Application of cortical learning algorithms to movement classification towards automated video forensics
暂无分享,去创建一个
[1] Michael Galetzka,et al. Intelligent Predictions : an empirical study of the Cortical Learning Algorithm , 2014 .
[2] Richard Hill,et al. Cloud-based scalable object detection and classification in video streams , 2018, Future Gener. Comput. Syst..
[3] Mark Pollitt,et al. An Ad Hoc Review of Digital Forensic Models , 2007, Second International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE'07).
[4] Raymond Kurzweil,et al. Age of intelligent machines , 1990 .
[5] Ernest Fokoué,et al. A Mathematical Formalization of Hierarchical Temporal Memory’s Spatial Pooler , 2017, Front. Robot. AI.
[6] Larry S. Davis,et al. AVSS 2011 demo session: A large-scale benchmark dataset for event recognition in surveillance video , 2011, AVSS.
[7] Kolawole Akintola. Real-time Object Detection and Tracking for Video Surveillance , 2015 .
[8] Subutai Ahmad,et al. Properties of Sparse Distributed Representations and their Application to Hierarchical Temporal Memory , 2015, ArXiv.
[9] Rik Van de Walle,et al. Performance analysis of machine learning for arbitrary downsizing of pre-encoded HEVC video , 2015, IEEE Transactions on Consumer Electronics.
[10] Chang-Tsun Li. Emerging Digital Forensics Applications for Crime Detection, Prevention, and Security , 2013 .
[11] Dileep George,et al. How the brain might work: a hierarchical and temporal model for learning and recognition , 2008 .
[12] Jérôme Euzenat,et al. Semantic Precision and Recall for Ontology Alignment Evaluation , 2007, IJCAI.
[13] Hui Wang,et al. Separability-Oriented Subclass Discriminant Analysis , 2018, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[14] Bradley L. Schatz,et al. An open architecture for digital evidence integration , 2006 .
[15] Graham Cormode,et al. People like us: mining scholarly data for comparable researchers , 2014, WWW.
[16] Richard Ernest Bellman,et al. An Introduction to Artificial Intelligence: Can Computers Think? , 1978 .
[17] Mauro Barni,et al. Detection of malevolent changes in digital video for forensic applications , 2007, Electronic Imaging.
[18] Mohammad Atwah Al-ma'aitah,et al. Artificial Intelligence in Law Enforcement, A Review , 2014 .
[19] Thomas Serre,et al. HMDB: A large video database for human motion recognition , 2011, 2011 International Conference on Computer Vision.
[20] Philip E. T. Lewis,et al. Research Methods for Business Students (5th edn) , 2007 .
[21] Xinwen Fu,et al. Network Security Fundamentals , 2008, Wiley Encyclopedia of Computer Science and Engineering.
[22] Bo Chen,et al. Out-of-Focus Projector Calibration Method with Distortion Correction on the Projection Plane in the Structured Light Three-Dimensional Measurement System , 2017, Sensors.
[23] M. Frank,et al. The Effect of Rapport in Forensic Interviewing , 2002 .
[24] Christopher Hargreaves,et al. An automated timeline reconstruction approach for digital forensic investigations , 2012 .
[25] Shirley M. Radack,et al. Forensic Techniques: Helping Organizations Improve Their Responses to Information Security Incidents | NIST , 2006 .
[26] Juliet Erima,et al. Preservation of digital research content in academic institutions: A case study of Moi University, Kenya , 2016, 2016 IST-Africa Week Conference.
[27] Jian Tang,et al. Enhancing Effectiveness of Outlier Detections for Low Density Patterns , 2002, PAKDD.
[28] M. Munot,et al. Research Methodology , 2019, Storytelling with Data in Healthcare.
[29] B. G. Celler,et al. Classification of basic daily movements using a triaxial accelerometer , 2004, Medical and Biological Engineering and Computing.
[30] Kaushik Deb,et al. Baggage Recognition in Occluded Environment using Boosting Technique , 2017, KSII Trans. Internet Inf. Syst..
