


default search action
ICCST 2012: Newton, MA, USA
- IEEE International Carnahan Conference on Security Technology, ICCST 2012, Newton, MA, USA, October 15-18, 2012. IEEE 2012, ISBN 978-1-4673-2450-2

- Keith Harman, Wayne K. Messner:

Outdoor perimeter security sensors a forty year perspective. 1-9 - Dean Dominguez, Mancel Jordan Parks, Adam D. Williams

, Susan Washburn:
Special Nuclear material and critical infrastructure security modeling and simulation of physical protection systems. 10-14 - Zdenek Vintr

, Michal Vintr
, Jindrich Malach:
Evaluation of physical protection system effectiveness. 15-21 - Mark D. Murton, Dale T. van Dongen, Michael P. Ross, Francis A. Bouchier:

Toward a performance requirement for sensored conformable apertures. 22-26 - Han Lin, Moses Schwartz, John Michalski, Mayuri Shakamuri, Philip Campbell:

Leveraging a crowd sourcing methodology to enhance supply chain integrity. 27-33 - Jeffrey G. Dabling, James O. McLaughlin, Jason J. Andersen:

Design and performance testing of an integrated detection and assessment perimeter system. 34-42 - Felicia A. Durán:

Probabilistic basis and assessment methodology for effectiveness of protecting nuclear materials. 43-52 - Eric D. Vugrin, Kevin L. Stamber, Michael J. Baca, Gio Kao, Hai Le, Michael Mtchell, Rick Ramirez, Kim Welch:

A mission resilience assessment methodology for infrastructure disruptions. 53-58 - Zdenek Vintr

, David Valis, Jindrich Malach:
Attack tree-based evaluation of physical protection systems vulnerability. 59-65 - Kenneth K. Yamamoto, Sergey N. Vecherin, D. Keith Wilson

, Christian T. Borden, Elizabeth Bettencourt, Chris L. Pettit:
General software for multimodal signal modeling and optimal sensor placement: Environmental Awareness for Sensor and Emitter Employment (EASEE). 66-77 - Andre Gagnon, René Schmidt:

Trial results conducted by multiple Canadian government agencies of the recent covert technology developped by Tektrap to trace and track the integrity of maritime containers worldwide. 78-82 - Jia-Guu Leu, Liang-tsair Geeng, Chang En Pu, Jyh-Bin Shiau:

Tracking formants in spectrograms and its application in speaker verification. 83-89 - Anika Pflug, Philip Michael Back, Christoph Busch:

Towards making HCS ear detection robust against rotation. 90-96 - Esther González

, Luis Álvarez
, Luis Mazorra:
Normalization and feature extraction on ear images. 97-104 - Marcos Faúndez-Zanuy

, Enric Sesa-Nogueras
, Josep Roure Alcobé
:
On the relevance of age in handwritten biometric recognition. 105-109 - Mofreh A. Hogo

:
Biometrie keys based on pseudorandom sequences. 110-118 - Maurizio Talamo

, Maulahikmah Galinium
, Christian H. Schunck
, Franco Arcieri
:
State space blow-up in the verification of secure smartcard interoperability. 119-125 - Lisa A. Shay, Gregory J. Conti, Dominic M. Larkin, John Nelson:

A framework for analysis of quotidian exposure in an instrumented world. 126-134 - Chang-Lung Tsai, Chun-Jung Chen, Wei-Lieh Hsu:

Multi-morphological image data hiding based on the application of Rubik's cubic algorithm. 135-139 - Mohammed Bougrine, Fouzia Omaiy, Salima Trichni, Bouchra Boulahiat

:
New evolutionary tools for a new ciphering system SEC version. 140-146 - Sung Choi, David Zage:

Addressing insider threat using "where you are" as fourth factor authentication. 147-153 - Fabio Garzia, Roberto Cusani, Enzo Sammarco:

Advanced access control system for ports. 154-162 - Keiji Takeda:

User Identification and Tracking with online device fingerprints fusion. 163-167 - Xuebing Zhou, Christoph Busch:

Measuring privacy and security of iris fuzzy commitment. 168-173 - Ramon Blanco-Gonzalo, Oscar Miguel-Hurtado, Aitor Mendaza-Ormaza, Raul Sánchez-Reillo

:
Handwritten signature recognition in mobile scenarios: Performance evaluation. 174-179 - Brett C. Tjaden, Robert Floodeen:

Communication among incident responders - A study. 1-6 - Martin Henzl, Petr Hanácek

, Peter Jurnecka, Matej Kacic:
A concept of automated vulnerability search in contactless communication applications. 180-186 - Philip Campbell:

