TALK KEYWORD INDEX
This page contains an index consisting of author-provided keywords.
| A | |
| Age-groups | |
| airport security | |
| Airport security baggage screening | |
| ANPR | |
| Artificial Intelligence | |
| attention | |
| B | |
| Biometric Authentication | |
| Biometric Detection | |
| biometric security | |
| Biometrics | |
| biosensing | |
| blockchains | |
| British Standard | |
| C | |
| Canny Edge detection | |
| car security & safety | |
| classifying | |
| Compromising Emanations | |
| computer vision | |
| Construction | |
| consumer privacy | |
| COVID-19 pandemic | |
| cross border monitoring | |
| cryptographic electronic signature | |
| Cultural heritage security | |
| Cyber Attacks | |
| Cyber Security | |
| Cyber Threats | |
| cybersecurity | |
| D | |
| Darknet | |
| Data Security | |
| Decision-support systems | |
| Decryption | |
| Deep Learning | |
| Deepfakes | |
| defence-in-depth | |
| detection suspicious behavior | |
| Differential equations with delay | |
| digital | |
| distributed | |
| Drones | |
| drones security & safety | |
| dynamic biometric signature | |
| Dynamic model | |
| E | |
| ECG Biometrics | |
| ecosysyems | |
| eIDAS Regulation | |
| electricity | |
| Encryption | |
| energy | |
| ensemble machine learning | |
| F | |
| face mask identification | |
| Face Recognition | |
| facial | |
| Facial Recognition | |
| Fairness and Bias in AI | |
| fake artefacts | |
| Feature Extraction | |
| Fingerprint sensors | |
| fingerprints | |
| Forensic Handwriting Examiners | |
| G | |
| GPS Spoofing | |
| grid | |
| H | |
| hardware security bypass | |
| Hedera | |
| Histogram of Oriented Gradient | |
| home security | |
| Human-automation interaction | |
| I | |
| ICCST | |
| identifying | |
| Identity | |
| Image Processing | |
| image quality | |
| image-processing algorithms | |
| industrial robotic arm | |
| industry | |
| Infrared | |
| Intelligent Autonomy | |
| intelligent processing | |
| intelligent video surveillance | |
| IoT | |
| IoT security | |
| IoT standard | |
| K | |
| Key generation | |
| Key management | |
| kinematic theory | |
| L | |
| Likelihood ratio | |
| lognormality | |
| Luminance | |
| M | |
| machine learning on hardware | |
| markets | |
| mini projects | |
| Modified Cryptography | |
| motorcycle safety & security | |
| Moving Target Defence | |
| Multilayer networks | |
| N | |
| network intrusion detection | |
| Networks | |
| non-intrusive load monitoring | |
| Number plate capture | |
| Number plate luminance | |
| O | |
| Ocular Biometrics | |
| Offline signatures | |
| Open-Source Intelligent Techniques for security | |
| Open-Source Intelligent Techniques for security & safety | |
| Open-Source Intelligent Techniques for security&safety | |
| Opinion mining for security | |
| opinion mining for security & safety | |
| OSINT | |
| P | |
| panel | |
| Perceived risk assessment for security | |
| Perceived risk assessment for security & safety | |
| Perceived risk assessment for security&safety | |
| Performance Assessment | |
| PESTEL Analysis | |
| plan | |
| production | |
| protocols | |
| public health monitoring | |
| public services | |
| R | |
| railway stations security & safety | |
| Reflectivity | |
| Regulations | |
| resilience | |
| risk analysis | |
| Risks of Artificial Intelligence | |
| S | |
| Safety | |
| Safety-critical systems | |
| security | |
| security imaging | |
| security measures | |
| security monitoring | |
| Security Technologies | |
| Sentiment analysis for security | |
| sentiment analysis for security & safety | |
| Services | |
| smart meters | |
| Smart projects | |
| soft target | |
| soft targets | |
| software tool | |
| solar | |
| STEM | |
| Systems security engineering | |
| T | |
| targets | |
| TEMPEST | |
| Theft | |
| threat image projection | |
| Time on task | |
| Token | |
| Tomas Bata | |
| TOPSIS | |
| tractor and trailer units | |
| transport | |
| trust | |
| U | |
| UAVs | |
| UK registration plates | |
| UNCITRAL Model Law | |
| Universal background model | |
| UR3 | |
| V | |
| Vienna Convention on Road Traffic | |
| violent attacks | |
| visual search | |
| visualization | |
| Vulnerabilities | |
| Vulnerability Likelihood | |
| W | |
| Wearable Devices | |
| web crawler | |
| X | |
| X-ray image inspection | |
| XAI | |
| Z | |
| Zlin | |