Lavoisier S.A.S.
14 rue de Provigny
94236 Cachan cedex
FRANCE

Heures d'ouverture 08h30-12h30/13h30-17h30
Tél.: +33 (0)1 47 40 67 00
Fax: +33 (0)1 47 40 67 02


Url canonique : www.lavoisier.fr/livre/autre/surveillance-in-action/descriptif_3933611
Url courte ou permalien : www.lavoisier.fr/livre/notice.asp?ouvrage=3933611

Surveillance in Action, 1st ed. 2018 Technologies for Civilian, Military and Cyber Surveillance Advanced Sciences and Technologies for Security Applications Series

Langue : Anglais

Coordonnateurs : Karampelas Panagiotis, Bourlai Thirimachos

Couverture de l’ouvrage Surveillance in Action

This book addresses surveillance in action-related applications, and presents novel research on military, civil and cyber surveillance from an international team of experts. The first part of the book, Surveillance of Human Features, reviews surveillance systems that use biometric technologies. It discusses various novel approaches to areas including gait recognition, face-based physiology-assisted recognition, face recognition in the visible and infrared bands, and cross-spectral iris recognition.

The second part of the book, Surveillance for Security and Defense, discusses the ethical issues raised by the use of surveillance systems in the name of combatting terrorism and ensuring security. It presents different generations of satellite surveillance systems and discusses the requirements for real-time satellite surveillance in military contexts. In addition, it explores the new standards of surveillance using unmanned air vehicles and drones, proposes surveillance techniquesfor detecting stealth aircrafts and drones, and highlights key techniques for maritime border surveillance, bio-warfare and bio-terrorism detection.

The last part of the book, Cyber Surveillance, provides a review of data hiding techniques that are used to hinder electronic surveillance. It subsequently presents methods for collecting and analyzing information from social media sites and discusses techniques for detecting internal and external threats posed by various individuals (such as spammers, cyber-criminals, suspicious users or extremists in general). The book concludes by examining how high-performance computing environments can be exploited by malicious users, and what surveillance methods need to be put in place to protect these valuable infrastructures. 

The book is primarily intended for military and law enforcement personnel who use surveillance-related technologies, as well as researchers, Master?s and Ph.D. students who are interested in learning about the latest advances in military, civilian and cyber surveillance.

Part I – Surveillance of Human Features.- A Survey of Using Biometrics for Smart Visual Surveillance: Gait Recognition.- Comparative Face Soft Biometrics for Human Identification.- Video-Based Human Respiratory Wavelet Extraction and Identity Recognition.- A Study on Human Recognition using Auricle and Side View Face Images.- Cross-spectral Iris Matching for Surveillance Applications.- Facial Surveillance and Recognition in the Passive Infrared Bands.- Deep Feature Learning for Classification when using Single Sensor Multi-Wavelength based Facial Recognition Systems in SWIR Band.- Part II – Surveillance for Security and Defense.- Managing Uncertainty from the Sky: Surveillance through three Generations of Commercial Earth Observation Satellites.- Drones Surveillance - Challenges and Techniques.- Early Warning Against Stealth Aircraft, Missiles and Unmanned Aerial Vehicles. Mobile Data Fusion for Maritime Surveillance.- Mobile stand-off and stand-in surveillance against biowarfare and bioterrorism agents.- Social Networks for Surveillance and Security: ‘Using Online Techniques to make something happen in the real or cyber world’.- Surveillance, targeted killing and the fight against Terrorism: a fair-played game.- Part III – Cyber Surveillance Data Hiding in the Wild: Where Computational Intelligence Meets Digital Forensics.- Methods to Detect Cyber threats on Twitter.- Detecting Users Who Share Extremist Content on Twitter.- An Organizational Visualization Profiler Tool Based on Social Interactions.- Cyber-Surveillance Analysis for Supercomputing Environments.

Panagiotis Karampelas holds a Ph.D. in Electronic Engineering from the University of Kent at Canterbury, UK and a Master of Science degree from the Department of Informatics, Kapodistrian University of Athens with specialization in “High Performance Algorithms”. He also holds a Bachelor degree in Mathematics from the same University majoring in Applied Mathematics. He has worked for 3 years as an associate researcher in the Foundation for Research and Technology-Hellas (FORTH), Institute of Computer Science. During this collaboration, he had the opportunity to work in numerous European funded research projects in the area of Information Society Technologies Programme practicing his expertise in User Interface Design, Usability Evaluation and Programming. He has also worked for several years as a user interface designer and usability expert in several IT companies designing and implementing large-scale research and commercial information systems. Among others he collaborated with Hellenic Army, General Staff, Signal Directorate as Studies and Research Officer, IntelliSolutions, Greece as Senior Developer implementing large-scale information systems in Vodafone Greece, General Bank of Greece, Microsoft, etc. Then he joined Hellenic American University as Assistant Professor teaching human computer interaction, programming, managing information systems and database management in the Graduate and Undergraduate programs. In parallel, he was visiting the School of Pedagogical and Technological Education, Greece as Assistant Professor teaching courses at the Department of Electrical and Electronic Engineering Educators. Currently, he is with the Department of Informatics and Computers, at the Hellenic Air Force Academy teaching courses to pilots and engineers.

His areas of interest include Human Computer Interaction, Information Visualization, Data Mining, Social Network Analysis, Counterterrorism Informatics, Power Management System, Artificial Neural Networks,P

Combines both civilian and military environments providing a holistic view of surveillance today Discusses ethical and privacy considerations in the light of the global environment from both perspectives: the citizen and the government Presents cutting-edge technologies in the service of surveillance Includes supplementary material: sn.pub/extras

Date de parution :

Ouvrage de 412 p.

15.5x23.5 cm

Disponible chez l'éditeur (délai d'approvisionnement : 15 jours).

168,79 €

Ajouter au panier

Date de parution :

Ouvrage de 412 p.

15.5x23.5 cm

Disponible chez l'éditeur (délai d'approvisionnement : 15 jours).

168,79 €

Ajouter au panier