IEEE Supplement 2014

Notes from the Editor

Homeland Security Affairs is proud to again publish the best papers from the IEEE Conference on Technology for Homeland Security. The 2013 conference selected one paper as the “best” overall, plus one “best” paper from each of four tracks: Attack Prep, Biometrics and Forensics, Borders and Maritime Security, and Cyber Security. Read more.

IEEE Supplement 2014

Analysis of the Effects of Image Transformation, Template Selection, and Partial Information on Face Recognition with Time-Varying Expressions For Homeland Security Applications

Supplement: IEEE 2013 Conference on Technology for Homeland Security: Best Papers By Iliana V. Voynichka and Dalila B. Megherbi ABSTRACT: Awarded Best Paper Overall Facial recognition, especially with time-varying facial expressions and/or disguises, is crucial in many homeland security applications. […]

Analysis of the Effects of Image Transformation, Template Selection, and Partial Information on Face Recognition with Time-Varying Expressions For Homeland Security Applications

A Customized Modeling and Simulation Tool for Port and Airport Evacuation and Recovery: An Integrated Tool for Enhancing Preparedness and Response

Supplement: IEEE 2013 Conference on Technology for Homeland Security: Best Papers By Paul A. Belella and Bethann Rooney ABSTRACT: Awarded Best Paper in the Attack Prep track. Effective planning for the evacuation of port and airport facilities during or in

A Customized Modeling and Simulation Tool for Port and Airport Evacuation and Recovery: An Integrated Tool for Enhancing Preparedness and Response

Towards A Theory of Autonomous Reconstitution of Compromised Cyber-Systems

Supplement: IEEE 2013 Conference on Technology for Homeland Security: Best Papers By Pradeep Ramuhalli, Mahantesh Halappanavar, Jamie Coble, and Mukul Dixit ABSTRACT: Awarded Best Paper in the Cyber Security track. Effective reconstitution approaches for cyber systems are needed to keep critical

Towards A Theory of Autonomous Reconstitution of Compromised Cyber-Systems

Scroll to Top