[31] Seamus O. Ciardhuáin,et al. An Extended Model of Cybercrime Investigations , 2004, Int. J. Digit. EVid..
[32] Petronilla Muthoni Muriithi,et al. Academic research collaborations in Kenya : structure, processes and information technologies , 2015 .
[33] i-LIDS Team,et al. Imagery Library for Intelligent Detection Systems (i-LIDS); A Standard for Testing Video Based Detection Systems , 2006, Proceedings 40th Annual 2006 International Carnahan Conference on Security Technology.
[34] A. Alshaikh,et al. Post Incident Analysis Framework for Automated Video Forensic Investigation , 2015 .
[35] Mansour Moniri,et al. Classification of smart video surveillance systems for commercial applications , 2005, IEEE Conference on Advanced Video and Signal Based Surveillance, 2005..
[36] Ye Zhang,et al. Irregular behavior recognition based on treading track , 2007, 2007 International Conference on Wavelet Analysis and Pattern Recognition.
[37] Manoranjan Paul,et al. Human detection in surveillance videos and its applications - a review , 2013, EURASIP J. Adv. Signal Process..
[38] Chung-Lin Huang,et al. Abnormal Event Detection in Video Using N-cut Clustering , 2006, 2006 International Conference on Intelligent Information Hiding and Multimedia.
[39] Paolo Gubian,et al. Embedded Forensics , 2010, Handbook of Research on Computational Forensics, Digital Crime, and Investigation.
[40] Warren G. Kruse,et al. Computer Forensics: Incident Response Essentials , 2001 .
[41] Brian D. Carrier. Defining Digital Forensic Examination and Analysis Tool Using Abstraction Layers , 2003, Int. J. Digit. EVid..
[42] Sergio A. Velastin,et al. A Review of Computer Vision Techniques for the Analysis of Urban Traffic , 2011, IEEE Transactions on Intelligent Transportation Systems.
[43] John Davies,et al. Information Retrieval: Searching in the 21st Century , 2009, Information Retrieval.
[44] Tieniu Tan,et al. A survey on visual surveillance of object motion and behaviors , 2004, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).
[45] Antonio Fernández-Caballero,et al. A survey of video datasets for human action and activity recognition , 2013, Comput. Vis. Image Underst..
[46] Weihong Wang,et al. Exposing digital forgeries in video by detecting double MPEG compression , 2006, MM&Sec '06.
[47] Sanjiv Augustine,et al. Agile project management: steering from the edges , 2005, CACM.
[48] Yuichiro Hayashi,et al. Automated torso organ segmentation from 3D CT images using structured perceptron and dual decomposition , 2015, Medical Imaging.
[49] Subutai Ahmad,et al. How do neurons operate on sparse distributed representations? A mathematical theory of sparsity, neurons and active dendrites , 2016, ArXiv.
[50] Bhavani M. Thuraisingham,et al. A framework for a video analysis tool for suspicious event detection , 2005, MDM '05.
[51] James W. Davis,et al. The Recognition of Human Movement Using Temporal Templates , 2001, IEEE Trans. Pattern Anal. Mach. Intell..
[52] Lihui Wang,et al. A security framework for collaborative distributed system control at the device-level , 2003, IEEE International Conference on Industrial Informatics, 2003. INDIN 2003. Proceedings..
[53] Venansius Baryamureeba,et al. The Enhanced Digital Investigation Process Model , 2004 .
[54] T. May. Social Research: Issues, Methods and Process , 2001 .
[55] Christopher D. Manning,et al. Introduction to Information Retrieval , 2010, J. Assoc. Inf. Sci. Technol..
[56] Peter Stephenson. Modeling of Post-Incident Root Cause Analysis , 2003, Int. J. Digit. EVid..
[57] M. B. Mukasey,et al. Electronic Crime Scene Investigation: A Guide for First Responders, Second Edition , 2008 .
[58] Marie Katsurai,et al. Bursty research topic detection from scholarly data using dynamic Co-word networks: A preliminary investigation , 2017, 2017 IEEE 2nd International Conference on Big Data Analysis (ICBDA)(.
