Intelligent Video Surveillance


Book Description

From the streets of London to subway stations in New York City, hundreds of thousands of surveillance cameras ubiquitously collect hundreds of thousands of videos, often running 24/7. How can such vast volumes of video data be stored, analyzed, indexed, and searched? How can advanced video analysis and systems autonomously recognize people and




Information Security Applications


Book Description

This book constitutes the thoroughly refereed post-workshop proceedings of the 17th International Workshop on Information Security Applications, WISA 2016, held on Jeju Island, Korea, in August 2016. The 31 revised full papers including two invited talks presented in this volume were carefully reviewed and selected from 61 submissions. The papers are organized in topical sections such as network security, threat analysis, application security, cryptographic. Protocols, cryptanalysis, cryptographic implementations, authentication using bio and ML, authentication, ICT Convergent security







The Culture of Surveillance


Book Description

From 9/11 to the Snowden leaks, stories about surveillance increasingly dominate the headlines. But surveillance is not only 'done to us' – it is something we do in everyday life. We submit to surveillance, believing we have nothing to hide. Or we try to protect our privacy or negotiate the terms under which others have access to our data. At the same time, we participate in surveillance in order to supervise children, monitor other road users, and safeguard our property. Social media allow us to keep tabs on others, as well as on ourselves. This is the culture of surveillance. This important book explores the imaginaries and practices of everyday surveillance. Its main focus is not high-tech, organized surveillance operations but our varied, mundane experiences of surveillance that range from the casual and careless to the focused and intentional. It insists that it is time to stop using Orwellian metaphors and find ones suited to twenty-first-century surveillance — from 'The Circle' or 'Black Mirror.' Surveillance culture, David Lyon argues, is not detached from the surveillance state, society and economy. It is informed by them. He reveals how the culture of surveillance may help to domesticate and naturalize surveillance of unwelcome kinds, and considers which kinds of surveillance might be fostered for the common good and human flourishing.




Smart Cities as Democratic Ecologies


Book Description

The concept of the 'smart city' as the confluence of urban planning and technological innovation has become a predominant feature of public policy discourse. Despite its expanding influence, however, there is little consensus on the precise meaning of a 'smart city'. One reason for this ambiguity is that the term means different things to different disciplines. For some, the concept of the 'smart city' refers to advances in sustainability and green technologies. For others, it refers to the deployment of information and communication technologies as next generation infrastructure. This volume focuses on a third strand in this discourse, specifically technology driven changes in democracy and civic engagement. In conjunction with issues related to power grids, transportation networks and urban sustainability, there is a growing need to examine the potential of 'smart cities' as 'democratic ecologies' for citizen empowerment and user-driven innovation. What is the potential of 'smart cities' to become platforms for bottom-up civic engagement in the context of next generation communication, data sharing, and application development? What are the consequences of layering public spaces with computationally mediated technologies? Foucault's notion of the panopticon, a metaphor for a surveillance society, suggests that smart technologies deployed in the design of 'smart cities' should be evaluated in terms of the ways in which they enable, or curtail, new urban literacies and emergent social practices.




Effective Surveillance for Homeland Security


Book Description

Effective Surveillance for Homeland Security: Balancing Technology and Social Issues provides a comprehensive survey of state-of-the-art methods and tools for the surveillance and protection of citizens and critical infrastructures against natural and deliberate threats. Focusing on current technological challenges involving multi-disciplinary problem analysis and systems engineering approaches, it provides an overview of the most relevant aspects of surveillance systems in the framework of homeland security. Addressing both advanced surveillance technologies and the related socio-ethical issues, the book consists of 21 chapters written by international experts from the various sectors of homeland security. Part I, Surveillance and Society, focuses on the societal dimension of surveillance—stressing the importance of societal acceptability as a precondition to any surveillance system. Part II, Physical and Cyber Surveillance, presents advanced technologies for surveillance. It considers developing technologies that are part of a framework whose aim is to move from a simple collection and storage of information toward proactive systems that are able to fuse several information sources to detect relevant events in their early incipient phase. Part III, Technologies for Homeland Security, considers relevant applications of surveillance systems in the framework of homeland security. It presents real-world case studies of how innovative technologies can be used to effectively improve the security of sensitive areas without violating the rights of the people involved. Examining cutting-edge research topics, the book provides you with a comprehensive understanding of the technological, legislative, organizational, and management issues related to surveillance. With a specific focus on privacy, it presents innovative solutions to many of the issues that remain in the quest to balance security with the preservation of privacy that society demands.




