Surveillance in Action Technologies for Civilian, Military and Cyber Surveillance /

This book addresses surveillance in action-related applications, and presents novel research on military, civil and cyber surveillance from an international team of experts. The first part of the book, Surveillance of Human Features, reviews surveillance systems that use biometric technologies. It d...

Πλήρης περιγραφή

Λεπτομέρειες βιβλιογραφικής εγγραφής
Συγγραφή απο Οργανισμό/Αρχή: SpringerLink (Online service)
Άλλοι συγγραφείς: Karampelas, Panagiotis (Επιμελητής έκδοσης, http://id.loc.gov/vocabulary/relators/edt), Bourlai, Thirimachos (Επιμελητής έκδοσης, http://id.loc.gov/vocabulary/relators/edt)
Μορφή: Ηλεκτρονική πηγή Ηλ. βιβλίο
Γλώσσα:English
Έκδοση: Cham : Springer International Publishing : Imprint: Springer, 2018.
Έκδοση:1st ed. 2018.
Σειρά:Advanced Sciences and Technologies for Security Applications,
Θέματα:
Διαθέσιμο Online:Full Text via HEAL-Link
LEADER 06155nam a2200565 4500
001 978-3-319-68533-5
003 DE-He213
005 20191023151412.0
007 cr nn 008mamaa
008 171114s2018 gw | s |||| 0|eng d
020 |a 9783319685335  |9 978-3-319-68533-5 
024 7 |a 10.1007/978-3-319-68533-5  |2 doi 
040 |d GrThAP 
050 4 |a JZ6378-6405 
072 7 |a JW  |2 bicssc 
072 7 |a POL012000  |2 bisacsh 
072 7 |a JW  |2 thema 
082 0 4 |a 355  |2 23 
245 1 0 |a Surveillance in Action  |h [electronic resource] :  |b Technologies for Civilian, Military and Cyber Surveillance /  |c edited by Panagiotis Karampelas, Thirimachos Bourlai. 
250 |a 1st ed. 2018. 
264 1 |a Cham :  |b Springer International Publishing :  |b Imprint: Springer,  |c 2018. 
300 |a XIV, 412 p. 149 illus., 128 illus. in color.  |b online resource. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |b PDF  |2 rda 
490 1 |a Advanced Sciences and Technologies for Security Applications,  |x 1613-5113 
505 0 |a Part I - Surveillance of Human Features -- A Survey of Using Biometrics for Smart Visual Surveillance: Gait Recognition -- Comparative Face Soft Biometrics for Human Identification -- Video-Based Human Respiratory Wavelet Extraction and Identity Recognition -- A Study on Human Recognition using Auricle and Side View Face Images -- Cross-spectral Iris Matching for Surveillance Applications -- Facial Surveillance and Recognition in the Passive Infrared Bands -- Deep Feature Learning for Classification when using Single Sensor Multi-Wavelength based Facial Recognition Systems in SWIR Band -- Part II - Surveillance for Security and Defense -- Managing Uncertainty from the Sky: Surveillance through three Generations of Commercial Earth Observation Satellites -- Drones Surveillance - Challenges and Techniques -- Early Warning Against Stealth Aircraft, Missiles and Unmanned Aerial Vehicles. Mobile Data Fusion for Maritime Surveillance -- Mobile stand-off and stand-in surveillance against biowarfare and bioterrorism agents -- Social Networks for Surveillance and Security: 'Using Online Techniques to make something happen in the real or cyber world' -- Surveillance, targeted killing and the fight against Terrorism: a fair-played game -- Part III - Cyber Surveillance Data Hiding in the Wild: Where Computational Intelligence Meets Digital Forensics -- Methods to Detect Cyber threats on Twitter -- Detecting Users Who Share Extremist Content on Twitter -- An Organizational Visualization Profiler Tool Based on Social Interactions -- Cyber-Surveillance Analysis for Supercomputing Environments. 
520 |a This book addresses surveillance in action-related applications, and presents novel research on military, civil and cyber surveillance from an international team of experts. The first part of the book, Surveillance of Human Features, reviews surveillance systems that use biometric technologies. It discusses various novel approaches to areas including gait recognition, face-based physiology-assisted recognition, face recognition in the visible and infrared bands, and cross-spectral iris recognition. The second part of the book, Surveillance for Security and Defense, discusses the ethical issues raised by the use of surveillance systems in the name of combatting terrorism and ensuring security. It presents different generations of satellite surveillance systems and discusses the requirements for real-time satellite surveillance in military contexts. In addition, it explores the new standards of surveillance using unmanned air vehicles and drones, proposes surveillance techniques for detecting stealth aircrafts and drones, and highlights key techniques for maritime border surveillance, bio-warfare and bio-terrorism detection. The last part of the book, Cyber Surveillance, provides a review of data hiding techniques that are used to hinder electronic surveillance. It subsequently presents methods for collecting and analyzing information from social media sites and discusses techniques for detecting internal and external threats posed by various individuals (such as spammers, cyber-criminals, suspicious users or extremists in general). The book concludes by examining how high-performance computing environments can be exploited by malicious users, and what surveillance methods need to be put in place to protect these valuable infrastructures.  The book is primarily intended for military and law enforcement personnel who use surveillance-related technologies, as well as researchers, Master's and Ph.D. students who are interested in learning about the latest advances in military, civilian and cyber surveillance. 
650 0 |a Politics and war. 
650 0 |a Computer crimes. 
650 0 |a Pattern recognition. 
650 0 |a Biometrics (Biology). 
650 0 |a System safety. 
650 1 4 |a Military and Defence Studies.  |0 http://scigraph.springernature.com/things/product-market-codes/912080 
650 2 4 |a Cybercrime.  |0 http://scigraph.springernature.com/things/product-market-codes/1B7000 
650 2 4 |a Pattern Recognition.  |0 http://scigraph.springernature.com/things/product-market-codes/I2203X 
650 2 4 |a Biometrics.  |0 http://scigraph.springernature.com/things/product-market-codes/I22040 
650 2 4 |a Security Science and Technology.  |0 http://scigraph.springernature.com/things/product-market-codes/P31080 
700 1 |a Karampelas, Panagiotis.  |e editor.  |4 edt  |4 http://id.loc.gov/vocabulary/relators/edt 
700 1 |a Bourlai, Thirimachos.  |e editor.  |4 edt  |4 http://id.loc.gov/vocabulary/relators/edt 
710 2 |a SpringerLink (Online service) 
773 0 |t Springer eBooks 
776 0 8 |i Printed edition:  |z 9783319685328 
776 0 8 |i Printed edition:  |z 9783319685342 
776 0 8 |i Printed edition:  |z 9783319886183 
830 0 |a Advanced Sciences and Technologies for Security Applications,  |x 1613-5113 
856 4 0 |u https://doi.org/10.1007/978-3-319-68533-5  |z Full Text via HEAL-Link 
912 |a ZDB-2-POS 
950 |a Political Science and International Studies (Springer-41174)