[59] James F. O'Brien,et al. Exposing Digital Forgeries in Ballistic Motion , 2012, IEEE Transactions on Information Forensics and Security.
[60] Ron White,et al. how computers work , 1964 .
[61] Jie Liu,et al. Exposing Digital Video Forgery by Detecting Motion-Compensated Edge Artifact , 2009, 2009 International Conference on Computational Intelligence and Software Engineering.
[62] M Namratha,et al. A Comprehensive Overview of Clustering Algorithms in Pattern Recognition , 2012 .
[63] Jean-Marc Odobez,et al. Topic models for scene analysis and abnormality detection , 2009, 2009 IEEE 12th International Conference on Computer Vision Workshops, ICCV Workshops.
[64] Andrew Zisserman,et al. Scene Classification Using a Hybrid Generative/Discriminative Approach , 2008, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[65] Yizhen Wang,et al. Resource quality prediction based on machine learning algorithms , 2017, 2017 4th International Conference on Systems and Informatics (ICSAI).
[66] Alex Pentland,et al. Pfinder: real-time tracking of the human body , 1996, Other Conferences.
[67] Kyuchang Kang,et al. ActionNet-VE Dataset: A Dataset for Describing Visual Events by Extending VIRAT Ground 2.0 , 2015, 2015 8th International Conference on Signal Processing, Image Processing and Pattern Recognition (SIP).
[68] David Preston,et al. A New Approach of Digital Forensic Model for Digital Forensic Investigation , 2011 .
[69] Carlos Ordonez,et al. Integrating K-means clustering with a relational DBMS using SQL , 2006, IEEE Transactions on Knowledge and Data Engineering.
[70] Sharath Pankanti,et al. Efficient 24/7 object detection in surveillance videos , 2015, 2015 12th IEEE International Conference on Advanced Video and Signal Based Surveillance (AVSS).
[71] Hans-Peter Kriegel,et al. LOF: identifying density-based local outliers , 2000, SIGMOD '00.
[72] Gaurav Verma,et al. Implementation of Smart Video Surveillance System Using Motion Detection Technique , 2018 .
[73] Michitaka Kameyama,et al. Evaluation of the Hierarchical Temporal Memory as Soft Computing Platform and its VLSI Architecture , 2009, 2009 39th International Symposium on Multiple-Valued Logic.
[74] Jörn M. Horschig,et al. Directed Communication between Nucleus Accumbens and Neocortex in Humans Is Differentially Supported by Synchronization in the Theta and Alpha Band , 2015, PloS one.
[75] Doug Carner. Media forensics - Audio, video and image files: Structure, hash tags, metadata and tamper detection , 2013 .
[76] Thomas Serre,et al. Robust Object Recognition with Cortex-Like Mechanisms , 2007, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[77] Carlos Ordonez,et al. A Clustering Algorithm Merging MCMC and EM Methods Using SQL Queries , 2014, BigMine.
[78] K. Saravanan,et al. REVIEW ON CLASSIFICATION BASED ON ARTIFICIAL NEURAL NETWORKS , 2014 .
[79] Shreya Banerjee,et al. Empirical evaluation of K-Means, Bisecting K-Means, Fuzzy C-Means and Genetic K-Means clustering algorithms , 2015, 2015 IEEE International WIE Conference on Electrical and Computer Engineering (WIECON-ECE).
[80] Yva Doually,et al. Information Technology , 1997, IFIP Advances in Information and Communication Technology.
[81] Peter Norvig,et al. Artificial Intelligence: A Modern Approach , 1995 .
[82] Kjell Jørgen Hole. Anti-fragile ICT Systems , 2016, Simula SpringerBriefs on Computing.
[83] Fei-Fei Li,et al. Large-Scale Video Classification with Convolutional Neural Networks , 2014, 2014 IEEE Conference on Computer Vision and Pattern Recognition.
[84] Victor C. M. Leung,et al. Future Information Technology, Application, and Service: FutureTech 2012 Volume 1 , 2012 .
