Abstract is missing.
- Communication among incident responders - A studyBrett C. Tjaden, Robert Floodeen. 1-6 [doi]
- Integrated communications and navigation modulePaul C. Haddock, John W. Hatley, William D. Morse, Robert D. Tooley. 1-5 [doi]
- Outdoor perimeter security sensors a forty year perspectiveKeith Harman, Wayne K. Messner. 1-9 [doi]
- Special Nuclear material and critical infrastructure security modeling and simulation of physical protection systemsDean Dominguez, Mancel Jordan Parks, Adam D. Williams, Susan Washburn. 10-14 [doi]
- Evaluation of physical protection system effectivenessZdenek Vintr, Michal Vintr, Jindrich Malach. 15-21 [doi]
- Toward a performance requirement for sensored conformable aperturesMark D. Murton, Dale T. van Dongen, Michael P. Ross, Francis A. Bouchier. 22-26 [doi]
- Leveraging a crowd sourcing methodology to enhance supply chain integrityHan Lin, Moses Schwartz, John Michalski, Mayuri Shakamuri, Philip Campbell. 27-33 [doi]
- Design and performance testing of an integrated detection and assessment perimeter systemJeffrey G. Dabling, James O. McLaughlin, Jason J. Andersen. 34-42 [doi]
- Probabilistic basis and assessment methodology for effectiveness of protecting nuclear materialsFelicia A. Durán. 43-52 [doi]
- A mission resilience assessment methodology for infrastructure disruptionsEric D. Vugrin, Kevin L. Stamber, Michael Baca, Gio Kao, Hai Le, Michael Mtchell, Rick Ramirez, Kim Welch. 53-58 [doi]
- Attack tree-based evaluation of physical protection systems vulnerabilityZdenek Vintr, David Valis, Jindrich Malach. 59-65 [doi]
- General software for multimodal signal modeling and optimal sensor placement: Environmental Awareness for Sensor and Emitter Employment (EASEE)Kenneth K. Yamamoto, Sergey N. Vecherin, D. Keith Wilson, Christian T. Borden, Elizabeth Bettencourt, Chris L. Pettit. 66-77 [doi]
- Trial results conducted by multiple Canadian government agencies of the recent covert technology developped by Tektrap to trace and track the integrity of maritime containers worldwideAndre Gagnon, Rene Schmidt. 78-82 [doi]
- Tracking formants in spectrograms and its application in speaker verificationJia-Guu Leu, Liang-tsair Geeng, Chang En Pu, Jyh-Bin Shiau. 83-89 [doi]
- Towards making HCS ear detection robust against rotationAnika Pflug, Philip Michael Back, Christoph Busch. 90-96 [doi]
- Normalization and feature extraction on ear imagesEsther González, Luis Álvarez, Luis Mazorra. 97-104 [doi]
- On the relevance of age in handwritten biometric recognitionMarcos Faúndez-Zanuy, Enric Sesa-Nogueras, Josep Roure Alcobé. 105-109 [doi]
- Biometrie keys based on pseudorandom sequencesMofreh A. Hogo. 110-118 [doi]
- State space blow-up in the verification of secure smartcard interoperabilityMaurizio Talamo, Maulahikmah Galinium, Christian H. Schunck, Franco Arcieri. 119-125 [doi]
- A framework for analysis of quotidian exposure in an instrumented worldLisa A. Shay, Gregory J. Conti, Dominic Larkin, John Nelson. 126-134 [doi]
- Multi-morphological image data hiding based on the application of Rubik's cubic algorithmChang-Lung Tsai, Chun-Jung Chen, Wei-Lieh Hsu. 135-139 [doi]
- New evolutionary tools for a new ciphering system SEC versionMohammed Bougrine, Fouzia Omaiy, Salima Trichni, Bouchra Boulahiat. 140-146 [doi]
- Addressing insider threat using "where you are" as fourth factor authenticationSung Choi, David Zage. 147-153 [doi]
- Advanced access control system for portsFabio Garzia, Roberto Cusani, Enzo Sammarco. 154-162 [doi]
- User Identification and Tracking with online device fingerprints fusionKeiji Takeda. 163-167 [doi]
- Measuring privacy and security of iris fuzzy commitmentXuebing Zhou, Christoph Busch. 168-173 [doi]
- Handwritten signature recognition in mobile scenarios: Performance evaluationRamon Blanco-Gonzalo, Oscar Miguel-Hurtado, Aitor Mendaza-Ormaza, Raul Sánchez-Reillo. 174-179 [doi]
- A concept of automated vulnerability search in contactless communication applicationsMartin Henzl, Petr Hanácek, Peter Jurnecka, Matej Kacic. 180-186 [doi]
