ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

NetSID 2015 - 2nd International Workshop on Network Surveillance and Intruder Detection Technologies

Date2015-09-27 - 2015-09-30

Deadline2015-05-06

VenueBerlin, Germany Germany

Keywords

Websitehttps://staff.iium.edu.my/sakib/netsid2015

Topics/Call fo Papers

Visual surveillance networks are installed in many security sensitive places in today’s world. In most of the cases, human security officers are required to continuously stare at large numbers of monitors simultaneously, and for long periods of time. Constant alert vigilance for hours on end is difficult to maintain for human beings with natural cognitive limits on concentration and attention spans. It is thus important to remove the onus of detecting untoward activity; events which rarely occur, from the human security officer to an automated system. While various automated surveillance techniques are being developed based on installed static camera network, some other technologies like wireless visual or multimedia sensor networks could contribute in the process to make the systems more efficient by employing event-based activation strategies. This workshop opens the door for the researchers to publish their thoughts, models, findings, analyses, and future expectations in the broad field of automated network surveillance and intruder detection.
Topics of Interest
Any topic related to automated network surveillance and intruder detection would be considered. Both technical and survey/review papers on the topics are welcome. The topics include but are not limited to:
- Automated surveillance algorithms
- Cost effective network surveillance using sensors
- Surveillance network models
- Adoption of IP-based cameras in surveillance networks
- Metadata analysis in IoT-based surveillance networks
- Visual sensor based network protocols and operation
- Security, trust, reliability of surveillance networks
- Intrusion detection and target tracking
- Intrusion prevention and detection in computer systems

Last modified: 2015-02-22 15:40:09