Computer surveillance

Results: 1478



#Item
51CRACKING FUZZY VAULTS AND BIOMETRIC ENCRYPTION Walter J. Scheirer and Terrance E. Boult∗ Securics Inc. and University of Colorado at Colorado Springs Colorado Springs, CO.  or

CRACKING FUZZY VAULTS AND BIOMETRIC ENCRYPTION Walter J. Scheirer and Terrance E. Boult∗ Securics Inc. and University of Colorado at Colorado Springs Colorado Springs, CO. or

Add to Reading List

Source URL: vast.uccs.edu

Language: English - Date: 2007-10-07 17:21:58
52Identity and Access Management (IdAM) Security Framework for DCGS-Army The Distributed Common Ground System-Army (DCGS-Army) is a data system that supports field intelligence, surveillance information, and situational aw

Identity and Access Management (IdAM) Security Framework for DCGS-Army The Distributed Common Ground System-Army (DCGS-Army) is a data system that supports field intelligence, surveillance information, and situational aw

Add to Reading List

Source URL: www.jerichosystems.com

Language: English - Date: 2016-02-10 13:54:31
53Operational Framework NCSC-NL v0 2

Operational Framework NCSC-NL v0 2

Add to Reading List

Source URL: www.ncsc.nl

Language: English - Date: 2013-12-16 07:53:06
54Large Scale Unconstrained Open Set Face Database Archana Sapkota 1 University of Colorado at Colorado Springs 1

Large Scale Unconstrained Open Set Face Database Archana Sapkota 1 University of Colorado at Colorado Springs 1

Add to Reading List

Source URL: vast.uccs.edu

Language: English - Date: 2013-12-13 11:49:49
55SECURITY PROFESSIONAL SERVICES  Security Professional Services Augmenting Security Staff, Addressing Skill Shortages and Optimizing Your Security Operations With Splunk

SECURITY PROFESSIONAL SERVICES Security Professional Services Augmenting Security Staff, Addressing Skill Shortages and Optimizing Your Security Operations With Splunk

Add to Reading List

Source URL: www.splunk.com

Language: English - Date: 2016-08-17 08:31:42
56China’s Burgeoning Internet  What Internet Businesses Can Do To Protect Human Rights

China’s Burgeoning Internet What Internet Businesses Can Do To Protect Human Rights

Add to Reading List

Source URL: www.peaceinstitute.hawaii.edu

Language: English - Date: 2014-01-08 16:38:00
57National Commission on Terrorists’ Use of Technology Is Needed By Matt A. Mayer January 2016

National Commission on Terrorists’ Use of Technology Is Needed By Matt A. Mayer January 2016

Add to Reading List

Source URL: homeland.house.gov

Language: English - Date: 2016-03-16 18:14:21
58The Citizen Lab  Research Brief FebruaryMapping Hacking Team’s “Untraceable” Spyware

The Citizen Lab Research Brief FebruaryMapping Hacking Team’s “Untraceable” Spyware

Add to Reading List

Source URL: citizenlab.org

Language: English - Date: 2015-03-18 14:57:35
59RFID_VIDEO_S Integrated system for video surveillance, access control and prompt location of events

RFID_VIDEO_S Integrated system for video surveillance, access control and prompt location of events

Add to Reading List

Source URL: www.kyema.ch

Language: English - Date: 2009-12-03 10:43:57
60Two New Surveillance Systems Ming-Deng Huang (黃明燈), Ling-Hwei Chen (陳玲慧) E-mail:  and  Department of Computer and Information Science National Chiao Tung Univer

Two New Surveillance Systems Ming-Deng Huang (黃明燈), Ling-Hwei Chen (陳玲慧) E-mail: and Department of Computer and Information Science National Chiao Tung Univer

Add to Reading List

Source URL: debut.cis.nctu.edu.tw

Language: English - Date: 2013-07-12 03:09:44