Loading…
Combination of multiple detectors for EEG based biometric identification/authentication
Safont, G., Salazar, A., Soriano, A., Vergara, L.
Published in 2012 IEEE International Carnahan Conference on Security Technology (ICCST) (01.10.2012)
Published in 2012 IEEE International Carnahan Conference on Security Technology (ICCST) (01.10.2012)
Get full text
Conference Proceeding
Loading…
Automatic credit card fraud detection based on non-linear signal processing
Salazar, A., Safont, G., Soriano, A., Vergara, L.
Published in 2012 IEEE International Carnahan Conference on Security Technology (ICCST) (01.10.2012)
Published in 2012 IEEE International Carnahan Conference on Security Technology (ICCST) (01.10.2012)
Get full text
Conference Proceeding
Loading…
Accuracy of automatic number plate recognition (ANPR) and real world UK number plate problems
Rhead, M., Gurney, R., Ramalingam, S., Cohen, N.
Published in 2012 IEEE International Carnahan Conference on Security Technology (ICCST) (01.10.2012)
Published in 2012 IEEE International Carnahan Conference on Security Technology (ICCST) (01.10.2012)
Get full text
Conference Proceeding
Loading…
Loading…
Addressing insider threat using "where you are" as fourth factor authentication
Sung Choi, Zage, D.
Published in 2012 IEEE International Carnahan Conference on Security Technology (ICCST) (01.10.2012)
Published in 2012 IEEE International Carnahan Conference on Security Technology (ICCST) (01.10.2012)
Get full text
Conference Proceeding
Loading…
Video based system for railroad collision warning
Uribe, J. A., Fonseca, L., Vargas, J. F.
Published in 2012 IEEE International Carnahan Conference on Security Technology (ICCST) (01.10.2012)
Published in 2012 IEEE International Carnahan Conference on Security Technology (ICCST) (01.10.2012)
Get full text
Conference Proceeding
Loading…
Working towards an international ANPR Standard - An initial investigation into the UK standard
Gurney, R., Rhead, M., Ramalingam, S., Cohen, N.
Published in 2012 IEEE International Carnahan Conference on Security Technology (ICCST) (01.10.2012)
Published in 2012 IEEE International Carnahan Conference on Security Technology (ICCST) (01.10.2012)
Get full text
Conference Proceeding
Loading…
Evaluation of physical protection system effectiveness
Vintr, Z., Vintr, M., Malach, J.
Published in 2012 IEEE International Carnahan Conference on Security Technology (ICCST) (01.10.2012)
Published in 2012 IEEE International Carnahan Conference on Security Technology (ICCST) (01.10.2012)
Get full text
Conference Proceeding
Loading…
Normalization and feature extraction on ear images
Gonzalez, E., Alvarez, L., Mazorra, L.
Published in 2012 IEEE International Carnahan Conference on Security Technology (ICCST) (01.10.2012)
Published in 2012 IEEE International Carnahan Conference on Security Technology (ICCST) (01.10.2012)
Get full text
Conference Proceeding
Loading…
Biometrie keys based on pseudorandom sequences
Hogo, M. A.
Published in 2012 IEEE International Carnahan Conference on Security Technology (ICCST) (01.10.2012)
Published in 2012 IEEE International Carnahan Conference on Security Technology (ICCST) (01.10.2012)
Get full text
Conference Proceeding
Loading…
User Identification and Tracking with online device fingerprints fusion
Takeda, K.
Published in 2012 IEEE International Carnahan Conference on Security Technology (ICCST) (01.10.2012)
Published in 2012 IEEE International Carnahan Conference on Security Technology (ICCST) (01.10.2012)
Get full text
Conference Proceeding
Loading…
Multi-morphological image data hiding based on the application of Rubik's cubic algorithm
Chang-Lung Tsai, Chun-Jung Chen, Wei-Leih Hsu
Published in 2012 IEEE International Carnahan Conference on Security Technology (ICCST) (01.10.2012)
Published in 2012 IEEE International Carnahan Conference on Security Technology (ICCST) (01.10.2012)
Get full text
Conference Proceeding
Loading…
CCTV Operator Performance Benchmarking
Rankin, S., Cohen, N., Maclennan-Brown, K., Sage, K.
Published in 2012 IEEE International Carnahan Conference on Security Technology (ICCST) (01.10.2012)
Published in 2012 IEEE International Carnahan Conference on Security Technology (ICCST) (01.10.2012)
Get full text
Conference Proceeding
Loading…
Multisampling approach applied to contactless hand biometrics
Morales, A., Ferrer, M. A., Travieso, C. M., Alonso, J. B.
Published in 2012 IEEE International Carnahan Conference on Security Technology (ICCST) (01.10.2012)
Published in 2012 IEEE International Carnahan Conference on Security Technology (ICCST) (01.10.2012)
Get full text
Conference Proceeding
Loading…
Attack tree-based evaluation of physical protection systems vulnerability
Vintr, Z., Valis, D., Malach, J.
Published in 2012 IEEE International Carnahan Conference on Security Technology (ICCST) (01.10.2012)
Published in 2012 IEEE International Carnahan Conference on Security Technology (ICCST) (01.10.2012)
Get full text
Conference Proceeding
Loading…
Toward a performance requirement for sensored conformable apertures
Murton, M. D., van Dongen, D. T., Ross, M. P., Bouchier, F. A.
Published in Proceedings - International Carnahan Conference on Security Technology (01.10.2012)
Published in Proceedings - International Carnahan Conference on Security Technology (01.10.2012)
Get full text
Conference Proceeding
Journal Article
Loading…
Loading…
Why laptops should be screened separately when conventional x-ray screening is used
Mendes, M., Schwaninger, A., Strebel, N., Michel, S.
Published in 2012 IEEE International Carnahan Conference on Security Technology (ICCST) (01.10.2012)
Published in 2012 IEEE International Carnahan Conference on Security Technology (ICCST) (01.10.2012)
Get full text
Conference Proceeding
Loading…
New evolutionary tools for a new ciphering system SEC version
Bougrine, M., Omaiy, F., Trichni, S., Boulahiat, B.
Published in 2012 IEEE International Carnahan Conference on Security Technology (ICCST) (01.10.2012)
Published in 2012 IEEE International Carnahan Conference on Security Technology (ICCST) (01.10.2012)
Get full text
Conference Proceeding
Loading…
On the relevance of age in handwritten biometric recognition
Faundez-Zanuy, M., Sesa-Nogueras, E., Roure-Alcobe, J.
Published in 2012 IEEE International Carnahan Conference on Security Technology (ICCST) (01.10.2012)
Published in 2012 IEEE International Carnahan Conference on Security Technology (ICCST) (01.10.2012)
Get full text
Conference Proceeding