Abstract is missing.
- Investigating Fairness of Ocular Biometrics Among Young, Middle-Aged, and Older AdultsAnoop Krishnan, Ali Almadan, Ajita Rattani. 1-7 [doi]
- Intelligent Video Surveillance SystemsVenkat Chundi, Jnaneswar Bammidi, Abhijith Pegallapati, Yogesh Parnandi, Aswini Reddithala, Suresh Kumar Moru. 1-5 [doi]
- Emotional reactions to risk perception in the Herculaneum Archaeological ParkFabio Garzia, Francesco Borghini, Ludovica Minò, Alberto Bruni, Soodamani Ramalingam, Mara Lombardi. 1-6 [doi]
- Designing a Modular and Distributed Web Crawler Focused on Unstructured Cybersecurity IntelligenceDonovan Jenkins, Lorie M. Liebrock, Vince Urias. 1-6 [doi]
- Emotional analysis of safeness and risk perception of drones during the COVID-19 pandemic in ItalyFabio Garzia, Francesco Borghini, Antonello Castagnolo, Mara Lombardi, Soodamani Ramalingam. 1-6 [doi]
- Emotional analysis of safeness and risk perception of transports and travels by car and motorcycle in London and Rome during the COVID-19 pandemicFabio Garzia, Francesco Borghini, Antonio Moretti, Mara Lombardi, Soodamani Ramalingam. 1-6 [doi]
- Towards the Resolution of Safety and Security ConflictsCatherine Menon, Stilianos Vidalis. 1-6 [doi]
- Underwater Mine Detection Using Histogram of oriented gradients and Canny Edge DetectorManonmani S, Akshita L, Annette Shajan L, Aneesh Sidharth L, Shanta Rangaswamy. 1-6 [doi]
- Face Masks Usage Monitoring for Public Health Security using Computer Vision on HardwareDimitrios Kolosov, Iosif Mporas. 1-6 [doi]
- Assessment of the Impact of Displaying Two Rear Registration Plates on ANPRMichael Rhead, Robert Gurney, William E. Martin. 1-6 [doi]
- Dynamic Key Generation Mechanism to Strengthen the Data SecurityJ. S. Prasath, Deepa Jose, B. Rammyaa, R. Pandian. 1-9 [doi]
- Emotional analysis of safeness and risk perception of London and Rome railway stations during the COVID-19 pandemicFabio Garzia, Francesco Borghini, Luca Canfora, Mara Lombardi, Soodamani Ramalingam. 1-6 [doi]
- Multiple Criteria Decision-making: Risk Analyses for Cultural Events as one of the Soft Target CategoriesDora Kotkova, Lukas Kralik, Lukas Kotek. 1-6 [doi]
- An Experimental Evaluation on Deepfake Detection using Deep Face RecognitionSreeraj Ramachandran, Aakash Varma Nadimpalli, Ajita Rattani. 1-6 [doi]
- AI facial recognition and biometric detection: balancing consumer rights and corporate interestsFelipe Romero Moreno. 1-5 [doi]
- The Concept of a Software Tool with an Interactive Map for Identification and Determination of Soft Targets of Transport InfrastructureDora Kotkova, Martin Hromada, Martina Malanikova, Stanislav Kovar. 1-5 [doi]
- Emotional analysis of safeness and risk perception of London and Rome airports during the COVID-19 pandemicFabio Garzia, Francesco Borghini, Mattia Zita, Mara Lombardi, Soodamani Ramalingam. 1-6 [doi]
- Assessment of Foreign Trailer Number Plates on UK Roads, Implications for ANPRRobert Gurney, Michael Rhead, William E. Martin. 1-6 [doi]
- The Process to Plan Security Measures for Cultural EventsDora Kotkova, Tereza Sternova, Zdenek Kalvach, Lukas Kotek. 1-6 [doi]
- Current Trends in Cyber Security for DronesC. R. S. Kumar, Sanket Mohanty. 1-5 [doi]
- Resilience-Based Performance Measures for Next-Generation Systems Security EngineeringAdam D. Williams, Thomas Adams, Jamie Wingo, Gabriel C. Birch, Susan A. Caskey, Elizabeth S. Fleming, Thushara Gunda. 1-5 [doi]
- Use of detection of suspicious behavior in ensuring the security of persons in transportKrystyna Ljubymenko, Dora Kotkova, Tereza Sternova. 1-4 [doi]
- Likelihood of Unintentional Electromagnetic Emanations Compromising IT Equipment Security: Perspectives of Practitioners on Causal FactorsMaxwell Martin, Funlade T. Sunmola, David Lauder. 1-6 [doi]
- Artificial Intelligence in Security Technologies: Levels of Intelligent Autonomy and RiskDeborah Evans, Michael Coole. 1-6 [doi]
- Privacy and Security Threats from Smart Meters TechnologyMatthew Robinson, Pascal A. Schirmer, Iosif Mporas. 1-6 [doi]
- Creating effective fingerprint artefacts: a cooperative and a non-cooperative method for bypassing capacitive and optical sensors with high success rateRyan Carvalho, Norbert Tihanyi. 1-6 [doi]
- Evaluation of Electrocardiogram Biometric Verification Models Based on Short Enrollment Time on Medical and Wearable RecordersHazal Su Biçakci, Marco Santopietro, Matthew Boakes, Richard M. Guest. 1-6 [doi]
- Comparative Study of Cryptographic and Biometric SignaturesVladimir Smejkal, Jindrich Kodl. 1-6 [doi]
- One vs. One Offline Signature Verification: A Forensic Handwriting Examiners PerspectiveMoisés Díaz, Jesús B. Alonso, Miguel A. Ferrer, Cristina Carmona 0003. 1-6 [doi]
- The Variable Reflective Properties of UK Number Plates and Impact on ANPRMichael Rhead, Robert Gurney, William E. Martin. 1-6 [doi]
- A Network Intrusion Detection System Using Ensemble Machine LearningAklil Zenebe Kiflay, Athanasios Tsokanos, Raimund Kirner. 1-6 [doi]
- IoT Security with QoS: Game changer for Industry and STEM EducationM. Y. Jamro. 1-4 [doi]
- Towards human-like kinematics in industrial robotic arms: a case study on a UR3 robotAdam Wolniakowski, Jose J. Quintana, Moisés Díaz, Kanstantsin Miatliuk, Miguel A. Ferrer. 1-5 [doi]