Search results for "CCTV"
showing 6 items of 6 documents
Insecure Firmware and Wireless Technologies as “Achilles’ Heel” in Cybersecurity of Cyber-Physical Systems
2022
In this chapter, we analyze cybersecurity weaknesses in three use-cases of real-world cyber-physical systems: transportation (aviation), remote explosives and robotic weapons (fireworks pyrotechnics), and physical security (CCTV). The digitalization, interconnection, and IoT-nature of cyber-physical systems make them attractive targets. It is crucial to ensure that such systems are protected from cyber attacks, and therefore it is equally important to study and understand their major weaknesses. peerReviewed
Biopolitik am Computerbildschirm, in V. Borsò e M. Cometa (a cura) Die Kunst, das Leben zu Bewirtschaften. Biós zwischen Politik, Öikonomie und Äeste…
2013
La GRH symbole de modernité. L’appropriation des idées managériales à la mode par les collectivités territoriales
2019
Thème du congrès :« La GRH peut-elle sauver le travail?»; National audience
Towards CCTV-aware Routing and Navigation for Privacy, Anonymity, and Safety - Feasibility Study in Jyväskylä
2021
AbstractIn order to withstand the ever-increasing invasion of privacy by CCTV cameras and technologies, on par CCTV-aware solutions must exist that provide privacy, safety, and cybersecurity features. We argue that a first important step towards such CCTV-aware solutions must be a mapping system (e.g., Google Maps, OpenStreetMap) that provides both privacy and safety routing and navigation options. Unfortunately, to the best of our knowledge, there are no mapping nor navigation systems that support CCTV-privacy and CCTV-safety routing options. At the same time, in order to move the privacy vs. safety debate related to CCTV surveillance cameras from purely subjective to data-driven and evide…
CCTVCV: Computer Vision model/dataset supporting CCTV forensics and privacy applications
2022
The increased, widespread, unwarranted, and unaccountable use of Closed-Circuit TeleVision (CCTV) cameras globally has raised concerns about privacy risks for the last several decades. Recent technological advances implemented in CCTV cameras, such as Artificial Intelligence (AI)-based facial recognition and Internet of Things (IoT) connectivity, fuel further concerns among privacy advocates. Machine learning and computer vision automated solutions may prove necessary and efficient to assist CCTV forensics of various types. In this paper, we introduce and release the first and only computer vision models are compatible with Microsoft common object in context (MS COCO) and capable of accurately…
Surveillance, from resistance to support
2010
Does the theoretical paradigm elaborated by Foucault for analysing the birth and expansion of disciplinary societies provide a relevant platform for understanding the current methods used for public order management? The development of CCTV in public areas has led over the last few years to considerable debate over whether Foucault's conceptual framework - in reference to Bentham's panopticon - needs to be considered within a fresh perspective to address the new ways in which social control is being exercised. A number of highly instructive papers have been published, where the authors use a variety of metaphors to describe these methods - synopticon (Mathiesen, 1997), omnicon (Groombridge,…