Kontaktujte nás | Jazyk: čeština English
dc.title | Use of detection of suspicious behavior in ensuring the security of persons in transport | en |
dc.contributor.author | Ljubymenko, Krystyna | |
dc.contributor.author | Kotková, Dora | |
dc.contributor.author | Šternová, Tereza | |
dc.relation.ispartof | Proceedings - International Carnahan Conference on Security Technology | |
dc.identifier.issn | 1071-6572 Scopus Sources, Sherpa/RoMEO, JCR | |
dc.identifier.isbn | 978-1-66549-988-0 | |
dc.date.issued | 2021 | |
utb.relation.volume | 2021-October | |
dc.event.title | 54th Annual IEEE International Carnahan Conference on Security Technology, ICCST 2021 | |
dc.event.location | online | |
dc.event.sdate | 2021-10-11 | |
dc.event.edate | 2021-10-15 | |
dc.type | conferenceObject | |
dc.language.iso | en | |
dc.publisher | Institute of Electrical and Electronics Engineers Inc. | |
dc.identifier.doi | 10.1109/ICCST49569.2021.9717399 | |
dc.relation.uri | https://ieeexplore.ieee.org/document/9717399 | |
dc.subject | detection suspicious behavior | en |
dc.subject | public services | en |
dc.subject | targets | en |
dc.subject | transport | en |
dc.description.abstract | The article aims to describe and explain the basic principles of using the detection of suspicious behavior in ensuring security in transport and especially in public services, where the targets can be passengers, their companions or employees themselves. The paper also aims to explain the reason for the attacks and describe the basic behaviors that can precede the attack. | en |
utb.faculty | Faculty of Applied Informatics | |
dc.identifier.uri | http://hdl.handle.net/10563/1010941 | |
utb.identifier.obdid | 43883160 | |
utb.identifier.scopus | 2-s2.0-85127252269 | |
utb.identifier.wok | 000835708000026 | |
utb.source | d-scopus | |
dc.date.accessioned | 2022-04-14T07:07:43Z | |
dc.date.available | 2022-04-14T07:07:43Z | |
dc.description.sponsorship | Technology Agency of the Czech Republic [TH04010377] | |
utb.contributor.internalauthor | Ljubymenko, Krystyna | |
utb.contributor.internalauthor | Kotková, Dora | |
utb.contributor.internalauthor | Šternová, Tereza | |
utb.fulltext.affiliation | Krystyna Ljubymenko Faculty of Applied Informatics Tomas Bata University in Zlín Zlín, Czech Republic k_lyubymenko@utb.cz Dora Kotkova Faculty of Applied Informatics Tomas Bata University in Zlín Zlín, Czech Republic kotkova@utb.cz Tereza Sternova Faculty of Applied Informatics Tomas Bata University in Zlín Zlín, Czech Republic sternova@utb.cz | |
utb.fulltext.dates | - | |
utb.fulltext.sponsorship | This work was supported by the research project TH04010377 "Development of methods of identification and protection of soft targets within transport infrastructure to increase their security and resistance to terrorist threats", supported by Technology Agency of the Czech Republic in the years 2019-2022. | |
utb.wos.affiliation | [Ljubymenko, Krystyna; Kotkova, Dora; Sternova, Tereza] Tomas Bata Univ Zlin, Fac Appl Informat, Zlin, Czech Republic | |
utb.scopus.affiliation | Faculty of Applied Informatics, Tomas Bata University in Zlín, Zlín, Czech Republic | |
utb.fulltext.projects | TH04010377 | |
utb.fulltext.faculty | Faculty of Applied Informatics | |
utb.fulltext.ou | - |