-
1
-
-
33847364481
-
Transportation security technologies research and development
-
S.F. Hallowell and P.Z. Jankowski, "Transportation security technologies research and development," in IEEE Military Communications Conference (MILCOM), 2005., 2005, pp. 1753-1756 Vol. 3.
-
(2005)
IEEE Military Communications Conference (MILCOM), 2005
, vol.3
, pp. 1753-1756
-
-
Hallowell, S.F.1
Jankowski, P.Z.2
-
4
-
-
62349141490
-
Deployed ARMOR protection: The application of a game theoretic model for security at theLos Angeles International Airport
-
J. Pita et al., "Deployed ARMOR protection: the application of a game theoretic model for security at theLos Angeles International Airport," in 7th international joint conference on Autonomous agents and multiagent systems, 2008, pp. 125-132.
-
7th International Joint Conference on Autonomous Agents and Multiagent Systems, 2008
, pp. 125-132
-
-
Pita, J.1
-
5
-
-
79955766311
-
LocON: A location based services platform to improve airport safety
-
G. Pestana, "LocON: A location based services platform to improve airport safety," in IEEE Aerospace Conference, 2011, pp. 1-10.
-
IEEE Aerospace Conference, 2011
, pp. 1-10
-
-
Pestana, G.1
-
6
-
-
31844436947
-
Open standards for homeland security sensor networks
-
K.B. Lee and M.E. Reichardt, "Open standards for homeland security sensor networks," in IEEE Instrumentation & Measurement Magazine, 2005, pp. 14-21, Volume: 8, Issue: 5.
-
(2005)
IEEE Instrumentation & Measurement Magazine
, vol.8
, Issue.5
, pp. 14-21
-
-
Lee, K.B.1
Reichardt, M.E.2
-
7
-
-
69649085692
-
Novel Framework of Integrated Security and Safety System Using Hybrid Network Technology
-
E. Saputra, K.A. Bakar, H. Herman, and S. Hassan, "Novel Framework of Integrated Security and Safety System Using Hybrid Network Technology," in 11th International Conference on Computer Modelling and Simulation, 2009, pp. 368-373.
-
11th International Conference on Computer Modelling and Simulation, 2009
, pp. 368-373
-
-
Saputra, E.1
Bakar, K.A.2
Herman, H.3
Hassan, S.4
-
8
-
-
85008031305
-
Security technology
-
October
-
"Security technology," IEEE Aerospace and Electronic Systems Magazine, vol. 15, no. 10, pp. 131-136, October 2000.
-
(2000)
IEEE Aerospace and Electronic Systems Magazine
, vol.15
, Issue.10
, pp. 131-136
-
-
-
13
-
-
78651509415
-
Intelligent acoustic and vibration recognition/alert systems for security breaching detection, close proximity danger identification, and perimeter protection
-
A.A. Dibazar et al., "Intelligent acoustic and vibration recognition/alert systems for security breaching detection, close proximity danger identification, and perimeter protection," in IEEE International Conference on Technologies for Homeland Security (HST), 2010, pp. 351-356.
-
IEEE International Conference on Technologies for Homeland Security (HST), 2010
, pp. 351-356
-
-
Dibazar, A.A.1
-
14
-
-
84874559348
-
Optical Fiber Vibration Sensor for Intrusion Detection
-
T. Kumagai, A. Ogura, K. Tan, W. Ohnuki, and T. Sato, "Optical Fiber Vibration Sensor for Intrusion Detection,"Hitachi Cable Review, 2008.
-
(2008)
Hitachi Cable Review
-
-
Kumagai, T.1
Ogura, A.2
Tan, K.3
Ohnuki, W.4
Sato, T.5
-
16
-
-
34548810363
-
Integrated Perimeter Security System
-
S. Hennin, G. Germana, and L. Garcia, "Integrated Perimeter Security System," in IEEE Conference on Technologies for Homeland Security, 2007, pp. 70-75.
-
IEEE Conference on Technologies for Homeland Security, 2007
, pp. 70-75
-
-
Hennin, S.1
Germana, G.2
Garcia, L.3
-
17
-
-
79952085689
-
Solving Coverage Problem in Wireless Camera-Based Sensor Networks by Using Genetic Algorithm
-
A.H. Navin, B. Asadi, S.H. Pour, and M. Mirnia, "Solving Coverage Problem in Wireless Camera-Based Sensor Networks by Using Genetic Algorithm," in 2010 International Conference on Computational Intelligence and Communication Networks (CICN), 2010, pp. 226-229.
-
2010 International Conference on Computational Intelligence and Communication Networks (CICN), 2010
, pp. 226-229
-
-
Navin, A.H.1
Asadi, B.2
Pour, S.H.3
Mirnia, M.4
-
18
-
-
43949124826
-
A Perimeter Intrusion Detection System Using Dual-Mode Wireless Sensor Networks
-
Y. Liu, Chao Li, Yang He, Jing Wu, and Zhang Xiong, "A Perimeter Intrusion Detection System Using Dual-Mode Wireless Sensor Networks," in CHINACOM '07. Second International Conference on Communications and Networking in China, 2007, pp. 861-865.
-
CHINACOM '07. Second International Conference on Communications and Networking in China, 2007
, pp. 861-865
-
-
Liu, Y.1
Li, C.2
He, Y.3
Wu, J.4
Xiong, Z.5
-
19
-
-
0033362277
-
User performance testing of the Perimitrax buried cable sensor
-
M. Maki, C. Hill, and C.R. Malone, "User performance testing of the Perimitrax buried cable sensor," in IEEE 33rd Annual 1999 International Carnahan Conference on Security Technology, 1999, pp. 112-119.
-
IEEE 33rd Annual 1999 International Carnahan Conference on Security Technology, 1999
, pp. 112-119
-
-
Maki, M.1
Hill, C.2
Malone, C.R.3
-
22
-
-
0035727032
-
Low Power TDMA in Large Wireless Sensor Networks
-
G. Pei and C. Chien, "Low Power TDMA in Large Wireless Sensor Networks," in Military Communications Conference, 2001. MILCOM 2001. Communications for Network-Centric Operations: Creating the Information Force. IEEE, 2001, pp. 347-351 vol.1.
-
(2001)
Military Communications Conference, 2001. MILCOM 2001. Communications for Network-Centric Operations: Creating the Information Force. IEEE
, vol.1
, pp. 347-351
-
-
Pei, G.1
Chien, C.2
-
23
-
-
4644262374
-
Quantifying short-range surface-to-surface communications links
-
June
-
W.M. Merrill, H.L.N. Liu, J. Leong, K. Sohrabi, and G.J. Pottie, "Quantifying short-range surface-to-surface communications links," IEEE Antennas and Propagation Magazine, vol. 46, no. 3, pp. 36-46, June 2004.
-
(2004)
IEEE Antennas and Propagation Magazine
, vol.46
, Issue.3
, pp. 36-46
-
-
Merrill, W.M.1
Liu, H.L.N.2
Leong, J.3
Sohrabi, K.4
Pottie, G.J.5
-
26
-
-
84874556490
-
-
Infinite Power Solutions
-
Infinite Power Solutions. (2011) Thinergy MEC 201 Datasheet.
-
(2011)
Thinergy MEC 201 Datasheet
-
-
|