Search Results

There are 23199 results for: content related to: Real-time robust 3D object tracking and estimation for surveillance system

  1. Multi-camera-based security log management scheme for smart surveillance

    Security and Communication Networks

    Volume 7, Issue 10, October 2014, Pages: 1517–1527, Daehoon Kim, Eenjun Hwang and Seungmin Rho

    Article first published online : 28 FEB 2013, DOI: 10.1002/sec.735

  2. Cardioids-based faster authentication and diagnosis of remote cardiovascular patients

    Security and Communication Networks

    Volume 4, Issue 11, November 2011, Pages: 1351–1368, Fahim Sufi, Ibrahim Khalil and Ibrahim Habib

    Article first published online : 16 MAR 2011, DOI: 10.1002/sec.262

  3. CAPTCHA and its Alternatives: A Review

    Security and Communication Networks

    Volume 8, Issue 12, August 2015, Pages: 2135–2156, Mohammad Moradi and MohammadReza Keyvanpour

    Article first published online : 30 OCT 2014, DOI: 10.1002/sec.1157

  4. Single authentication through in convergence space using collaborative smart cameras

    Security and Communication Networks

    Volume 9, Issue 6, April 2016, Pages: 561–570, Geon Woo Kim, Jong Wook Han, Deok Gyu Lee and Sang Wook Kim

    Article first published online : 4 APR 2014, DOI: 10.1002/sec.1007

  5. Performance evaluation of collision avoidance schemes in ad hoc networks

    Security and Communication Networks

    Suryakant Bhandare, Taha Ben Brahim, Saad Biaz and Prathima Agrawal

    Article first published online : 10 MAR 2014, DOI: 10.1002/sec.959

  6. An aggregated signature-based fast RFID batch detection protocol

    Security and Communication Networks

    Volume 7, Issue 9, September 2014, Pages: 1364–1371, Chaoliang Li, Guojun Wang and Jin Zheng

    Article first published online : 10 JUL 2013, DOI: 10.1002/sec.838

  7. SCADA communication and security issues

    Security and Communication Networks

    Volume 7, Issue 1, January 2014, Pages: 175–194, Jingcheng Gao, Jing Liu, Bharat Rajan, Rahul Nori, Bo Fu, Yang Xiao, Wei Liang and C. L. Philip Chen

    Article first published online : 24 JAN 2013, DOI: 10.1002/sec.698

  8. A survey of security visualization for computer network logs

    Security and Communication Networks

    Volume 5, Issue 4, April 2012, Pages: 404–421, Yanping Zhang, Yang Xiao, Min Chen, Jingyuan Zhang and Hongmei Deng

    Article first published online : 11 MAY 2011, DOI: 10.1002/sec.324

  9. You have free access to this content
    ON THE DETERMINISTIC DESCRIPTION OF EARTHQUAKES

    Reviews of Geophysics

    Volume 49, Issue 3, September 2011, Andrea Bizzarri

    Article first published online : 9 AUG 2011, DOI: 10.1029/2011RG000356

  10. Attack modelling and security evaluation based on stochastic activity networks

    Security and Communication Networks

    Volume 7, Issue 4, April 2014, Pages: 714–737, Ali Sedaghatbaf and Mohammad Abdollahi Azgomi

    Article first published online : 26 APR 2013, DOI: 10.1002/sec.774

  11. Cooperative security management for broadband network environments

    Security and Communication Networks

    Volume 8, Issue 18, December 2015, Pages: 3953–3977, Tiago Cruz, Paulo Simões, Edmundo Monteiro, Fernando Bastos and Alexandre Laranjeira

    Article first published online : 20 JUL 2015, DOI: 10.1002/sec.1313

  12. RFID system for public train transportation

    Security and Communication Networks

    Volume 5, Issue 6, June 2012, Pages: 557–571, Chin-Ling Chen and Mei-Li Chong

    Article first published online : 5 NOV 2010, DOI: 10.1002/sec.260

  13. GlobalView: building global view with log files in a distributed/networked system for accountability

    Security and Communication Networks

    Volume 7, Issue 12, December 2014, Pages: 2564–2586, Yang Xiao, Songqing Yue, Bo Fu and Suat Ozdemir

    Article first published online : 21 SEP 2011, DOI: 10.1002/sec.374

  14. Information geometric security analysis of differential phase-shift quantum key distribution protocol

    Security and Communication Networks

    Volume 6, Issue 2, February 2013, Pages: 129–150, Laszlo Gyongyosi and Sandor Imre

    Article first published online : 19 JUN 2012, DOI: 10.1002/sec.542

  15. Breaking down Captcha using edge corners and fuzzy logic segmentation/recognition technique

    Security and Communication Networks

    Volume 8, Issue 18, December 2015, Pages: 3995–4012, Rabih Al. Nachar, Elie Inaty, Patrick J. Bonnin and Yasser Alayli

    Article first published online : 10 AUG 2015, DOI: 10.1002/sec.1316

  16. Accountability using flow-net: design, implementation, and performance evaluation

    Security and Communication Networks

    Volume 5, Issue 1, January 2012, Pages: 29–49, Yang Xiao, Ke Meng and Daisuke Takahashi

    Article first published online : 16 JUN 2011, DOI: 10.1002/sec.348

  17. Towards efficient deployment of wireless sensor networks

    Security and Communication Networks

    Hacène Fouchal, Philippe Hunel and Cédric Ramassamy

    Article first published online : 12 JUL 2014, DOI: 10.1002/sec.1059

  18. A framework for protecting personal information and privacy

    Security and Communication Networks

    Volume 8, Issue 16, 10 November 2015, Pages: 2867–2874, Hongying Zheng, Quan Yuan and Jianyong Chen

    Article first published online : 26 JAN 2015, DOI: 10.1002/sec.1212

  19. Context-aware usage control for web of things

    Security and Communication Networks

    Volume 7, Issue 12, December 2014, Pages: 2696–2712, Guangdong Bai, Lin Yan, Liang Gu, Yao Guo and Xiangqun Chen

    Article first published online : 15 FEB 2012, DOI: 10.1002/sec.424

  20. GBAAM: group-based access authentication for MTC in LTE networks

    Security and Communication Networks

    Volume 8, Issue 17, 25 November 2015, Pages: 3282–3299, Jin Cao, Maode Ma and Hui Li

    Article first published online : 22 APR 2015, DOI: 10.1002/sec.1252