


default search action
Future Security 2012: Bonn, Germany
- Nils Aschenbruck, Peter Martini, Michael Meier, Jens Tölle:
Future Security - 7th Security Research Conference, Future Security 2012, Bonn, Germany, September 4-6, 2012. Proceedings. Communications in Computer and Information Science 318, Springer 2012, ISBN 978-3-642-33160-2
Supply Chain and Critical Infrastructure Protection
- Jan-Peter Nicklas, Nadine Schlüter, Petra Winzer:
Measurement Concept for Security in Mass Transportation. 1-4 - Dirk Thorleuchter
, Joachim Schulze, Dirk Van den Poel:
Improved Emergency Management by a Loosely Coupled Logistic System. 5-8 - Ganna Monakova, Cristina Severin, Achim D. Brucker
, Ulrich Flegel, Andreas Schaad:
Monitoring Security and Safety of Assets in Supply Chains. 9-20 - Norbert Siegel, Simone Wurster
:
Standards for the Protection of Transport Infrastructures. 21-24 - Hagen Borstell, Liu Cao, Klaus Richter, Christian Schäfer:
Security in Supply Chains in the Scope of Surface Transport of Goods by Secure Information Patterns on the Freight - Trans4Goods. 25-28 - Maria Akbulatova, Matthias Winkler:
A Process for Secure Supply Chain Evaluation. 29-32
Security Situational Awareness
- David Damm, Dirk von Zeddelmann, Frank Kurth
:
Unsupervised Techniques for Audio Summarization in Acoustic Environment Monitoring. 33-36 - Çagatay Soyer, Florian Segor, Barbara Essendorfer, Wilmuth Müller:
Integrating Persistent Surveillance Systems into ISR Architecture. 37-48 - Maria Garcia Puyol, Martin Frassl, Patrick Robertson:
Collaborative Mapping for Pedestrian Navigation in Security Applications. 49-60 - Hagen Borstell, Bernd Gebert, Liu Cao, Cathrin Plate, Klaus Richter:
Image-Based Situation Assessment in Public Space. 61-64 - Gee Wah Ng, Yuan-Sin Tan, Xu Hong Xiao, Rui Zhong Chan:
DSO Cognitive Architecture in Mobile Surveillance. 65-72 - Dirk Thorleuchter
, Dirk Van den Poel
:
Using NMF for Analyzing War Logs. 73-76 - Kurt Osterloh, Norma Wrobel:
Safety and Security, Dealing with Risks. 77-80 - Wolfgang Raskob, Ellen Gers, Peter Meyer zu Drewer, Stefan Möllmann, Lars Tufte
, Frank Ulmer:
SECURITY2People - Functionality of the Final Demonstrator. 81-84 - Roberto Gimenez, Diego Fuentes, Daniel Oancea, Diego Gimenez, Judith Pertejo, Tassos Dimitriou, Sakis Giannetsos, Sofia Tsekeridou
, Mario Carabaño, Sofia Virgos:
Moving Advanced Safety to the Cloud: Some Outcomes of SafeCity Project. 85-88 - Fadl Bdeir
, Liaquat Hossain, Jafar Hamra
, John W. Crawford
:
Coordination Challenges for Global Disease Outbreaks Security. 89-92 - Georg Hummel, Martin Russ, Peter Stütz, John Soldatos
, Lorenzo Rossi, Thomas Knape, Ákos Utasi, Levente Kovács, Tamás Szirányi
, Charalampos Doulaverakis, Ioannis Kompatsiaris:
Intelligent Multi Sensor Fusion System for Advanced Situation Awareness in Urban Environments. 93-104
Crisis Management
- Ana Laugé, Josune Hernantes
, Leire Labaka
, Jose M. Sarriegi:
Collaborative Methodology for Crisis Management Knowledge Integration and Visualization. 105-116 - Steffen Schneider, Therese Friberg, Tobias Becker, Rainer Koch:
Prioritisation of Simulation Models for Ensuring Safety and Security in Underground Stations on the Basis of a Detailed Requirements Analysis. 117-128 - Ali Oran, Kiat Chuan Tan, Boon Hooi Ooi, Melvyn Sim
, Patrick Jaillet:
Location and Routing Models for Emergency Response Plans with Priorities. 129-140
Security for Critical Infrastructure And Urban Areas
