Security via Surveillance and Monitoring
2010 ◽
pp. 579-602