[85] B. V Prasanthi,et al. Cyber Forensic Tools: A Review , 2016 .
[86] Yvonne McGivern,et al. The Practice of Market and Social Research: An Introduction , 2002 .
[87] Feng Xia,et al. Big Scholarly Data: A Survey , 2017, IEEE Transactions on Big Data.
[88] Doina Precup,et al. Hierarchical temporal graphical model for head pose estimation and subsequent attribute classification in real-world videos , 2015, Comput. Vis. Image Underst..
[89] Ruibin Gong,et al. Case-Relevance Information Investigation: Binding Computer Intelligence to the Current Computer Forensic Framework , 2005, Int. J. Digit. EVid..
[90] Nils J. Nilsson,et al. Artificial Intelligence , 1974, IFIP Congress.
[91] Feng Pan,et al. Anomaly detection based-on the regularity of normal behaviors , 2006, 2006 1st International Symposium on Systems and Control in Aerospace and Astronautics.
[92] Chih-Yang Lin,et al. Three-Pronged Compensation and Hysteresis Thresholding for Moving Object Detection in Real-Time Video Surveillance , 2017, IEEE Transactions on Industrial Electronics.
[93] Nick Antonopoulos,et al. Video Stream Analysis in Clouds: An Object Detection and Classification Framework for High Performance Video Analytics , 2019, IEEE Transactions on Cloud Computing.
[94] Dileep George,et al. Sequence memory for prediction, inference and behaviour , 2009, Philosophical Transactions of the Royal Society B: Biological Sciences.
[95] Manfredo Atzori,et al. Movement Error Rate for Evaluation of Machine Learning Methods for sEMG-Based Hand Movement Classification , 2014, IEEE Transactions on Neural Systems and Rehabilitation Engineering.
[96] Sebastian Schemm,et al. Nowcasting Foehn Wind Events Using the AdaBoost Machine Learning Algorithm , 2017 .
[97] Benjamin Höferlin,et al. Evaluation of background subtraction techniques for video surveillance , 2011, CVPR 2011.
[98] Kejun Wang,et al. Video-Based Abnormal Human Behavior Recognition—A Review , 2012, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).
[99] Lennard G Streat. A Scalable Flash-Based Hardware Architecture for the Hierarchical Temporal Memory Spatial Pooler , 2016 .
[100] Dileep George,et al. Towards a Mathematical Theory of Cortical Micro-circuits , 2009, PLoS Comput. Biol..
[101] Chen-Feng Wu,et al. A Handoff Algorithm of Dynamic Decisions with Extenics for Wireless Cellular Networks , 2010, J. Electr. Comput. Eng..
[102] Jing Zhang,et al. Exposing digital video forgery by ghost shadow artifact , 2009, MiFor '09.
[103] Horacio Saggion,et al. Scholarly Data Mining: Making Sense of Scientific Literature , 2017, 2017 ACM/IEEE Joint Conference on Digital Libraries (JCDL).
[104] Hui Li,et al. Evolutionary artificial neural networks: a review , 2011, Artificial Intelligence Review.
[105] Qiao Sun,et al. An Efficient Distributed Database Clustering Algorithm for Big Data Processing , 2017 .
[106] Luca Iocchi,et al. Parallel multi-modal background modeling , 2017, Pattern Recognit. Lett..
[107] Ian C Smith,et al. Physical restraint and the therapeutic relationship , 2015 .
[108] Sergio A. Velastin,et al. How close are we to solving the problem of automated visual surveillance? , 2008, Machine Vision and Applications.
[109] Ton Kalker,et al. Considerations on watermarking security , 2001, 2001 IEEE Fourth Workshop on Multimedia Signal Processing (Cat. No.01TH8564).
[110] Peter Sommer. Directors and corporate advisors' guide to digital investigations and evidence , 2005 .
[111] Yumi Iwashita,et al. Recognizing Humans in Motion: Trajectory-based Aerial Video Analysis , 2013, BMVC.
