A systematic review of intelligence video surveillance: Trends, techniques, frameworks, and datasets

GF Shidik, E Noersasongko, A Nugraha… - IEEE …, 2019 - ieeexplore.ieee.org
Video surveillance systems obtain a great interest as application-oriented studies that have
been growing rapidly in the past decade. The most recent studies attempt to integrate …

CNN features with bi-directional LSTM for real-time anomaly detection in surveillance networks

W Ullah, A Ullah, IU Haq, K Muhammad… - Multimedia tools and …, 2021 - Springer
In current technological era, surveillance systems generate an enormous volume of video
data on a daily basis, making its analysis a difficult task for computer vision experts …

Attacks and preventive measures on video surveillance systems: A review

P Vennam, P TC, T BM, YG Kim, PK BN - Applied Sciences, 2021 - mdpi.com
Video surveillance systems are widely deployed with large systems for use in strategic
places such as home security, public transportation, banks, ATM centers, city centers …

[PDF][PDF] An efficient dimension reduction based fusion of CNN and SVM model for detection of abnormal incident in video surveillance

R Sharma, A Sungheetha - Journal of Soft Computing Paradigm …, 2021 - researchgate.net
Performing dimensionality reduction in the camera captured images without any loss is
remaining as a big challenge in image processing domain. Generally, camera surveillance …

[HTML][HTML] A systematic literature Review: Risk analysis in cloud migration

B Soewito, FL Gaol, E Abdurachman - Journal of King Saud University …, 2022 - Elsevier
The era of the industrial revolution 4.0 was an era marked by the transition of information
and communication technology that was able to create new technology-based investments …

A survey on cloud-based video streaming services

X Li, M Darwich, MA Salehi, M Bayoumi - Advances in computers, 2021 - Elsevier
Video streaming, in various forms of video on demand (VOD), live, and 360 degree
streaming, has grown dramatically during the past few years. In comparison to traditional …

Secure video surveillance framework in smart city

H Li, T Xiezhang, C Yang, L Deng, P Yi - Sensors, 2021 - mdpi.com
In the construction process of smart cities, more and more video surveillance systems have
been deployed for traffic, office buildings, shopping malls, and families. Thus, the security of …

A survey of cloud architectures: confidentiality, contemporary state, and future challenges

AD Bhagat, S Basia, K Sharma… - 2022 3rd International …, 2022 - ieeexplore.ieee.org
Cloud computing is a technology that allows users to upload personal data across different
computers that are provided by a third party and delivers good quality services with …

Distributed computational model for shared processing on Cyber-Physical System environments

H Mora, JF Colom, D Gil, A Jimeno-Morenilla - Computer Communications, 2017 - Elsevier
Abstract Cyber-Physical Systems typically consist of a combination of mobile devices,
embedded systems and computers to monitor, sense, and actuate with the surrounding real …

Secure smart cameras by aggregate-signcryption with decryption fairness for multi-receiver IoT applications

S Ullah, L Marcenaro, B Rinner - Sensors, 2019 - mdpi.com
Smart cameras are key sensors in Internet of Things (IoT) applications and often capture
highly sensitive information. Therefore, security and privacy protection is a key concern. This …