skip to content
Surveillance in Action : Technologies for Civilian, Military and Cyber Surveillance Preview this item
ClosePreview this item
Checking...

Surveillance in Action : Technologies for Civilian, Military and Cyber Surveillance

Author: Panagiotis Karampelas; Thirimachos Bourlai
Publisher: Cham : Springer International Publishing : Imprint : Springer, 2018.
Series: Advanced sciences and technologies for security applications
Edition/Format:   eBook : Document : EnglishView all editions and formats
Summary:
This book addresses surveillance in action-related applications, and presents novel research on military, civil and cyber surveillance from an international team of experts. The first part of the book, Surveillance of Human Features, reviews surveillance systems that use biometric technologies. It discusses various novel approaches to areas including gait recognition, face-based physiology-assisted recognition, face  Read more...
Rating:

(not yet rated) 0 with reviews - Be the first.

Subjects
More like this

Find a copy online

Links to this item

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...

Details

Genre/Form: Electronic books
Additional Physical Format: Printed edition:
Material Type: Document, Internet resource
Document Type: Internet Resource, Computer File
All Authors / Contributors: Panagiotis Karampelas; Thirimachos Bourlai
ISBN: 9783319685335 3319685333
OCLC Number: 1017796380
Description: 1 online resource (XIV, 412 pages 149 illustrations, 128 illustrations in color.) : online resource
Contents: Part I --
Surveillance of Human Features --
A Survey of Using Biometrics for Smart Visual Surveillance: Gait Recognition --
Comparative Face Soft Biometrics for Human Identification --
Video-Based Human Respiratory Wavelet Extraction and Identity Recognition --
A Study on Human Recognition using Auricle and Side View Face Images --
Cross-spectral Iris Matching for Surveillance Applications --
Facial Surveillance and Recognition in the Passive Infrared Bands --
Deep Feature Learning for Classification when using Single Sensor Multi-Wavelength based Facial Recognition Systems in SWIR Band --
Part II --
Surveillance for Security and Defense --
Managing Uncertainty from the Sky: Surveillance through three Generations of Commercial Earth Observation Satellites --
Drones Surveillance --
Challenges and Techniques --
Early Warning Against Stealth Aircraft, Missiles and Unmanned Aerial Vehicles. Mobile Data Fusion for Maritime Surveillance --
Mobile stand-off and stand-in surveillance against biowarfare and bioterrorism agents --
Social Networks for Surveillance and Security: 'Using Online Techniques to make something happen in the real or cyber world' --
Surveillance, targeted killing and the fight against Terrorism: a fair-played game --
Part III --
Cyber Surveillance Data Hiding in the Wild: Where Computational Intelligence Meets Digital Forensics --
Methods to Detect Cyber threats on Twitter --
Detecting Users Who Share Extremist Content on Twitter --
An Organizational Visualization Profiler Tool Based on Social Interactions --
Cyber-Surveillance Analysis for Supercomputing Environments.
Series Title: Advanced sciences and technologies for security applications
Responsibility: edited by Panagiotis Karampelas, Thirimachos Bourlai.

Abstract:

This book addresses surveillance in action-related applications, and presents novel research on military, civil and cyber surveillance from an international team of experts. The first part of the book, Surveillance of Human Features, reviews surveillance systems that use biometric technologies. It discusses various novel approaches to areas including gait recognition, face-based physiology-assisted recognition, face recognition in the visible and infrared bands, and cross-spectral iris recognition. The second part of the book, Surveillance for Security and Defense, discusses the ethical issues raised by the use of surveillance systems in the name of combatting terrorism and ensuring security. It presents different generations of satellite surveillance systems and discusses the requirements for real-time satellite surveillance in military contexts. In addition, it explores the new standards of surveillance using unmanned air vehicles and drones, proposes surveillance techniques for detecting stealth aircrafts and drones, and highlights key techniques for maritime border surveillance, bio-warfare and bio-terrorism detection. The last part of the book, Cyber Surveillance, provides a review of data hiding techniques that are used to hinder electronic surveillance. It subsequently presents methods for collecting and analyzing information from social media sites and discusses techniques for detecting internal and external threats posed by various individuals (such as spammers, cyber-criminals, suspicious users or extremists in general). The book concludes by examining how high-performance computing environments can be exploited by malicious users, and what surveillance methods need to be put in place to protect these valuable infrastructures. The book is primarily intended for military and law enforcement personnel who use surveillance-related technologies, as well as researchers, Master's and Ph. D. students who are interested in learning about the latest advances in military, civilian and cyber surveillance.