[112] Sarah Mocas,et al. Building theoretical underpinnings for digital forensics research , 2004, Digit. Investig..
[113] Honglak Lee,et al. Deep Learning for Real-Time Atari Game Play Using Offline Monte-Carlo Tree Search Planning , 2014, NIPS.
[114] Heikki Mannila,et al. Principles of Data Mining , 2001, Undergraduate Topics in Computer Science.
[115] Bertrand Chupeau,et al. A framework for video forensics based on local and temporal fingerprints , 2009, 2009 16th IEEE International Conference on Image Processing (ICIP).
[116] Fangming Zhu,et al. Enhancement of Classifiers in HTM-CLA Using Similarity Evaluation Methods , 2015, KES.
[117] Scott Purdy. Encoding Data for HTM Systems , 2016, ArXiv.
[118] Fergal Byrne. Encoding Reality: Prediction-Assisted Cortical Learning Algorithm in Hierarchical Temporal Memory , 2015, ArXiv.
[119] Aaron F. Bobick,et al. Recognition of multi-agent interaction in video surveillance , 1999, Proceedings of the Seventh IEEE International Conference on Computer Vision.
[120] William Robson Schwartz,et al. Smart surveillance framework: A versatile tool for video analysis , 2014, IEEE Winter Conference on Applications of Computer Vision.
[121] Kaushik Roy,et al. Hierarchical Temporal Memory Based on Spin-Neurons and Resistive Memory for Energy-Efficient Brain-Inspired Computing , 2014, IEEE Transactions on Neural Networks and Learning Systems.
[122] John Haugeland,et al. Artificial intelligence - the very idea , 1987 .
[123] N. Meena,et al. Performance Comparison of Moving Object Detection Techniques in Video Surveillance System 1 , 2013 .
[124] William Stafford Noble,et al. Support vector machine , 2013 .
[125] Takashi Omori,et al. Detection of unusual human behavior in intelligent house , 2002, Proceedings of the 12th IEEE Workshop on Neural Networks for Signal Processing.
[126] Guillaume-Alexandre Bilodeau,et al. SuBSENSE: A Universal Change Detection Method With Local Adaptive Sensitivity , 2015, IEEE Transactions on Image Processing.
[127] Kamran Ahsan,et al. Digital Forensic Investigation Models, an Evolution study , 2015 .
[128] J. O. Oringo,et al. Constraints on Research Productivity in Kenyan Universities: Case Study of University of Nairobi, Kenya , 2016 .
[129] Petronilla Muriithi. Computer mediated collaboration among the academic research community: A case study of Kenya: Doctoral consortium paper , 2013, IEEE 7th International Conference on Research Challenges in Information Science (RCIS).
[130] Zainuddin Hassan,et al. COMMON PHASES OF COMPUTER FORENSICS INVESTIGATION MODELS , 2011 .
[131] José E. Meroño,et al. Application of Numenta® Hierarchical Temporal Memory for land-use classification , 2010 .
[132] Raymond Wafula Ongus,et al. Analysis of the Implementation of an Institutional Repository: A Case Study of Dedan Kimathi University of Technology, Kenya , 2016 .
[133] Mahadev Satyanarayanan,et al. A Scalable and Privacy-Aware IoT Service for Live Video Analytics , 2017, MMSys.
[134] Ting Xu,et al. All-angle negative refraction and active flat lensing of ultraviolet light , 2013, Nature.
[135] Aakanksha Chowdhery,et al. The Design and Implementation of a Wireless Video Surveillance System , 2015, MobiCom.
[136] Pierre Comon,et al. Independent component analysis, A new concept? , 1994, Signal Process..
[137] Weihong Wang,et al. Exposing Digital Forgeries in Interlaced and Deinterlaced Video , 2007, IEEE Transactions on Information Forensics and Security.
[138] Uffe Kock Wiil,et al. Digital Forensics and Crime Investigation: Legal Issues in Prosecution at National Level , 2010, 2010 Fifth IEEE International Workshop on Systematic Approaches to Digital Forensic Engineering.
