Skip to main content

Table 1 List of surveillance and security technologies

From: Surveillance and security: protecting electricity utilities and other critical infrastructures

Type

Technologies

Examples of techniques or devices per technology

Visual surveillance

Video

Smart CCTV

(Coen et al. 2012; Bellanova and Friedewald 2012; Guelke et al. 2013; Gulzar et al. 2013; Thalmann et al. 2006; Hampapur et al. 2003; Senior 2009; Williams and Eyo 2012)

Imaging scanner

Infrared scanners, sonar imaging, thermal imaging, x-ray imaging, radiation imaging

 

Photography

Cameras, mobile phones, mobile video

 

UAVs

Drones, balloons

Biometrics

Physiological

Face recognition, facial thermograph, fingerprint recognition, retina scanning

(Coen et al. 2012; Bellanova and Friedewald 2012; Gulzar et al. 2013; ULD et al. 2013; Weber 2006)

Behavioural

Infrared scanners, sonar imaging, thermal imaging, x-ray imaging, radiation imaging

 

Multimodal biometrics

Multiple biometrics, multi-algorithm systems, multi-sensor systems

Communication surveillance

Cyber security

Voice over IP, mobile phones, call logging

(Coen et al. 2012; Bellanova and Friedewald 2012; Guelke et al. 2013)

Physical

Wiretapping

Location tracking

Proximity sensing

Proximity sensors

(Coen et al. 2012; Bellanova and Friedewald 2012; Guelke et al. 2013; Williams and Eyo 2012)

Scene analysis

Image recognition algorithms

 

Triangulation

Triangulation algorithms

Dataveillance

Cyber security

Intrusion detection and prevention systems, anti-malware, deep packet inspection

(Coen et al. 2012; Bellanova and Friedewald 2012; ULD et al. 2013; Mueller and Kuehn 2013)

Data analysis

Data mining and profiling

 

Triangulation

Triangulation algorithms

Ubiquitous surveillance

Embedded sensors

Wearable digital media

(Williams and Eyo 2012; Nguyen et al. 2009)

 Â