explores the new standards of surveillance using unmanned air vehicles and drones, proposes surveillance techniques for detecting stealth aircrafts and drones, and highlights key techniques for maritime border surveillance, bio-warfare and bio-terrorism detection. The last part of the book, Cyber Surveillance, provides a review of data hiding techniques that are used to hinder electronic surveillance. It subsequently presents methods for collecting and analyzing information from social media sites and discusses techniques for detecting internal and external threats posed by various individuals (such as spammers, cyber-criminals, suspicious users or extremists in general) The book concludes by examining how high-performance computing environments can be exploited by malicious users, and what surveillance methods need to be put in place to protect these valuable infrastructures. The book is primarily intended for military and law enforcement personnel who use surveillance-related technologies, as well as researchers, Master's and Ph.D. students who are interested in learning about the latest advances in military, civilian and cyber surveillance.
650
0
$a
Electronic surveillance.
$3
552360
650
0
$a
Video surveillance.
$3
1375317
650
0
$a
Military surveillance.
$3
3299220
650
1 4
$a
Political Science and International Relations.
$3
2162818
650
2 4
$a
Military and Defence Studies.
$3
2181953
650
2 4
$a
Cybercrime.
$3
2195714
650
2 4
$a
Pattern Recognition.
$3
891045
650
2 4
$a
Biometrics.
$3
898232
650
2 4
$a
Security Science and Technology.
$3
1531662
700
1
$a
Karampelas, Panagiotis.
$3
2186733
700
1
$a
Bourlai, Thirimachos.
$3
2182709
710
2
$a
SpringerLink (Online service)
$3
836513
773
0
$t
Springer eBooks
830
0
$a
Advanced sciences and technologies for security applications.
$3
2180530
856
4 0
$u
http://dx.doi.org/10.1007/978-3-319-68533-5
950
$a
Political Science and International Studies (Springer-41174)
筆 0 讀者評論
館藏地:
全部
電子資源
出版年:
卷號:
館藏
1 筆 • 頁數 1 •
1
條碼號
典藏地名稱
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
W9341290
電子資源
11.線上閱覽_V
電子書
EB TK7882.E2 S878 2018
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
評論
新增評論
分享你的心得
Export
取書館
處理中
...
變更密碼
登入