Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 225,440,624 papers from all fields of science
Search
Sign In
Create Free Account
3D security
3D security is a framework promoting development, diplomacy, and defense as security strategies. The 3D security framework recognizes that security…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
1 relation
Broader (1)
Security engineering
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
Low-cost 3D security camera
R. Bock
Defense + Security
2018
Corpus ID: 67448515
R-DEX Systems is developing a low-cost 3D security camera for residential, commercial, and military applications. This innovative…
Expand
2015
2015
InterSec: An interaction system for network security applications
Troy Nunnally
,
A. S. Uluagac
,
R. Beyah
IEEE International Conference on Communications…
2015
Corpus ID: 37953625
Traditional two-dimensional (2D) and three-dimensional (3D) visualization tools for network security applications often employ a…
Expand
2013
2013
ARGUS 3D: Security Enhancements through Innovative Radar Technologies
R. Cardinali
,
Enrico Anniballi
,
C. Bongioanni
,
A. Macera
,
F. Colone
,
P. Lombardo
ARES
2013
Corpus ID: 1492395
This electronic document is a "live" template. The various Conventional civil Air Traffic Control (ATC) systems are able to…
Expand
2013
2013
3D Security Cloud Computing using Graphical Password
Ms. Sneha
,
Vasant Thakare
,
Ms. Deipali
,
V. Gore
,
Prof. Ms. D. V. Gore
2013
Corpus ID: 212537212
: Cloud computing is an emerging, on-demand and internet-based technology. It provides variety of services over internet such as…
Expand
2011
2011
View synthesis of KDEX imagery for 3D security X-ray imaging
O. Abusaeeda
,
J. Paul O. Evans
,
D. Downes
,
J. Chan
International Conferences on Imaging for Crime…
2011
Corpus ID: 132920229
We demonstrate the synthesis of intermediary views within a sequence of X-ray images that exhibit depth from motion or kinetic…
Expand
2011
2011
Animated depth employing image synthesis for 3D security X-ray imaging
O. Abusaeeda
,
J. P. Evans
,
D. Downes
,
J. Chan
IEEE International Symposium on Signal Processing…
2011
Corpus ID: 14423922
We demonstrate the production of synthetic X-ray images by employing the scale invariant feature transform or SIFT in combination…
Expand
Review
2010
Review
2010
A 3D Method for Prioritizing Security Assistance in AFRICOM
R. K. Brown
2010
Corpus ID: 158146279
Public reporting burden for this collection of information is estimated to average 1 hour per response, including the time for…
Expand
2010
2010
3d for generating a security mark complete system incrementally
S.J.辛斯克
,
M.文斯
2010
Corpus ID: 86401783
One kind of 3D security mark (20 '' ') of the system (10) comprises a computer program code with a computer readable medium for…
Expand
2006
2006
Bitmap based cryptographic access control for restricted views of XML documents
K. Ganesan
,
A.J.M. Jamal
International Conference on Advanced Computing…
2006
Corpus ID: 11751614
With the proliferation of more and more mobile devices for data access, there seems to be a great deal of demand in filtering the…
Expand
2004
2004
The Key to My On-Line Security
Paul Meadowcroft
Information Security Solutions Europe
2004
Corpus ID: 19770914
The paper will explain the infrastructure behind a variety of multi-application smart card services and how the security is…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE