From: Surveillance and security: protecting electricity utilities and other critical infrastructures
Type | Technologies | Examples of techniques or devices per technology |
---|---|---|
Visual surveillance | Video | Smart CCTV |
(Coen et al. 2012; Bellanova and Friedewald 2012; Guelke et al. 2013; Gulzar et al. 2013; Thalmann et al. 2006; Hampapur et al. 2003; Senior 2009; Williams and Eyo 2012) | Imaging scanner | Infrared scanners, sonar imaging, thermal imaging, x-ray imaging, radiation imaging |
 | Photography | Cameras, mobile phones, mobile video |
 | UAVs | Drones, balloons |
Biometrics | Physiological | Face recognition, facial thermograph, fingerprint recognition, retina scanning |
(Coen et al. 2012; Bellanova and Friedewald 2012; Gulzar et al. 2013; ULD et al. 2013; Weber 2006) | Behavioural | Infrared scanners, sonar imaging, thermal imaging, x-ray imaging, radiation imaging |
 | Multimodal biometrics | Multiple biometrics, multi-algorithm systems, multi-sensor systems |
Communication surveillance | Cyber security | Voice over IP, mobile phones, call logging |
(Coen et al. 2012; Bellanova and Friedewald 2012; Guelke et al. 2013) | Physical | Wiretapping |
Location tracking | Proximity sensing | Proximity sensors |
(Coen et al. 2012; Bellanova and Friedewald 2012; Guelke et al. 2013; Williams and Eyo 2012) | Scene analysis | Image recognition algorithms |
 | Triangulation | Triangulation algorithms |
Dataveillance | Cyber security | Intrusion detection and prevention systems, anti-malware, deep packet inspection |
(Coen et al. 2012; Bellanova and Friedewald 2012; ULD et al. 2013; Mueller and Kuehn 2013) | Data analysis | Data mining and profiling |
 | Triangulation | Triangulation algorithms |
Ubiquitous surveillance | Embedded sensors | Wearable digital media |
 |  |