IEEE ICCST2021: 54TH IEEE INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY - ONLINE
TALK KEYWORD INDEX

This page contains an index consisting of author-provided keywords.

A
Age-groups
airport security
Airport security baggage screening
ANPR
Artificial Intelligence
attention
B
Biometric Authentication
Biometric Detection
biometric security
Biometrics
biosensing
blockchains
British Standard
C
Canny Edge detection
car security & safety
classifying
Compromising Emanations
computer vision
Construction
consumer privacy
COVID-19 pandemic
cross border monitoring
cryptographic electronic signature
Cultural heritage security
Cyber Attacks
Cyber Security
Cyber Threats
cybersecurity
D
Darknet
Data Security
Decision-support systems
Decryption
Deep Learning
Deepfakes
defence-in-depth
detection suspicious behavior
Differential equations with delay
digital
distributed
Drones
drones security & safety
dynamic biometric signature
Dynamic model
E
ECG Biometrics
ecosysyems
eIDAS Regulation
electricity
Encryption
energy
ensemble machine learning
F
face mask identification
Face Recognition
facial
Facial Recognition
Fairness and Bias in AI
fake artefacts
Feature Extraction
Fingerprint sensors
fingerprints
Forensic Handwriting Examiners
G
GPS Spoofing
grid
H
hardware security bypass
Hedera
Histogram of Oriented Gradient
home security
Human-automation interaction
I
ICCST
identifying
Identity
Image Processing
image quality
image-processing algorithms
industrial robotic arm
industry
Infrared
Intelligent Autonomy
intelligent processing
intelligent video surveillance
IoT
IoT security
IoT standard
K
Key generation
Key management
kinematic theory
L
Likelihood ratio
lognormality
Luminance
M
machine learning on hardware
markets
mini projects
Modified Cryptography
motorcycle safety & security
Moving Target Defence
Multilayer networks
N
network intrusion detection
Networks
non-intrusive load monitoring
Number plate capture
Number plate luminance
O
Ocular Biometrics
Offline signatures
Open-Source Intelligent Techniques for security
Open-Source Intelligent Techniques for security & safety
Open-Source Intelligent Techniques for security&safety
Opinion mining for security
opinion mining for security & safety
OSINT
P
panel
Perceived risk assessment for security
Perceived risk assessment for security & safety
Perceived risk assessment for security&safety
Performance Assessment
PESTEL Analysis
plan
production
protocols
public health monitoring
public services
R
railway stations security & safety
Reflectivity
Regulations
resilience
risk analysis
Risks of Artificial Intelligence
S
Safety
Safety-critical systems
security
security imaging
security measures
security monitoring
Security Technologies
Sentiment analysis for security
sentiment analysis for security & safety
Services
smart meters
Smart projects
soft target
soft targets
software tool
solar
STEM
Systems security engineering
T
targets
TEMPEST
Theft
threat image projection
Time on task
Token
Tomas Bata
TOPSIS
tractor and trailer units
transport
trust
U
UAVs
UK registration plates
UNCITRAL Model Law
Universal background model
UR3
V
Vienna Convention on Road Traffic
violent attacks
visual search
visualization
Vulnerabilities
Vulnerability Likelihood
W
Wearable Devices
web crawler
X
X-ray image inspection
XAI
Z
Zlin