ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
44th Annual 2010 IEEE International Carnahan Conference on Security Technology
Latest Publications
TOTAL DOCUMENTS
70
(FIVE YEARS 0)
H-INDEX
6
(FIVE YEARS 0)
Published By IEEE
9781424474035
Latest Documents
Most Cited Documents
Contributed Authors
Related Sources
Related Keywords
Latest Documents
Most Cited Documents
Contributed Authors
Related Sources
Related Keywords
Explosive Detection Equipment Program
44th Annual 2010 IEEE International Carnahan Conference on Security Technology
◽
10.1109/ccst.2010.5678712
◽
2010
◽
Author(s):
Melinda K. McPherson
Keyword(s):
Explosive Detection
Download Full-text
Constructing a risk dependency-based availability model
44th Annual 2010 IEEE International Carnahan Conference on Security Technology
◽
10.1109/ccst.2010.5678723
◽
2010
◽
Author(s):
Dwen-Ren Tsai
◽
Hui-An Sang
Keyword(s):
Availability Model
◽
Risk Dependency
Download Full-text
A privacy protection architecture in sharing biometric information for NATO applications
44th Annual 2010 IEEE International Carnahan Conference on Security Technology
◽
10.1109/ccst.2010.5678689
◽
2010
◽
Author(s):
Qinghan Xiao
Keyword(s):
Privacy Protection
◽
Biometric Information
Download Full-text
Using SysML to model complex systems for security
44th Annual 2010 IEEE International Carnahan Conference on Security Technology
◽
10.1109/ccst.2010.5678679
◽
2010
◽
Author(s):
Lester A. Cano
Keyword(s):
Complex Systems
◽
Model Complex
Download Full-text
Pattern qualifications and examples of next-generation agile system-security strategies
44th Annual 2010 IEEE International Carnahan Conference on Security Technology
◽
10.1109/ccst.2010.5678693
◽
2010
◽
Cited By ~ 11
Author(s):
Rick Dove
Keyword(s):
System Security
◽
Next Generation
Download Full-text
Advanced color image demosaicing in security imaging technology
44th Annual 2010 IEEE International Carnahan Conference on Security Technology
◽
10.1109/ccst.2010.5678737
◽
2010
◽
Cited By ~ 2
Author(s):
Petr Dostal
◽
Milos Klima
Keyword(s):
Color Image
◽
Imaging Technology
Download Full-text
Combining FM broadcast, accelerometers, IEEE 892.15.4 wireless and GPS to secure maritime containers worldwide
44th Annual 2010 IEEE International Carnahan Conference on Security Technology
◽
10.1109/ccst.2010.5678726
◽
2010
◽
Cited By ~ 1
Author(s):
Rene Schmidt
◽
Andre Gagnon
◽
Dan Brooks
Keyword(s):
Fm Broadcast
Download Full-text
Effectiveness of computer-based training for improving detection of Improvised Explosive Devices by screeners is highly dependent on the types of IEDS used during training
44th Annual 2010 IEEE International Carnahan Conference on Security Technology
◽
10.1109/ccst.2010.5678717
◽
2010
◽
Author(s):
Diana Hardmeier
◽
Moritz Jaeger
◽
Rebekka Schibli
◽
Adrian Schwaninger
Keyword(s):
Improvised Explosive Devices
◽
Computer Based Training
◽
Computer Based
◽
Improvised Explosive
◽
Explosive Devices
Download Full-text
Traffic monitoring and event analysis based on 3D video process
44th Annual 2010 IEEE International Carnahan Conference on Security Technology
◽
10.1109/ccst.2010.5678673
◽
2010
◽
Author(s):
Chang-Lung Tsai
◽
Chun-Jung Chen
◽
Wei-Lieh Hsu
Keyword(s):
Traffic Monitoring
◽
3D Video
◽
Event Analysis
Download Full-text
Correctional Service Canada's “next generation” command and control systems architecture
44th Annual 2010 IEEE International Carnahan Conference on Security Technology
◽
10.1109/ccst.2010.5678692
◽
2010
◽
Cited By ~ 1
Author(s):
Edwin Morton
Keyword(s):
Control Systems
◽
Command And Control
◽
Next Generation
◽
Systems Architecture
◽
And Control
Download Full-text
Load More ...
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close