- Alexander Stolz, Werner Riedel, Markus Nöldgen, Andreas Laubach:
New Building Concepts Protecting against Aircraft Impact. 141-152 - Norbert Gebbeken, Torsten Döge, Martin Larcher
:
Safety and Security of Urban Areas through Innovative Architectural and Structural Concepts. 153-164 - William Hynes, Stephen M. Purcell:
Security for Critical Infrastructure and Urban Areas: A Holistic Approach to Urban Safety, Security and Resilience. 165-175 - Kai Fischer
, Werner Riedel, Ivo Häring
, Albert Nieuwenhuijs, Stephen Crabbe, Steen S. Trojaborg, William Hynes, Ingo Müllers:
Vulnerability Identification and Resilience Enhancements of Urban Environments. 176-179 - Inge Trijssenaar-Buhre, Sandra Wijnant-Timmerman, Remco Witberg, Gerard Veldhuis:
Determining the Effectiveness of Safety Measures for Self-rescue in the Built Environment. 180-183 - Christoph Niklasch, Peter-Michael Mayer:
Enhancing Robustness of Tubbing Tunnels in Case of Extreme Loads. 184-187 - Ulrich Bergerhausen, Sven Priestaff:
Security Evaluation of Street Bridges for Fire Exposure - Current Findings of the Project SKRIBTPlus. 188-191
Sensor Technology
- Sebastian Bodó, Thorsten M. Buzug
:
Influence of Orientation Fields of Fingerprints to Matching Performance. 192-195 - Manuel Cuntz, Andriy Konovaltsev, Achim Dreher, Michael Meurer:
Jamming and Spoofing in GPS/GNSS Based Applications and Services - Threats and Countermeasures. 196-199 - Michael Schlechtweg, Axel Tessmann, Axel Hülsmann, Ingmar Kallfass
, Arnulf Leuther, Rolf Aidam, Christian Zech, Ulrich J. Lewark, Hermann Massler, Markus Riessle, Martin Zink, Josef Rosenzweig, Oliver Ambacher:
Millimeter-Wave Monolithic Integrated Circuits and Modules for Safety and Security Applications. 200-211 - Georg Hummel, Levente Kovács, Peter Stütz, Tamás Szirányi
:
Data Simulation and Testing of Visual Algorithms in Synthetic Environments for Security Sensor Networks. 212-215 - Thomas Barz
, Gero Bonow, Jens Hegenberg, Karim Habib, Liubov Cramar, Jochen Welle, Dirk Schulz
, Andreas Kroll, Ludger Schmidt:
Unmanned Inspection of Large Industrial Environments - Insights into the Research Project RoboGasInspector. 216-219 - Thomas van Oordt, Oliver Strohmeier, Daniel Mark, Roland Zengerle, Michael Eberhard, Josef Drexler, Pranav Patel, Manfred Weidmann
, Andrea Zgaga-Griesz, Wolfgang G. Bessler, Felix von Stetten:
The LabDisk - A Fully Automated Centrifugal Lab-on-a-Chip System for the Detection of Biological Threats. 220-223 - Christian Adami
, Christian Braun, Peter Clemens, Michael Jöster, Michael Suhrke, Hans-Joachim Taenzer:
Susceptibility of Two Deployable C4I Systems to HPM - Improvement by Hardening. 224-232 - Hendrik Fischer, Jörn Frank, Bert Ungethüm, Matthias Drobig, Andreas Walte, Gerhard Matz:
Detector Array with Gas Chromatograph for On-Site Analyses. 233-236
Social, Psychological and Political Aspects
- Hauke Vagts, Erik Krempel
, Jürgen Beyerer
:
User-Centric Protection and Privacy in Smart Surveillance Systems. 237-248 - Therese Friberg, Christina Schäfer, Rainer Koch:
Methodology for Analysing Unstructured Usability Evaluation Data. 249-260 - Jose M. Sarriegi, Eliot H. Rich, Ana Laugé, Leire Labaka
, Josune Hernantes
:
Creating and Testing Holistic Crisis Management Strategies: The Crisis Management Balanced Scorecard and Systems Modelling. 261-264 - Christoph Bier, Pascal Birnstill
, Erik Krempel
, Hauke Vagts, Jürgen Beyerer
:
How Is Positive-Sum Privacy Feasible? 265-268 - Thomas Benesch, Johannes Göllner, Johann Höchtl
