Use of IR images is advantageous for many surveillance applications where the systems must operate around the clock and external illumination is not always available. We investiga...
We apply advanced agent trust modeling techniques to identify malicious traffic in computer networks. Our work integrates four state-of-the-art techniques from anomaly detection,...
This work presents a real time system for detection and tracking of facial features in video sequences. Such system may be used in visual communication applications, such as teleco...
Automatic acoustic-based vehicle detection is a common task in security and surveillance systems. Usually, a recording device is placed in a designated area and a hardware/softwar...
Alon Schclar, Amir Averbuch, N. Rabin, Valery A. Z...
The usability of mobile robots for surveillance, search and rescue missions can be significantly improved by intelligent functionalities decreasing the cognitive load on the opera...