Author of the publication

Using behavior analysis algorithms to anticipate security threats before they impact mission critical operations.

, , , , , , , , , , and . AVSS, page 307-312. IEEE Computer Society, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Masking in color images., and . Human Vision and Electronic Imaging, volume 4299 of SPIE Proceedings, page 187-194. SPIE, (2001)Using behavior analysis algorithms to anticipate security threats before they impact mission critical operations., , , , , , , , , and 1 other author(s). AVSS, page 307-312. IEEE Computer Society, (2007)Naturalistic data sets for image and behavior analysis - "normal" versus änomalous" events., , and . AVSS, page 325-330. IEEE Computer Society, (2011)