, Andreas Peer, Walter Seböck:
Concept for Scenario-Development for Foresight Security Scenarios: Mapping Research to a Comprehensive Approach to Exogenous EU Roles. 269-272 - Naouma Kourti, Ferenc Borsos, Peter Gattinesi:
Establishment of the European Reference Network for Critical Infrastructure Protection (ERNCIP). 273-276
Cyber Defense and Information Security
- Florian Skopik
, Zhendong Ma, Paul Smith, Thomas Bleier:
Designing a Cyber Attack Information System for National Situational Awareness. 277-288 - Sebastian Eschweiler, Elmar Gerhards-Padilla:
Towards Sound Forensic Acquisition of Volatile Data. 289-298 - Thomas Königshofen:
The New Counter-Espionage Concept at Deutsche Telekom. 299-302 - Björn-C. Bösch:
An Approach for Independent Intrusion Detection Management Systems - A Standardized Intrusion Detection Parameterization Format. 303-306 - Gabriel Klein, Heiko Günther, Susan Träber:
Modularizing Cyber Defense Situational Awareness - Technical Integration before Human Understanding. 307-310
Maritime and Border Security
- Joerg Kalwa:
Underwater Inspection Using the AUV SeaCat. 311-314 - Wolfgang Jans, Matthias Reuter, Stefan Behringer, Sabine Bohlmann
:
Probing the Seafloor in Order to Find Dumped Ammunition and Other Hazardous Materials. 315-326 - Dietmar Stiller, Stephan Benen, Paula Berkel:
An Experiment for Detection of Underwater Intruders with Different Kinds of Sensors. 327-333 - Joerg Kushauer, Nicolai Kuenzner, Stefan Katzenbeisser, Klaus Wingender:
Electro-optical Surveillance in Maritime Environments. 334-336 - Boris Culik, Thomas Lehmann, Christoph Zebermann:
PITAS: Pirate and Terrorist Aversion System. 337-346 - Viet Duc Nguyen:
Small-Target Radar Detection and Tracking within the PITAS Hard- and Software Environment. 347-358 - Cengiz Erbas, Fulya Tuncer Cetin, Burcu Yilmaz, Erdem Akagündüz, Yildiray Kabak
, Aykut Bulca:
Open and Interoperable Maritime Surveillance Framework Set to Improve Sea-Borders Control. 359-362 - Robert H. Stark, Franke Sonnemann, Jürgen Urban, Dieter Weixelbaum:
Threat and Potential of High Power Electromagnetics Technology (HPEM). 363-365
Detection of Hazardous Materials
- Philipp Sulzer, Simone Jürschik, Bishu Agarwal, Thomas Kassebacher, Eugen Hartungen, Achim Edtbauer
, Fredrik Petersson, Johannes Warmer, Gerhard Holl, Dave Perry, Christopher A. Mayhew, Tilmann D. Märk:
Designer Drugs and Trace Explosives Detection with the Help of Very Recent Advancements in Proton-Transfer-Reaction Mass Spectrometry (PTR-MS). 366-375 - Monika Wieneke, Wolfgang Koch, Hermann Friedrich
, Sebastian Chmel:
On the Detection and Localization of Radioactive Sources in Public Facilities. 376-387 - Frank Fuchs, Jan Phillip Jarvis, Stefan Hugger, Michel Kinzer, Quankui Yang
, Wolfgang Bronner
, Rachid Driad, Rolf Aidam:
Imaging Standoff Detection of Explosives by Diffuse Reflectance IR Laser Spectroscopy. 388-399 - Frank E. Schneider
, Dennis Wildermuth
, Markus Ducke, Bernd Brüggemann
:
Development of an Experimental Multi-robot CBRNE Reconnaissance Demonstrator - System Description and Technical Validation. 400-411 - Didier Poullain, Pierre Montmeat, Lionel Hairault, Thierry Maillou, Rodrigue Rousier, Anthony Larue, Aurélie Martin, Guillaume Lebrun, François Simoens, Jérôme Meilhan, Claude Fermon, Myriam Pannetier-Lecoeur, Joachim Tabary, Caroline Paulus, Anne-Sophie Lallemand, Gilles Ferrand, Guillaume Sannie, Bertrand Perot
, Cédric Carasco:
