2016
DOI: 10.14257/ijsia.2016.10.8.21
|View full text |Cite
|
Sign up to set email alerts
|

Flow-based Physical Security

Abstract: Abstract

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2017
2017
2018
2018

Publication Types

Select...
2
1
1

Relationship

1
3

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 13 publications
0
2
0
Order By: Relevance
“…This paper utilizes the notion of security as a machine as proposed in Al-Fedaghi [11]. Such a model views a security environment in terms of flows of things and uses this flow to establish a system-based representation.…”
Section: The Approach Of This Papermentioning
confidence: 99%
See 1 more Smart Citation
“…This paper utilizes the notion of security as a machine as proposed in Al-Fedaghi [11]. Such a model views a security environment in terms of flows of things and uses this flow to establish a system-based representation.…”
Section: The Approach Of This Papermentioning
confidence: 99%
“…The person (body) flows to the walk-through metal detector (7) where there is a possibility that he/she will have to go through the detector more than once (8). After finishing the metal detector process, the person goes to the exit area (9) or he/she may be searched individually in the passenger containment area (10), then go to the exit area (11). On the other hand, the possessions (6) flow to the front table (12) then through the Xray (TRX) machine (13).…”
Section: Example Of a Security Machine: Sscpmentioning
confidence: 99%