Reviews

User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...

Tags

Be the first.
Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data


Primary Entity

<http://www.worldcat.org/oclc/1017796380> # Surveillance in Action : Technologies for Civilian, Military and Cyber Surveillance
    a schema:CreativeWork, schema:Book, schema:MediaObject ;
    library:oclcnum "1017796380" ;
    library:placeOfPublication <http://id.loc.gov/vocabulary/countries/gw> ;
    schema:about <http://experiment.worldcat.org/entity/work/data/4707907382#Topic/pattern_perception> ; # Pattern perception
    schema:about <http://experiment.worldcat.org/entity/work/data/4707907382#Topic/political_science_political_freedom_&_security_international_security> ; # Political Science--Political Freedom & Security--International Security
    schema:about <http://experiment.worldcat.org/entity/work/data/4707907382#Topic/warfare_&_defence> ; # Warfare & defence
    schema:about <http://experiment.worldcat.org/entity/work/data/4707907382#Topic/pattern_recognition> ; # Pattern recognition
    schema:about <http://experiment.worldcat.org/entity/work/data/4707907382#Topic/technology_&_engineering_engineering_general> ; # Technology & Engineering--Engineering (General)
    schema:about <http://experiment.worldcat.org/entity/work/data/4707907382#Topic/politics_and_war> ; # Politics and war
    schema:about <http://experiment.worldcat.org/entity/work/data/4707907382#Topic/computer_crimes> ; # Computer crimes
    schema:about <http://experiment.worldcat.org/entity/work/data/4707907382#Topic/biometry> ; # Biometry
    schema:about <http://experiment.worldcat.org/entity/work/data/4707907382#Topic/social_science_criminology> ; # Social Science--Criminology
    schema:about <http://experiment.worldcat.org/entity/work/data/4707907382#Topic/political_science> ; # Political science
    schema:about <http://experiment.worldcat.org/entity/work/data/4707907382#Topic/system_safety> ; # System safety
    schema:about <http://dewey.info/class/355/e23/> ;
    schema:about <http://experiment.worldcat.org/entity/work/data/4707907382#Topic/computers_computer_vision_&_pattern_recognition> ; # Computers--Computer Vision & Pattern Recognition
    schema:about <http://experiment.worldcat.org/entity/work/data/4707907382#Topic/technology_&_engineering_mechanical> ; # TECHNOLOGY & ENGINEERING--Mechanical
    schema:about <http://experiment.worldcat.org/entity/work/data/4707907382#Topic/crime_&_criminology> ; # Crime & criminology
    schema:about <http://experiment.worldcat.org/entity/work/data/4707907382#Topic/security_&_fire_alarm_systems> ; # Security & fire alarm systems
    schema:bookFormat schema:EBook ;
    schema:datePublished "2018" ;
    schema:description "Part I -- Surveillance of Human Features -- A Survey of Using Biometrics for Smart Visual Surveillance: Gait Recognition -- Comparative Face Soft Biometrics for Human Identification -- Video-Based Human Respiratory Wavelet Extraction and Identity Recognition -- A Study on Human Recognition using Auricle and Side View Face Images -- Cross-spectral Iris Matching for Surveillance Applications -- Facial Surveillance and Recognition in the Passive Infrared Bands -- Deep Feature Learning for Classification when using Single Sensor Multi-Wavelength based Facial Recognition Systems in SWIR Band -- Part II -- Surveillance for Security and Defense -- Managing Uncertainty from the Sky: Surveillance through three Generations of Commercial Earth Observation Satellites -- Drones Surveillance -- Challenges and Techniques -- Early Warning Against Stealth Aircraft, Missiles and Unmanned Aerial Vehicles. Mobile Data Fusion for Maritime Surveillance -- Mobile stand-off and stand-in surveillance