Research for the Detection of Explosives at CEA: Towards Operational Use. 412-427 - Karine Bonnot
, Benny Siegert, Nelly Piazzon, Denis Spitzer, Jose Sansano
, Manuel Rodrigo
, Francisco Cuesta-Soto, Antonio Varriale, Sabato d'Auria, Nuria Sanchez, Francisco Lopez-Royo, Jorge J. Sanchez:
A Biophotonic Sensor for the Specific Detection of DMMP Vapors at the ppb Level. 428-431 - Martin Wehner, Ulrich Thombansen, Nicole Raven, Christoph Kühn, Stefan Schillberg
:
Light-Weight Optical Sensor for Standoff Detection of Fluorescent Biosensors. 432-437 - Thomas Kassebacher, Philipp Sulzer, Simone Jürschik, Bishu Agarwal, Fredrik Petersson, Eugen Hartungen, Hans Seehauser, Tilmann D. Märk:
Detecting and Quantifying Toxic Industrial Compounds (TICs) with Proton-Transfer-Reaction Mass Spectrometry (PTR-MS). 438-447
Food Chain Security
- Anja Buschulte, Britta Müller-Wahl, Annemarie Käsbohrer, Bernd Appel:
Vulnerability Assessment in the Food Chain - A Way to Do It. 448-453 - Bernd Appel, Anneluise Mader
, Juliane Braeunig, Heidi Wichmann-Schauer, Annemarie Käsbohrer:
Improving the Security of Food Chains against Natural, Accidental and Deliberate Contaminations. 454-461 - Armin A. Weiser, Matthias Filter
, Alexander Falenski
, Jörgen Brandt, Annemarie Käsbohrer, Bernd Appel:
An Open-Source Community Resource for Creating, Collecting, Sharing and Applying Predictive Microbial Models (PMM-Lab). 462-465 - Annemarie Käsbohrer, Matthias Filter
, Angela Körner, Anneluise Mader
, Jürgen Zentek, Bernd Appel:
Model for the Assessment of Microbiological Risks Originating from Intentional Contaminations in Feed Chains. 466-470 - Matthias Filter
, Christian Thoens, Annemarie Käsbohrer, Bernd Appel:
Exploitation of Commercial B2B Data for Risk Assessment Tasks in Foodborne Crisis Events. 471-474
Aviation Security
- Martin Frassl, Michael Lichtenstern, Michael Angermann, Giulio Gullotta:
Micro Aerial Vehicles in Disaster Assessment Operations - The Example of Cyprus 2011. 475-479 - Michael Gerke, Ulrich Borgolte, Ivan Masár, Frantisek Jelenciak, Pavol Bahnik, Naef Al-Rashedi:
Lighter-Than-Air UAVs for Surveillance and Environmental Monitoring. 480-483 - Jan Eilers, Thomas Neff:
Protection of Spaceborne Systems. 484-487 - Hartmut Runge, Josef Kallo, Philipp Rathke, Thomas Stephan, Franz Kurz, Dominik Rosenbaum, Oliver Meynberg:
CHICAGO - An Airborne Observation System for Security Applications. 488-492 - Julia Ziehm, Frank K. F. Radtke, Tobias Leismann:
Analysis of Future Threats to Civil Aviation within the Project COPRA (Comprehensive European Approach to the Protection of Civil Aviation). 493-496
Ergonomic Aspects
- Gertraud Peinel, Thomas Rose, Alexander Wollert:
Cross-Organizational Preplanning in Emergency Management with IT-Supported Smart Checklists. 497-508 - Leire Labaka
, Josune Hernantes
, Ana Laugé, Jose M. Sarriegi:
Resilience: Approach, Definition and Building Policies. 509-512 - Johannes Sautter
, Wolf Engelbach, Sandra Frings:
User-Centered Elaboration of an Integrated Crisis Management Modeling and Simulation Solution. 513-516 - David Münch, Stefan Becker, Wolfgang Hübner, Michael Arens
:
Towards a Real-Time Situational Awareness System for Surveillance Applications in Unconstrained Environments. 517-521 - Gina Linkmann, Eric Holder:
ISPS Port Risk Assessment: Is the True Value in the Numbers or in the Process? 522-525 - Thomas Remmersmann, Ulrich Schade:
Securing Area with Robots under BML Control. 526-529

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.