[139] Robin S. Edelstein,et al. Childhood sexual assault victims: long-term outcomes after testifying in criminal court. , 2005, Monographs of the Society for Research in Child Development.
[140] Gregg H. Gunsch,et al. An Examination of Digital Forensic Models , 2002, Int. J. Digit. EVid..
[141] Maya Cakmak,et al. Power to the People: The Role of Humans in Interactive Machine Learning , 2014, AI Mag..
[142] Manoj Kumar,et al. Analysis of various information retrieval models , 2016, 2016 3rd International Conference on Computing for Sustainable Global Development (INDIACom).
[143] Francois Capman,et al. Embedded security system for multi-modal surveillance in a railway carriage , 2015, SPIE Security + Defence.
[144] Shiwei Ma,et al. Human action recognition based on locality constrained linear coding and two-dimensional spatial-temporal templates , 2017, 2017 Chinese Automation Congress (CAC).
[145] Richard Comley,et al. Colour space effect on tracking in video surveillance , 2010 .
[146] Mohamed Sedky,et al. Movement Classification Technique for Video Forensic Investigation , 2016 .
[147] Hui Xiong,et al. Understanding of Internal Clustering Validation Measures , 2010, 2010 IEEE International Conference on Data Mining.
[148] J. Aggarwal. Motion Analysis: Past, Present and Future , 2011 .
[149] Xavier Sevillano,et al. QuickSpot: a video analytics solution for on-street vacant parking spot detection , 2016, Multimedia Tools and Applications.
[150] Wang Hao,et al. A Content-Based Image Retrieval System Using Multiple Hierarchical Temporal Memory Classifiers , 2012, 2012 Fifth International Symposium on Computational Intelligence and Design.
[151] Kamil Rocki,et al. Effect of Spatial Pooler Initialization on Column Activity in Hierarchical Temporal Memory , 2015, AAAI.
[152] Mauricio Espinoza,et al. Detecting Similar Areas of Knowledge Using Semantic and Data Mining Technologies , 2016, CLEI Selected Papers.
[153] I-Jeng Wang,et al. Surveillance Camera Coordination Through Distributed Scheduling , 2005, Proceedings of the 44th IEEE Conference on Decision and Control.
[154] Sridhar Ramaswamy,et al. Efficient algorithms for mining outliers from large data sets , 2000, SIGMOD '00.
[155] Yoginder S. Dandass,et al. Research toward a Partially-Automated, and Crime Specific Digital Triage Process Model , 2012, Comput. Inf. Sci..
[156] Norita Md Norwawi,et al. Internet of Things(IoT) digital forensic investigation model: Top-down forensic approach methodology , 2015, 2015 Fifth International Conference on Digital Information Processing and Communications (ICDIPC).
[157] Subutai Ahmad,et al. Evaluating Real-Time Anomaly Detection Algorithms -- The Numenta Anomaly Benchmark , 2015, 2015 IEEE 14th International Conference on Machine Learning and Applications (ICMLA).
[158] Eugene H. Spafford,et al. An Event-Based Digital Forensic Investigation Framework , 2004 .
[159] Amos Storkey,et al. Advances in Neural Information Processing Systems 20 , 2007 .
[160] M. R. McLean. Concurrent Learning Algorithm and the Importance Map , 2014, Network Science and Cybersecurity.
[161] M. Amer,et al. Nearest-Neighbor and Clustering based Anomaly Detection Algorithms for RapidMiner , 2012 .
[162] Xiaoming Liu,et al. An intelligent video framework for homeland protection , 2007, SPIE Defense + Commercial Sensing.
[163] Cecilia Laschi,et al. Visual Target Sequence Prediction via Hierarchical Temporal Memory Implemented on the iCub Robot , 2016, Living Machines.
[164] Feng Xia,et al. A Survey of Scholarly Data Visualization , 2018, IEEE Access.
[165] Sriram Raghavan,et al. Digital forensic research: current state of the art , 2012, CSI Transactions on ICT.
[166] Mandeep Kaur,et al. A Literature review on Cyber Forensic and its Analysis tools , 2016 .
