2014
DOI: 10.1080/18335330.2014.940819
|View full text |Cite
|
Sign up to set email alerts
|

Video surveillance and counterterrorism: the application of suspicious activity recognition in visual surveillance systems to counterterrorism

Abstract: Video surveillance systems have become a key element in efforts by security services, the military and law enforcement to counterterrorism since the attacks of 11 September 2001. Primarily involving closed circuit television, collected using a variety of hardware platforms and software algorithms, systematic imagery analysis has typically been used as a tool for post-event forensics to identify tactics, techniques and perpetrators of terrorist attacks. Advanced video surveillance applied to detecting suspiciou… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4

Citation Types

0
4
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 9 publications
(4 citation statements)
references
References 42 publications
0
4
0
Order By: Relevance
“…One solution for the first challenge lies in shepherding (Long et al, 2020), a bio-inspired swarm guidance method that mimics how sheepdogs guide a swarm of sheep. The concept of shepherding for swarm guidance has been applied in many applications including agriculture (Strömbom et al, 2014), crowd control (Li et al, 2012; Mould et al, 2014) and uninhabited vehicle (UxV) navigation (Abbass & Hunjet, 2021b), and has proved viable in limited communication settings (Mohamed et al, 2021). The two remaining challenges also exist in shepherding research.…”
Section: Introductionmentioning
confidence: 99%
“…One solution for the first challenge lies in shepherding (Long et al, 2020), a bio-inspired swarm guidance method that mimics how sheepdogs guide a swarm of sheep. The concept of shepherding for swarm guidance has been applied in many applications including agriculture (Strömbom et al, 2014), crowd control (Li et al, 2012; Mould et al, 2014) and uninhabited vehicle (UxV) navigation (Abbass & Hunjet, 2021b), and has proved viable in limited communication settings (Mohamed et al, 2021). The two remaining challenges also exist in shepherding research.…”
Section: Introductionmentioning
confidence: 99%
“…Anomaly detection is an important field in computer vision. The detection of abnormal images plays an increasingly important role due to the growing demand in various applications, such as video surveillance, risk management and damage detection [8,14]. Current state of the art methods in this area are based on deep learning methods such as Deep-anomaly [17] and ADCNN [10].…”
Section: Introductionmentioning
confidence: 99%
“…Similarly, with an increasing need to ensure public safety in crowded areas, the development of real-time video surveillance systems becomes unavoidable. It is critical to seamlessly monitor the crowd to immediately detect anomalous (or abnormal) movements to help prevent theft [4], vandalism [5], and terrorist attacks [6].…”
Section: Introductionmentioning
confidence: 99%