Protecting Transportation Infrastructure
暂无分享,去创建一个
Daniel Dajun Zeng | Fei-Yue Wang | Hua Huang | Sudarshan S. Chawathe | Fei-Yue Wang | S. Chawathe | D. Zeng | Hua Huang
[1] N. Haering,et al. Automatic Visual Analysis for Transportation Security , 2007, 2007 IEEE Conference on Technologies for Homeland Security.
[2] Helen Wallace,et al. The Council and the European Parliament , 1997 .
[3] S.F. Hallowell,et al. Transportation security technologies research and development , 2005, MILCOM 2005 - 2005 IEEE Military Communications Conference.
[4] T. M. Wood,et al. An infrastructure vulnerability assessment methodology for metropolitan areas , 2002, Proceedings. 36th Annual 2002 International Carnahan Conference on Security Technology.
[5] Randall A. Yim. NATIONAL PREPAREDNESS: Integrating New and Existing Technology and Information Sharing into an Effective Homeland Security Strategy , 2002 .
[6] Hsinchun Chen,et al. Intelligence and security informatics for homeland security: information, communication, and transportation , 2004, IEEE Transactions on Intelligent Transportation Systems.
[7] E. Cohen. Making the Nation Safer: The Role of Science and Technology in Countering Terrorism , 2002 .
[8] Yacov Y. Haimes,et al. Virgina's critical infrastructure protection study , 2003, IEEE Systems and Information Engineering Design Symposium, 2003.
[9] J.F. Nunamaker,et al. Identification of deceptive behavioral cues extracted from video , 2005, Proceedings. 2005 IEEE Intelligent Transportation Systems, 2005..
[10] Scott Greiper,et al. Beyond Aviation: The Emerging Ground Transportation Security Market , 2006 .