Skip to main content

Advertisement

Table 1 List of surveillance and security technologies

From: Surveillance and security: protecting electricity utilities and other critical infrastructures

Type Technologies Examples of techniques or devices per technology
Visual surveillance Video Smart CCTV
(Coen et al. 2012; Bellanova and Friedewald 2012; Guelke et al. 2013; Gulzar et al. 2013; Thalmann et al. 2006; Hampapur et al. 2003; Senior 2009; Williams and Eyo 2012) Imaging scanner Infrared scanners, sonar imaging, thermal imaging, x-ray imaging, radiation imaging
  Photography Cameras, mobile phones, mobile video
  UAVs Drones, balloons
Biometrics Physiological Face recognition, facial thermograph, fingerprint recognition, retina scanning
(Coen et al. 2012; Bellanova and Friedewald 2012; Gulzar et al. 2013; ULD et al. 2013; Weber 2006) Behavioural Infrared scanners, sonar imaging, thermal imaging, x-ray imaging, radiation imaging
  Multimodal biometrics Multiple biometrics, multi-algorithm systems, multi-sensor systems
Communication surveillance Cyber security Voice over IP, mobile phones, call logging
(Coen et al. 2012; Bellanova and Friedewald 2012; Guelke et al. 2013) Physical Wiretapping
Location tracking Proximity sensing Proximity sensors
(Coen et al. 2012; Bellanova and Friedewald 2012; Guelke et al. 2013; Williams and Eyo 2012) Scene analysis Image recognition algorithms
  Triangulation Triangulation algorithms
Dataveillance Cyber security Intrusion detection and prevention systems, anti-malware, deep packet inspection
(Coen et al. 2012; Bellanova and Friedewald 2012; ULD et al. 2013; Mueller and Kuehn 2013) Data analysis Data mining and profiling
  Triangulation Triangulation algorithms
Ubiquitous surveillance Embedded sensors Wearable digital media
(Williams and Eyo 2012; Nguyen et al. 2009)