2007 IEEE Conference on Advanced Video and Signal Based Surveillance 2007
DOI: 10.1109/avss.2007.4425328
|View full text |Cite
|
Sign up to set email alerts
|

Using behavior analysis algorithms to anticipate security threats before they impact mission critical operations

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...

Citation Types

0
1
0

Year Published

2009
2009
2017
2017

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 5 publications
0
1
0
Order By: Relevance
“…The military has long been using modeling techniques for both training and predictive purposes (Banks et al, 2007), but lately even university police are using video-based predictive systems. Johns Hopkins University, for example, uses a commercially available surveillance tool called "Perceptrak" to analyze video data in real time to detect suspicious activity on its campus, such as loitering, unattended packages, and converging groups of people (Farahany, 2008).…”
mentioning
confidence: 99%
“…The military has long been using modeling techniques for both training and predictive purposes (Banks et al, 2007), but lately even university police are using video-based predictive systems. Johns Hopkins University, for example, uses a commercially available surveillance tool called "Perceptrak" to analyze video data in real time to detect suspicious activity on its campus, such as loitering, unattended packages, and converging groups of people (Farahany, 2008).…”
mentioning
confidence: 99%