Intelligent Green Technologies for Sustainable Smart Cities


Book Description

Intelligent Green Technologies for Sustainable Smart Cities Presenting the concepts and fundamentals of smart cities and developing “green” technologies, this volume, written and edited by a global team of experts, also goes into the practical applications that can be utilized across multiple disciplines and industries, for both the engineer and the student. Smart cities and green technologies are quickly becoming two of the most important areas of development facing today’s engineers, scientists, students, and other professionals. Written by a team of experts in these fields, this outstanding new volume tackles the problem of detailing advances in smart city development, green technologies, and where the two areas intersect to create innovation and revolutionary solutions. This group of hand-selected and vetted papers deals with the fundamental concepts of adapting artificial intelligence, machine learning techniques with green technologies, and many other advances in concepts related to these key areas. Including the most recent research and developments available, this book is an extraordinary source of knowledge for students, engineers seeking the latest research, and facilities and other professionals working in the area of green technologies and challenges and solutions in urban planning and smart city development.




Security and Privacy


Book Description

During the last decade in particular the levels of critical engagement with the challenges posed for privacy by the new technologies have been on the rise. Many scholars have continued to explore the big themes in a manner which typifies the complex interplay between privacy, identity, security and surveillance. This level of engagement is both welcome and timely, particularly in a climate of growing public mistrust of State surveillance activities and business predisposition to monetize information relating to the online activities of users. This volume is informed by the range of discussions currently conducted at scholarly and policy levels. The essays illustrate the value of viewing privacy concerns not only in terms of the means by which information is communicated but also in terms of the political processes that are inevitably engaged and the institutional, regulatory and cultural contexts within which meanings regarding identity and security are constituted.




Intelligent Image and Video Interpretation: Algorithms and Applications


Book Description

Due to increasing potential in real-world applications such as visual communications, computer assisted biomedical imaging, and video surveillance, image and video interpretations have become an area of growing interest. Intelligent Image and Video Interpretation: Algorithms and Applications covers all aspects of image and video analysis from low-level early visions to high-level recognition. This publication highlights how these techniques have become applicable and will prove to be a valuable tool for researchers, professionals, and graduate students working or studying the fields of imaging and video processing.




An Interdisciplinary Approach to Modern Network Security


Book Description

An Interdisciplinary Approach to Modern Network Security presents the latest methodologies and trends in detecting and preventing network threats. Investigating the potential of current and emerging security technologies, this publication is an all-inclusive reference source for academicians, researchers, students, professionals, practitioners, network analysts and technology specialists interested in the simulation and application of computer network protection. It presents theoretical frameworks and the latest research findings in network security technologies, while analyzing malicious threats which can compromise network integrity. It discusses the security and optimization of computer networks for use in a variety of disciplines and fields. Touching on such matters as mobile and VPN security, IP spoofing and intrusion detection, this edited collection emboldens the efforts of researchers, academics and network administrators working in both the public and private sectors. This edited compilation includes chapters covering topics such as attacks and countermeasures, mobile wireless networking, intrusion detection systems, next-generation firewalls, web security and much more. Information and communication systems are an essential component of our society, forcing us to become dependent on these infrastructures. At the same time, these systems are undergoing a convergence and interconnection process that has its benefits, but also raises specific threats to user interests. Citizens and organizations must feel safe when using cyberspace facilities in order to benefit from its advantages. This book is interdisciplinary in the sense that it covers a wide range of topics like network security threats, attacks, tools and procedures to mitigate the effects of malware and common network attacks, network security architecture and deep learning methods of intrusion detection.