Department of Defense Instruction 8500.2 "Information Assurance (IA) Implementation: " A retrospective. 187-194 - Min-Ku Kim, Dong-Guk Han, Jeong Choon Ryoo, Okyeon Yi:

CPA performance enhancement based on spectrogram. 195-200 - Aesun Park, Dong-Guk Han, Jeong Choon Ryoo:

CPA performance comparison based on Wavelet Transform. 201-206 - Addisson Salazar

, Gonzalo Safont
, Antonio Soriano
, Luis Vergara
:
Automatic credit card fraud detection based on non-linear signal processing. 207-212 - Richard M. Guest, Oscar Miguel-Hurtado:

Enhancing static biometric signature verification using Speeded-Up Robust Features. 213-217 - Antonio M. Rojas, Carlos M. Travieso

, Jesús B. Alonso
, Miguel A. Ferrer
:
Automatic lip identification applied under soft facial emotion conditions. 218-223 - Aythami Morales

, Miguel A. Ferrer
, Carlos M. Travieso
, Jesús B. Alonso
:
Multisampling approach applied to contactless hand biometrics. 224-229 - Gonzalo Safont

, Addisson Salazar
, Antonio Soriano
, Luis Vergara
:
Combination of multiple detectors for EEG based biometric identification/authentication. 230-236 - Sylvio Bisson, Pushkar E. Godbole, Matthew McKee, Marc St-Amand:

Methods for the prevention of the use of mobile phones in Correctional institutions. 237-245 - Lester A. Cano:

Using Neural Networks for Extended Detection. 246-250 - Edward L. Witzke, Joseph P. Brenkosh, Karl L. Green, Loren E. Riblett, James M. Wiseman:

Encryption in mobile wireless mesh networks. 251-256 - Paul C. Haddock, John W. Hatley, William D. Morse, Robert D. Tooley:

Integrated communications and navigation module. 1-5 - Paul C. Haddock:

A radio frequency measurement technique utilizing audio distortion to access the instantaneous sensitivity of a security systems receiver. 257-260 - Ed Rao:

Air cargo screening for stowaway detection: Carbon dioxide monitors and Heartbeat Monitor assessment and qualification. 261-266 - Marcia Mendes, Adrian Schwaninger

, Nadine Strebel, Stefan Michel
:
Why laptops should be screened separately when conventional x-ray screening is used. 267-273 - Philipp Sury, Sandrina Ritzmann, Adrian Schwaninger

:
Initial results of web based blended learning in the field of air cargo security. 274-279 - Jonny A. Uribe, Luis Fonseca, J. F. Vargas:

Video based system for railroad collision warning. 280-285 - Mike Rhead, Robert Gurney, Soodamani Ramalingam

, Neil Cohen:
Accuracy of automatic number plate recognition (ANPR) and real world UK number plate problems. 286-291 - Donald A. Sheaffer, David C. Burnett:

Improved surface swimmer detection through multimodal data fusion. 292-296 - Ernesto Gonzaga, Harold J. Cossette:

Plasma barrier force-field access denial system. 297-304 - Rich Messenger, Rick Dove:

Basic Genetic Algorithm pattern for use in self-organizing agile security. 305-311 - David Streisand, Rick Dove:

Basic genetic-algorithm-neural-network (GANN) pattern with a self-organizing security example. 312-318 - Jeff Hamar, Rick Dove:

A quorum sensing pattern for multi-agent self-organizing security systems. 319-324 - S. Rankin, N. Cohen, K. MacLennan-Brown, K. Sage:

CCTV Operator Performance Benchmarking. 325-330 - Robert Gurney, Mike Rhead, Soodamani Ramalingam

, Neil Cohen:
Working towards an international ANPR Standard - An initial investigation into the UK standard. 331-337 - Yuichiro Yamada, Daisuke Sasagawa:

Super-resolution processing of the partial pictorial image of the single pictorial image which eliminated artificiality. 338-344 - Matthew Ibekwe, Stanislav Vítek

, Milos Klima, Petr Dostál:
Modeling and evaluation of image quality in wireless surveillance networks. 345-362 - Stanislav Vítek

, Milos Klima, Petr Dostál:
Cost-effective automatic stereoscopic security video system 3DSec. 353-358 - Bradley C. Norman:

Assessment of video analytics for exterior intrusion detection applications. 359-362 - Virginia Espinosa-Duro, Marcos Faúndez-Zanuy

, Jirí Mekyska
:
Contribution of the temperature of the objects to the problem of thermal imaging focusing. 363-366 - Petr Dostál, Lukas Krasula, Milos Klima:

HLFSIM: Objective image quality metric based on ROI analysis. 367-375

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














