Asymmetric threats require powerful surveillance technology which helps to preserve the security. Security checks which focus on Improvised Explosive Devices (IED’s) or the identification of persons carrying hazardous substances are the major task of our research within the HAMLeT+ (Hazardous Material Localization and Person Tracking) project. Further on, there is a pressing need for assisting the security personnel, either civil or military, by extending the detection capabilities and to deliver efficient and reliable, real time decision support for their task to percept threats. Military camp protection with heterogeneous net-worked sensors and comprehensive sensor data fusion could be such an element. The technology developments concentr...
(1) Background: Police forces and security administrations are nowadays considering Improvised explo...
(1) Background: Police forces and security administrations are nowadays considering Improvised explo...
Physical security threats associated with asymmetric warfare are emerging both domestically and thro...
Asymmetric threats require powerful surveillance technology which helps to preserve the security. Se...
Asymmetric threats require powerful surveillance technology which helps to preserve the security. Se...
We introduce our Lessons Learned from the NATO CNAD PoW “Defense Against Terrorism (DAT)” campaign „...
We introduce our Lessons Learned from the NATO CNAD PoW “Defense Against Terrorism (DAT)” campaign „...
We introduce our Lessons Learned from the NATO CNAD PoW “Defense Against Terrorism (DAT)” campaign „...
We introduce our Lessons Learned from the NATO CNAD PoW “Defense Against Terrorism (DAT)” campaign „...
Accurate and timely detection of explosives, energetic materials, and their associated compounds wou...
Aerosolized threat detection methods have been of increased interest for military and civilian safet...
Preventing terrorist attacks at soft targets has become a priority for our society. The realization ...
Persistent wireless sensor networks can be a cost-effective way to monitor public areas for suspicio...
The EDEN (End-User Driven Demo for CBRNe) FP7 Demonstration Project is an European collaborative pro...
(1) Background: Police forces and security administrations are nowadays considering Improvised explo...
(1) Background: Police forces and security administrations are nowadays considering Improvised explo...
(1) Background: Police forces and security administrations are nowadays considering Improvised explo...
Physical security threats associated with asymmetric warfare are emerging both domestically and thro...
Asymmetric threats require powerful surveillance technology which helps to preserve the security. Se...
Asymmetric threats require powerful surveillance technology which helps to preserve the security. Se...
We introduce our Lessons Learned from the NATO CNAD PoW “Defense Against Terrorism (DAT)” campaign „...
We introduce our Lessons Learned from the NATO CNAD PoW “Defense Against Terrorism (DAT)” campaign „...
We introduce our Lessons Learned from the NATO CNAD PoW “Defense Against Terrorism (DAT)” campaign „...
We introduce our Lessons Learned from the NATO CNAD PoW “Defense Against Terrorism (DAT)” campaign „...
Accurate and timely detection of explosives, energetic materials, and their associated compounds wou...
Aerosolized threat detection methods have been of increased interest for military and civilian safet...
Preventing terrorist attacks at soft targets has become a priority for our society. The realization ...
Persistent wireless sensor networks can be a cost-effective way to monitor public areas for suspicio...
The EDEN (End-User Driven Demo for CBRNe) FP7 Demonstration Project is an European collaborative pro...
(1) Background: Police forces and security administrations are nowadays considering Improvised explo...
(1) Background: Police forces and security administrations are nowadays considering Improvised explo...
(1) Background: Police forces and security administrations are nowadays considering Improvised explo...
Physical security threats associated with asymmetric warfare are emerging both domestically and thro...