TALK KEYWORD INDEX
This page contains an index consisting of author-provided keywords.
A | |
Age-groups | |
airport security | |
Airport security baggage screening | |
ANPR | |
Artificial Intelligence | |
attention | |
B | |
Biometric Authentication | |
Biometric Detection | |
biometric security | |
Biometrics | |
biosensing | |
blockchains | |
British Standard | |
C | |
Canny Edge detection | |
car security & safety | |
classifying | |
Compromising Emanations | |
computer vision | |
Construction | |
consumer privacy | |
COVID-19 pandemic | |
cross border monitoring | |
cryptographic electronic signature | |
Cultural heritage security | |
Cyber Attacks | |
Cyber Security | |
Cyber Threats | |
cybersecurity | |
D | |
Darknet | |
Data Security | |
Decision-support systems | |
Decryption | |
Deep Learning | |
Deepfakes | |
defence-in-depth | |
detection suspicious behavior | |
Differential equations with delay | |
digital | |
distributed | |
Drones | |
drones security & safety | |
dynamic biometric signature | |
Dynamic model | |
E | |
ECG Biometrics | |
ecosysyems | |
eIDAS Regulation | |
electricity | |
Encryption | |
energy | |
ensemble machine learning | |
F | |
face mask identification | |
Face Recognition | |
facial | |
Facial Recognition | |
Fairness and Bias in AI | |
fake artefacts | |
Feature Extraction | |
Fingerprint sensors | |
fingerprints | |
Forensic Handwriting Examiners | |
G | |
GPS Spoofing | |
grid | |
H | |
hardware security bypass | |
Hedera | |
Histogram of Oriented Gradient | |
home security | |
Human-automation interaction | |
I | |
ICCST | |
identifying | |
Identity | |
Image Processing | |
image quality | |
image-processing algorithms | |
industrial robotic arm | |
industry | |
Infrared | |
Intelligent Autonomy | |
intelligent processing | |
intelligent video surveillance | |
IoT | |
IoT security | |
IoT standard | |
K | |
Key generation | |
Key management | |
kinematic theory | |
L | |
Likelihood ratio | |
lognormality | |
Luminance | |
M | |
machine learning on hardware | |
markets | |
mini projects | |
Modified Cryptography | |
motorcycle safety & security | |
Moving Target Defence | |
Multilayer networks | |
N | |
network intrusion detection | |
Networks | |
non-intrusive load monitoring | |
Number plate capture | |
Number plate luminance | |
O | |
Ocular Biometrics | |
Offline signatures | |
Open-Source Intelligent Techniques for security | |
Open-Source Intelligent Techniques for security & safety | |
Open-Source Intelligent Techniques for security&safety | |
Opinion mining for security | |
opinion mining for security & safety | |
OSINT | |
P | |
panel | |
Perceived risk assessment for security | |
Perceived risk assessment for security & safety | |
Perceived risk assessment for security&safety | |
Performance Assessment | |
PESTEL Analysis | |
plan | |
production | |
protocols | |
public health monitoring | |
public services | |
R | |
railway stations security & safety | |
Reflectivity | |
Regulations | |
resilience | |
risk analysis | |
Risks of Artificial Intelligence | |
S | |
Safety | |
Safety-critical systems | |
security | |
security imaging | |
security measures | |
security monitoring | |
Security Technologies | |
Sentiment analysis for security | |
sentiment analysis for security & safety | |
Services | |
smart meters | |
Smart projects | |
soft target | |
soft targets | |
software tool | |
solar | |
STEM | |
Systems security engineering | |
T | |
targets | |
TEMPEST | |
Theft | |
threat image projection | |
Time on task | |
Token | |
Tomas Bata | |
TOPSIS | |
tractor and trailer units | |
transport | |
trust | |
U | |
UAVs | |
UK registration plates | |
UNCITRAL Model Law | |
Universal background model | |
UR3 | |
V | |
Vienna Convention on Road Traffic | |
violent attacks | |
visual search | |
visualization | |
Vulnerabilities | |
Vulnerability Likelihood | |
W | |
Wearable Devices | |
web crawler | |
X | |
X-ray image inspection | |
XAI | |
Z | |
Zlin |