[167] Fabian Fallas-Moya. Object Tracking Based on Hierarchical Temporal Memory Classification , 2015 .
[168] Mansaf Alam,et al. A survey on scholarly data: From big data perspective , 2017, Inf. Process. Manag..
[169] P. G Scholar,et al. A Survey on Moving Object Detection and Tracking Techniques , 2016 .
[170] K. Flannelly. Brain Evolution and Emotions , 2017 .
[171] Xinzheng Zhang,et al. Skill Learning for Intelligent Robot by Perception-Action Integration: A View from Hierarchical Temporal Memory , 2017, Complex..
[172] ศิวะพร ภู่พันธ์,et al. Research Design: Qualitative, Quantitative, and Mixed Methods Approaches , 2018 .
[173] Laurent Itti,et al. A Bayesian model for efficient visual search and recognition , 2010, Vision Research.
[174] Ronald Poppe,et al. A survey on vision-based human action recognition , 2010, Image Vis. Comput..
[175] T. Wilson,et al. Closed Circuit Television (CCTV) Earthquake Behaviour Coding Methodology: analysis of Christchurch Public Hospital video data from the 22 February Christchurch earthquake event , 2017, Natural Hazards.
[176] Nicole Beebe,et al. A hierarchical, objectives-based framework for the digital investigations process , 2005, Digit. Investig..
[177] Takahiro Okabe,et al. Detecting Forgery From Static-Scene Video Based on Inconsistency in Noise Level Functions , 2010, IEEE Transactions on Information Forensics and Security.
[178] Nils J. Nilsson,et al. Human-Level Artificial Intelligence? Be Serious! , 2005, AI Mag..
[179] W. Eric L. Grimson,et al. Learning Patterns of Activity Using Real-Time Tracking , 2000, IEEE Trans. Pattern Anal. Mach. Intell..
[180] Lisa M. Brown,et al. IBM smart surveillance system (S3): event based video surveillance system with an open and extensible framework , 2008, Machine Vision and Applications.
[181] Yann LeCun,et al. The Loss Surfaces of Multilayer Networks , 2014, AISTATS.
[182] Sumeet Dua,et al. Data Mining and Machine Learning in Cybersecurity , 2011 .
[183] Weihong Wang,et al. Exposing digital forgeries in video by detecting double quantization , 2009, MM&Sec '09.
[184] Anoop Jain,et al. Efficient Clustering Technique for Information Retrieval in Data Mining , 2012 .
[185] Philip E. T. Lewis,et al. Research Methods for Business Students , 2006 .
[186] Tomasz Kapuscinski. Using Hierarchical Temporal Memory for Vision-Based Hand Shape Recognition under Large Variations in Hand's Rotation , 2010, ICAISC.
[187] Zeno Geradts,et al. Forensic Video Investigation , 2000 .
[188] L. Darrell Whitley,et al. An overview of evolutionary algorithms: practical issues and common pitfalls , 2001, Inf. Softw. Technol..
[189] Mubarak Shah,et al. Tracking and Object Classification for Automated Surveillance , 2002, ECCV.
[190] Andrew A. Adams,et al. The future of video analytics for surveillance and its ethical implications , 2015 .
[191] L. J. M. Rothkrantz,et al. A smart surveillance system of distributed smart multi cameras modelled as agents , 2016, 2016 Smart Cities Symposium Prague (SCSP).
[192] Zhenghong Yu,et al. Image classification using HTM cortical learning algorithms , 2012, Proceedings of the 21st International Conference on Pattern Recognition (ICPR2012).
[193] Yihong Gong,et al. Linear spatial pyramid matching using sparse coding for image classification , 2009, 2009 IEEE Conference on Computer Vision and Pattern Recognition.
[194] Eugene H. Spafford,et al. Getting Physical with the Digital Investigation Process , 2003, Int. J. Digit. EVid..
[195] G. Davies,et al. The Memorandum of Good Practice: theory versus application. , 2001, Child abuse & neglect.