|
ACCESS THE FULL ARTICLE
No SPIE Account? Create one
CITATIONS
Cited by 5 scholarly publications.
Computer security
Neural networks
Surveillance
Network architectures
Video surveillance
Cameras
Information security