Computer surveillance

Results: 1478



#Item
1

CALL FOR PAPERS IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY Special Issue on Deep Learning for Visual Surveillance Visual surveillance has been long researched in the computer vision community. Focus o

Add to Reading List

Source URL: tcsvt.polito.it

Language: English - Date: 2016-09-29 14:15:50
    2

    Computer Security Threat Monitoring and Surveillance

    Add to Reading List

    Source URL: seclab.cs.ucdavis.edu

    - Date: 2006-01-16 10:12:37
      3

      Infranet: Circumventing Web Censorship and Surveillance Nick Feamster, Magdalena Balazinska, Greg Harfst, Hari Balakrishnan, David Karger MIT Laboratory for Computer Science feamster, mbalazin, gch, hari, karger  @lcs.m

      Add to Reading List

      Source URL: gray-world.net

      Language: English - Date: 2010-06-12 03:14:41
        4Computer storage devices / Computer data storage / Computer hardware / Computer storage media / Information science / Non-volatile memory / Video surveillance / Security / Video management system / NVR / IP camera / Hard disk drive

        Expert In Protecting Your Interests M6 Rackmount Enterprise NVR Series As GVD’s Enterprise NVRs, the M6 Series

        Add to Reading List

        Source URL: www.gvdigital.com

        Language: English - Date: 2016-06-19 23:56:05
        5Security / Prevention / Safety / Crime prevention / Public safety / National security / Physical security / Surveillance / Security guard / Computer security / Counter-terrorism

        Photography and Hostile Reconnaissance – A guide for BSIA members October 2011 For other information please contact:

        Add to Reading List

        Source URL: www.qpcc.co.uk

        Language: English - Date: 2014-02-23 20:42:14
        6Avionics / Aviation / Air traffic control / Technology / Business / Automatic dependent surveillance  broadcast / Secondary surveillance radar / Flightradar24 / Computer network / DO-242A / IEEE 802.11 / Denial-of-service attack

        On the Security of the Automatic Dependent Surveillance-Broadcast Protocol arXiv:1307.3664v2 [cs.CR] 15 AprMartin Strohmeier∗ , Vincent Lenders+ , Ivan Martinovic∗

        Add to Reading List

        Source URL: www.lenders.ch

        Language: English - Date: 2014-12-19 11:12:15
        7United States intelligence agencies / Government / Mass surveillance / National Security Agency / United States government secrecy / Computer-aided engineering / Defense Intelligence Agency / Central Intelligence Agency / Security / National security / Center for Intelligence and Security Studies

        UNCLASSIFIED Impariamo Volume 1, Issue 4 “ A newsletter for the Intelligence Community Centers for Academic Excellence”

        Add to Reading List

        Source URL: nssp.unm.edu

        Language: English - Date: 2013-10-28 19:00:49
        8Security engineering / Safety / Security / Lidar / Robotic sensing / Unmanned aerial vehicle / Computer security / Security alarm / Velodyne Inc. / Draft:Princeton Lightwave Inc.

        Quanergy Systems to Showcase Powerful LiDAR Security Detection System at ISC West Surveillance solution from leading LiDAR company detects threats in real 3D space April 06, :00 AM Pacific Daylight Time

        Add to Reading List

        Source URL: www.quanergy.com

        Language: English - Date: 2016-05-16 02:32:19
        9Artificial intelligence / Computer vision / Image processing / Feature detection / Statistical theory / Conference on Computer Vision and Pattern Recognition / Conditional random field / Optical flow / Edge detection / Thomas Huang / Activity recognition / Loss function

        Surveillance Event Detection Mert Dikmen, Huazhong Ning, Dennis J. Lin, Liangliang Cao, Vuong Le, Shen-Fu Tsai, Kai-Hsiang Lin, Zhen Li, Jianchao Yang, Thomas S. Huang Department of Electrical and Computer Engineering Un

        Add to Reading List

        Source URL: www.ifp.illinois.edu

        Language: English - Date: 2010-07-25 04:16:41
        10Security / Artificial intelligence / Electronic toll collection / Automatic number plate recognition / Optical character recognition / Road traffic management / Surveillance / Audit / Telecommunications data retention / Computer security

        Automated License Plate Reader Audit Review Background Legislation related to law enforcement’s use of automated license plate reader (ALPR) data went into effect inAgencies using ALPRs when the new requirements

        Add to Reading List

        Source URL: www.ipad.state.mn.us

        Language: English - Date: 2016-07-26 08:51:50
        UPDATE