ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
2014 International Carnahan Conference on Security Technology (ICCST)
Latest Publications
TOTAL DOCUMENTS
90
(FIVE YEARS 0)
H-INDEX
8
(FIVE YEARS 0)
Published By IEEE
9781479935321, 9781479935307
Latest Documents
Most Cited Documents
Contributed Authors
Related Sources
Related Keywords
Latest Documents
Most Cited Documents
Contributed Authors
Related Sources
Related Keywords
Enhancing security in public transportation services of Roma: The PANDORA system
2014 International Carnahan Conference on Security Technology (ICCST)
◽
10.1109/ccst.2014.6986969
◽
2014
◽
Cited By ~ 2
Author(s):
Pierluigi Pelargonio
◽
Marco Pugliese
Keyword(s):
Public Transportation
◽
Transportation Services
Download Full-text
Aerial surveillance and airborne remote sensing techniques in Guardia di Finanza: An operational experience: Guardia di Finanza and CRdC BENECON, police officers and university researchers to protect and safeguard social fairness and legality
2014 International Carnahan Conference on Security Technology (ICCST)
◽
10.1109/ccst.2014.6986967
◽
2014
◽
Author(s):
Flaviano Tessitore
Keyword(s):
Remote Sensing
◽
Police Officers
◽
Operational Experience
◽
Airborne Remote Sensing
◽
Aerial Surveillance
◽
Remote Sensing Techniques
Download Full-text
A reasoning approach for modelling and predicting terroristic attacks in urban environments
2014 International Carnahan Conference on Security Technology (ICCST)
◽
10.1109/ccst.2014.6987009
◽
2014
◽
Author(s):
Francesco Archetti
◽
Divna Djordjevic
◽
Ilaria Giordani
◽
Raul Sormani
◽
Francesco Tisato
Keyword(s):
Urban Environments
Download Full-text
A fidelity framework for small arms combat
2014 International Carnahan Conference on Security Technology (ICCST)
◽
10.1109/ccst.2014.6987008
◽
2014
◽
Author(s):
Mark Murton
◽
Paul Johnston
◽
Russel Waymire
◽
Deborah Belasich
Keyword(s):
Small Arms
Download Full-text
Investigating multimedia contents
2014 International Carnahan Conference on Security Technology (ICCST)
◽
10.1109/ccst.2014.6986976
◽
2014
◽
Cited By ~ 2
Author(s):
Alessia De Rosa
◽
Alessandro Piva
◽
Marco Fontani
◽
Massimo Iuliani
Keyword(s):
Multimedia Contents
Download Full-text
EMBERS: EpheMeral biometrically enhanced real-time location System
2014 International Carnahan Conference on Security Technology (ICCST)
◽
10.1109/ccst.2014.6986971
◽
2014
◽
Author(s):
Sung Choi
◽
Michael Bierma
◽
Yung Ryn Choe
◽
David Zage
Keyword(s):
Real Time
◽
Location System
◽
Real Time Location System
Download Full-text
Towards Security as a Service (SecaaS): On the modeling of Security Services for Cloud Computing
2014 International Carnahan Conference on Security Technology (ICCST)
◽
10.1109/ccst.2014.6986995
◽
2014
◽
Cited By ~ 18
Author(s):
Angelo Furfaro
◽
Alfredo Garro
◽
Andrea Tundis
Keyword(s):
Cloud Computing
◽
Security Services
◽
Security As A Service
Download Full-text
Real-time Security & Dependability monitoring: Make it a bundle
2014 International Carnahan Conference on Security Technology (ICCST)
◽
10.1109/ccst.2014.6987018
◽
2014
◽
Author(s):
Luigi Coppolino
◽
Salvatore D'Antonio
◽
Valerio Formicola
◽
Luigi Romano
Keyword(s):
Real Time
Download Full-text
Video compression technique impact on efficiency of person identification in CCTV systems
2014 International Carnahan Conference on Security Technology (ICCST)
◽
10.1109/ccst.2014.6987027
◽
2014
◽
Author(s):
Stanislav Vitek
◽
Milos Klima
◽
Lukas Krasula
Keyword(s):
Video Compression
◽
Person Identification
◽
Compression Technique
Download Full-text
The art of false alarms in the game of deception: Leveraging fake honeypots for enhanced security
2014 International Carnahan Conference on Security Technology (ICCST)
◽
10.1109/ccst.2014.6987017
◽
2014
◽
Cited By ~ 4
Author(s):
Apostolis Zarras
Keyword(s):
False Alarms
Download Full-text
Load More ...
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close