2009 Third ACM/IEEE International Conference on Distributed Smart Cameras (ICDSC) 2009
DOI: 10.1109/icdsc.2009.5289385
|View full text |Cite
|
Sign up to set email alerts
|

Dependable integrated surveillance systems for the physical security of metro railways

Abstract: Rail-based mass transit systems are vulnerable to many criminal acts, ranging from vandalism to terrorism. In this paper, we present the architecture, the main functionalities and the dependability related issues of a security system specifically tailored to metro railways. Heterogeneous intrusion detection, access control, intelligent video-surveillance and sound detection devices are integrated in a cohesive Security Management System (SMS). In case of emergencies, the procedural actions required to the oper… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
24
0

Year Published

2012
2012
2021
2021

Publication Types

Select...
5
3

Relationship

1
7

Authors

Journals

citations
Cited by 37 publications
(24 citation statements)
references
References 7 publications
0
24
0
Order By: Relevance
“…This equipment is normally used by maintainers and other authorised 20 personnel, but can be potentially targeted by unauthorised personnel through the same physical access points. Since trackside shelters and technical rooms are nowadays equipped with physical security and environmental monitoring devices, security threat analysis can be advantageously fed with both physical and logical elements [2]. 25 Nowadays, holistic modelling of complex systems is still a challenging research issue, being largely accepted that the more promising and scalable ap-proaches focus on modularity and composability (both in modelling and solving).…”
Section: Introductionmentioning
confidence: 99%
“…This equipment is normally used by maintainers and other authorised 20 personnel, but can be potentially targeted by unauthorised personnel through the same physical access points. Since trackside shelters and technical rooms are nowadays equipped with physical security and environmental monitoring devices, security threat analysis can be advantageously fed with both physical and logical elements [2]. 25 Nowadays, holistic modelling of complex systems is still a challenging research issue, being largely accepted that the more promising and scalable ap-proaches focus on modularity and composability (both in modelling and solving).…”
Section: Introductionmentioning
confidence: 99%
“…Companies like EZWatch and VIGILANCE&SECURITY have developed wireless hidden cameras, night vision cameras, and high-resolution cameras for different scenes. Based on the surveillance platform, many researches [1][2][3] have been done on the smart monitoring through analyzing the captured video stream. However, these algorithms are often complex and easily affected by the lighting condition and obstacle.…”
Section: Video Surveillancementioning
confidence: 99%
“…There are many applications that significantly benefit from the present of video information, including environmental monitoring, health-care monitoring, personal security, law enforcement, and emergency response [1][2][3]. However, there exist many drawbacks only employing the video signal in the traditional surveillance system.…”
Section: Introductionmentioning
confidence: 99%
“…Joyce et al [1] proposed a face detection system able to identify suspicious people by matching the face, and other personal details such as name, medical history, tax records, criminal arrest records, voting records, etc., with a criminal database. Bocchetti et al [2] proposed an algorithm that detects suspicious activities from video streams. Goya et al [3] introduced a Public Safety System (PSS) for identifying criminal actions such as purse snatching, child kidnapping, and fighting.…”
Section: Introductionmentioning
confidence: 99%
“…A number of video surveillance systems have been developed in the past in an attempt to detect and report criminal activities [1], [2], [3]. Joyce et al [1] proposed a face detection system able to identify suspicious people by matching the face, and other personal details such as name, medical history, tax records, criminal arrest records, voting records, etc., with a criminal database.…”
Section: Introductionmentioning
confidence: 99%