Courtesy of commercial television, we better be good. Or else the profilers will get us. It turns ...
This thesis investigates the ties between biometrics and state security by analyzing biometric ident...
This paper examines the techniques used in the two categories of biometric techniques (physiological...
This article attempts to identify the utility of biometric technology for variants of aviation secur...
This Trends article discusses the quest to improve aviation security by identifying behavioral indic...
This article identifies problems in common approaches to capturing the psychological essence of the ...
This article identifies potential security shortfalls even in the context of improvements in counter...
This project will investigate the development of biometrics as a viable security approach to counter...
This is the second in a series on aviation terrorism. (The first article is in the February 14, 1997...
Threats to information security are proliferating rapidly, placing demanding requirements on protect...
This article provides commentary on the American Civil Liberty Union\u27s (ACLU) criticisms of the C...
In spite of numerous technological advancements in the 21st century, there remain many cases of pers...
This article describes chronic flaws in developing profiles that are intended to help prevent or min...
Having overcome a deep crisis, airlines and airports now report continuously growing passenger numbe...
This article describes a significant challenge for intelligence analysts attempting to identify indi...
Courtesy of commercial television, we better be good. Or else the profilers will get us. It turns ...
This thesis investigates the ties between biometrics and state security by analyzing biometric ident...
This paper examines the techniques used in the two categories of biometric techniques (physiological...
This article attempts to identify the utility of biometric technology for variants of aviation secur...
This Trends article discusses the quest to improve aviation security by identifying behavioral indic...
This article identifies problems in common approaches to capturing the psychological essence of the ...
This article identifies potential security shortfalls even in the context of improvements in counter...
This project will investigate the development of biometrics as a viable security approach to counter...
This is the second in a series on aviation terrorism. (The first article is in the February 14, 1997...
Threats to information security are proliferating rapidly, placing demanding requirements on protect...
This article provides commentary on the American Civil Liberty Union\u27s (ACLU) criticisms of the C...
In spite of numerous technological advancements in the 21st century, there remain many cases of pers...
This article describes chronic flaws in developing profiles that are intended to help prevent or min...
Having overcome a deep crisis, airlines and airports now report continuously growing passenger numbe...
This article describes a significant challenge for intelligence analysts attempting to identify indi...
Courtesy of commercial television, we better be good. Or else the profilers will get us. It turns ...
This thesis investigates the ties between biometrics and state security by analyzing biometric ident...
This paper examines the techniques used in the two categories of biometric techniques (physiological...