- Department of Defense Instruction 8500.2 "Information Assurance (IA) Implementation: " A retrospectivePhilip Campbell. 187-194 [doi]
- CPA performance enhancement based on spectrogramMin-Ku Kim, Dong-Guk Han, Jeong Choon Ryoo, Okyeon Yi. 195-200 [doi]
- CPA performance comparison based on Wavelet TransformAesun Park, Dong-Guk Han, Jeong Choon Ryoo. 201-206 [doi]
- Automatic credit card fraud detection based on non-linear signal processingAddisson Salazar, Gonzalo Safont, Antonio Soriano, Luis Vergara. 207-212 [doi]
- Enhancing static biometric signature verification using Speeded-Up Robust FeaturesRichard Guest, Oscar Miguel-Hurtado. 213-217 [doi]
- Automatic lip identification applied under soft facial emotion conditionsAntonio M. Rojas, Carlos M. Travieso, Jesús B. Alonso, Miguel A. Ferrer. 218-223 [doi]
- Multisampling approach applied to contactless hand biometricsAythami Morales, Miguel A. Ferrer, Carlos M. Travieso, Jesús B. Alonso. 224-229 [doi]
- Combination of multiple detectors for EEG based biometric identification/authenticationGonzalo Safont, Addisson Salazar, Antonio Soriano, Luis Vergara. 230-236 [doi]
- Methods for the prevention of the use of mobile phones in Correctional institutionsSylvio Bisson, Pushkar E. Godbole, Matthew McKee, Marc St-Amand. 237-245 [doi]
- Using Neural Networks for Extended DetectionLester A. Cano. 246-250 [doi]
- Encryption in mobile wireless mesh networksEdward L. Witzke, Joseph P. Brenkosh, Karl L. Green, Loren E. Riblett, James M. Wiseman. 251-256 [doi]
- A radio frequency measurement technique utilizing audio distortion to access the instantaneous sensitivity of a security systems receiverPaul C. Haddock. 257-260 [doi]
- Air cargo screening for stowaway detection: Carbon dioxide monitors and Heartbeat Monitor assessment and qualificationEd Rao. 261-266 [doi]
- Why laptops should be screened separately when conventional x-ray screening is usedMarcia Mendes, Adrian Schwaninger, Nadine Strebel, Stefan Michel. 267-273 [doi]
- Initial results of web based blended learning in the field of air cargo securityPhilipp Sury, Sandrina Ritzmann, Adrian Schwaninger. 274-279 [doi]
- Video based system for railroad collision warningJonny A. Uribe, Luis Fonseca, J. F. Vargas. 280-285 [doi]
- Accuracy of automatic number plate recognition (ANPR) and real world UK number plate problemsMike Rhead, Robert Gurney, Soodamani Ramalingam, Neil Cohen. 286-291 [doi]
- Improved surface swimmer detection through multimodal data fusionDonald A. Sheaffer, David C. Burnett. 292-296 [doi]
- Plasma barrier force-field access denial systemErnesto Gonzaga, Harold J. Cossette. 297-304 [doi]
- Basic Genetic Algorithm pattern for use in self-organizing agile securityRich Messenger, Rick Dove. 305-311 [doi]
- Basic genetic-algorithm-neural-network (GANN) pattern with a self-organizing security exampleDavid Streisand, Rick Dove. 312-318 [doi]
- A quorum sensing pattern for multi-agent self-organizing security systemsJeff Hamar, Rick Dove. 319-324 [doi]
- CCTV Operator Performance BenchmarkingS. Rankin, N. Cohen, K. MacLennan-Brown, K. Sage. 325-330 [doi]
- Working towards an international ANPR Standard - An initial investigation into the UK standardRobert Gurney, Mike Rhead, Soodamani Ramalingam, Neil Cohen. 331-337 [doi]
- Super-resolution processing of the partial pictorial image of the single pictorial image which eliminated artificialityYuichiro Yamada, Daisuke Sasagawa. 338-344 [doi]
- Modeling and evaluation of image quality in wireless surveillance networksMatthew Ibekwe, Stanislav Vítek, Milos Klima, Petr Dostál. 345-362 [doi]
- Cost-effective automatic stereoscopic security video system 3DSecStanislav Vítek, Milos Klima, Petr Dostál. 353-358 [doi]
- Assessment of video analytics for exterior intrusion detection applicationsBradley C. Norman. 359-362 [doi]
- Contribution of the temperature of the objects to the problem of thermal imaging focusingVirginia Espinosa-Duro, Marcos Faúndez-Zanuy, Jirí Mekyska. 363-366 [doi]
- HLFSIM: Objective image quality metric based on ROI analysisPetr Dostál, Lukas Krasula, Milos Klima. 367-375 [doi]