against biowarfare and bioterrorism agents -- Social Networks for Surveillance and Security: 'Using Online Techniques to make something happen in the real or cyber world' -- Surveillance, targeted killing and the fight against Terrorism: a fair-played game -- Part III -- Cyber Surveillance Data Hiding in the Wild: Where Computational Intelligence Meets Digital Forensics -- Methods to Detect Cyber threats on Twitter -- Detecting Users Who Share Extremist Content on Twitter -- An Organizational Visualization Profiler Tool Based on Social Interactions -- Cyber-Surveillance Analysis for Supercomputing Environments."@en ;
    schema:description "This book addresses surveillance in action-related applications, and presents novel research on military, civil and cyber surveillance from an international team of experts. The first part of the book, Surveillance of Human Features, reviews surveillance systems that use biometric technologies. It discusses various novel approaches to areas including gait recognition, face-based physiology-assisted recognition, face recognition in the visible and infrared bands, and cross-spectral iris recognition. The second part of the book, Surveillance for Security and Defense, discusses the ethical issues raised by the use of surveillance systems in the name of combatting terrorism and ensuring security. It presents different generations of satellite surveillance systems and discusses the requirements for real-time satellite surveillance in military contexts. In addition, it explores the new standards of surveillance using unmanned air vehicles and drones, proposes surveillance techniques for detecting stealth aircrafts and drones, and highlights key techniques for maritime border surveillance, bio-warfare and bio-terrorism detection. The last part of the book, Cyber Surveillance, provides a review of data hiding techniques that are used to hinder electronic surveillance. It subsequently presents methods for collecting and analyzing information from social media sites and discusses techniques for detecting internal and external threats posed by various individuals (such as spammers, cyber-criminals, suspicious users or extremists in general). The book concludes by examining how high-performance computing environments can be exploited by malicious users, and what surveillance methods need to be put in place to protect these valuable infrastructures. The book is primarily intended for military and law enforcement personnel who use surveillance-related technologies, as well as researchers, Master's and Ph. D. students who are interested in learning about the latest advances in military, civilian and cyber surveillance."@en ;
    schema:editor <http://experiment.worldcat.org/entity/work/data/4707907382#Person/karampelas_panagiotis> ; # Panagiotis Karampelas
    schema:editor <http://experiment.worldcat.org/entity/work/data/4707907382#Person/bourlai_thirimachos> ; # Thirimachos Bourlai
    schema:exampleOfWork <http://worldcat.org/entity/work/id/4707907382> ;
    schema:genre "Electronic books"@en ;
    schema:inLanguage "en" ;
    schema:isPartOf <http://worldcat.org/issn/1613-5113> ; # Advanced sciences and technologies for security applications,
    schema:isSimilarTo <http://worldcat.org/entity/work/data/4707907382#CreativeWork/> ;
    schema:name "Surveillance in Action : Technologies for Civilian, Military and Cyber Surveillance"@en ;
    schema:productID "1017796380" ;
    schema:url <https://doi.org/10.1007/978-3-319-68533-5> ;
    schema:workExample <http://worldcat.org/isbn/9783319685335> ;
    schema:workExample <http://dx.doi.org/10.1007/978-3-319-68533-5> ;
    wdrs:describedby <http://www.worldcat.org/title/-/oclc/1017796380> ;
    .


Related Entities

<http://experiment.worldcat.org/entity/work/data/4707907382#Person/bourlai_thirimachos> # Thirimachos Bourlai
    a schema:Person ;
    schema:familyName "Bourlai" ;
    schema:givenName "Thirimachos" ;
    schema:name "Thirimachos Bourlai" ;
    .

<http://experiment.worldcat.org/entity/work/data/4707907382#Person/karampelas_panagiotis> # Panagiotis Karampelas
    a schema:Person ;
    schema:familyName "Karampelas" ;
    schema:givenName "Panagiotis" ;
    schema:name "Panagiotis Karampelas" ;
    .

<http://experiment.worldcat.org/entity/work/data/4707907382#Topic/computers_computer_vision_&_pattern_recognition> # Computers--Computer Vision & Pattern Recognition
    a schema:Intangible ;
    schema:name "Computers--Computer Vision & Pattern Recognition"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/4707907382#Topic/crime_&_criminology> # Crime & criminology
    a schema:Intangible ;
    schema:name "Crime & criminology"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/4707907382#Topic/pattern_perception> # Pattern perception
    a schema:Intangible ;
    schema:name "Pattern perception"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/4707907382#Topic/pattern_recognition> # Pattern recognition
    a schema:Intangible ;
    schema:name "Pattern recognition"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/4707907382#Topic/political_science> # Political science
    a schema:Intangible ;
    schema:name "Political science"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/4707907382#Topic/political_science_political_freedom_&_security_international_security> # Political Science--Political Freedom & Security--International Security
    a schema:Intangible ;
    schema:name "Political Science--Political Freedom & Security--International Security"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/4707907382#Topic/security_&_fire_alarm_systems> # Security & fire alarm systems
    a schema:Intangible ;
    schema:name "Security & fire alarm systems"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/4707907382#Topic/social_science_criminology> # Social Science--Criminology
    a schema:Intangible ;
    schema:name "Social Science--Criminology"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/4707907382#Topic/technology_&_engineering_engineering_general> # Technology & Engineering--Engineering (General)
    a schema:Intangible ;
    schema:name "Technology & Engineering--Engineering (General)"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/4707907382#Topic/technology_&_engineering_mechanical> # TECHNOLOGY & ENGINEERING--Mechanical
    a schema:Intangible ;
    schema:name "TECHNOLOGY & ENGINEERING--Mechanical"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/4707907382#Topic/warfare_&_defence> # Warfare & defence
    a schema:Intangible ;
    schema:name "Warfare & defence"@en ;
    .

<http://worldcat.org/entity/work/data/4707907382#CreativeWork/>
    a schema:CreativeWork ;
    schema:description "Printed edition:" ;
    schema:isSimilarTo <http://www.worldcat.org/oclc/1017796380> ; # Surveillance in Action : Technologies for Civilian, Military and Cyber Surveillance
    .

<http://worldcat.org/isbn/9783319685335>
    a schema:ProductModel ;
    schema:isbn "3319685333" ;
    schema:isbn "9783319685335" ;
    .

<http://worldcat.org/issn/1613-5113> # Advanced sciences and technologies for security applications,
    a bgn:PublicationSeries ;
    schema:hasPart <http://www.worldcat.org/oclc/1017796380> ; # Surveillance in Action : Technologies for Civilian, Military and Cyber Surveillance
    schema:issn "1613-5113" ;
    schema:name "Advanced sciences and technologies for security applications," ;
    schema:name "Advanced Sciences and Technologies for Security Applications," ;
    .

<http://www.worldcat.org/title/-/oclc/1017796380>
    a genont:InformationResource, genont:ContentTypeGenericResource ;
    schema:about <http://www.worldcat.org/oclc/1017796380> ; # Surveillance in Action : Technologies for Civilian, Military and Cyber Surveillance
    schema:dateModified "2019-07-10" ;
    void:inDataset <http://purl.oclc.org/dataset/WorldCat> ;
    .


Content-negotiable representations

Close Window

Please sign in to WorldCat 

Don't have an account? You can easily create a free account.