sensors-logo

Journal Browser

Journal Browser

State of the Art of Security Technology

A special issue of Sensors (ISSN 1424-8220). This special issue belongs to the section "Internet of Things".

Deadline for manuscript submissions: closed (31 July 2022) | Viewed by 8972

Special Issue Editors


E-Mail Website
Guest Editor
IEEE ICCST Executive Committee, IEEE, Piscataway, NJ 08854-4141, USA
Interests: security technology

E-Mail Website
Guest Editor
School of Physics, Engineering & Computer Science, Department of Engineering and Technology, University of Hertfordshire, Hatfield AL10 9EU, UK
Interests: biometrics; intelligent transport systems; smart mobility
Special Issues, Collections and Topics in MDPI journals

E-Mail Website
Guest Editor
Institute Humans in Complex Systems, School of Applied Psychology, University of Applied Sciences and Arts Northwestern Switzerland, Bahnhofstrasse 6, 5210 Windisch, Switzerland
Interests: Security human factors; human-machine systems; human-machine interaction

E-Mail Website
Guest Editor
Safety & Security Engineering Group, DICMA SAPIENZA, University of Rome, Piazzale Aldo Moro, 5, 00185 Rome, Italy
Interests: integrated multidisciplinary security; integrated security systems; machine learning; human factor
Special Issues, Collections and Topics in MDPI journals

Special Issue Information

Dear Colleagues,

The IEEE International Carnahan Conference on Security Technology (ICCST) is focused on the research, development, testing, and systems engineering of electronic security technology, including the operational testing, lifecycle, and performance. It establishes a forum for the exchange of ideas and dissemination of information on both new and existing technology.

Selected papers of the ICCST proceedings will be published in this Special Issue, and regular papers on the following topics are welcomed:

  • Sensor and detection technology, including sensor webs and signal fusion;
  • Advanced video systems, automatic monitoring, and automatic threat recognition;
  • Alarm monitoring, command and control systems, including human factors;
  • Threat identification and modeling;
  • Information security, encryption, and privacy;
  • Cyber security and malware protection;
  • Wireless communication security, including spectrum use and encryption;
  • Biometrics, including voice, hand, finger, face and other characteristics;
  • Access control and identity management.

Dr. Gordan Thomas
Dr. Soodamani Ramalingam
Prof. Dr. Adrian Schwaninger
Prof. Dr. Garzia Fabio
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Sensors is an international peer-reviewed open access semimonthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2600 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Published Papers (3 papers)

Order results
Result details
Select all
Export citation of selected articles as:

Research

18 pages, 6888 KiB  
Article
Sentiment and Emotional Analysis of Risk Perception in the Herculaneum Archaeological Park during COVID-19 Pandemic
by Fabio Garzia, Francesco Borghini, Alberto Bruni, Mara Lombardi, Ludovica Minò, Soodamani Ramalingam and Giorgia Tricarico
Sensors 2022, 22(21), 8138; https://0-doi-org.brum.beds.ac.uk/10.3390/s22218138 - 24 Oct 2022
Cited by 4 | Viewed by 1619
Abstract
This paper proposes a methodology for sentiment analysis with emphasis on the emotional aspects of people visiting the Herculaneum Archaeological Park in Italy during the period of the COVID-19 pandemic. The methodology provides a valuable means of continuous feedback on perceived risk of [...] Read more.
This paper proposes a methodology for sentiment analysis with emphasis on the emotional aspects of people visiting the Herculaneum Archaeological Park in Italy during the period of the COVID-19 pandemic. The methodology provides a valuable means of continuous feedback on perceived risk of the site. A semantic analysis on Twitter text messages provided input to the risk management team with which they could respond immediately mitigating any apparent risk and reducing the perceived risk. A two-stage approach was adopted to prune a massively large dataset from Twitter. In the first phase, a social network analysis and visualisation tool NodeXL was used to determine the most recurrent words, which was achieved using polarity. This resulted in a suitable subset. In the second phase, the subset was subjected to sentiment and emotion mapping by survey participants. This led to a hybrid approach of using automation for pruning datasets from social media and using a human approach to sentiment and emotion analysis. Whilst suffering from COVID-19, equally, people suffered due to loneliness from isolation dictated by the World Health Organisation. The work revealed that despite such conditions, people’s sentiments demonstrated a positive effect from the online discussions on the Herculaneum site. Full article
(This article belongs to the Special Issue State of the Art of Security Technology)
Show Figures

Figure 1

18 pages, 2173 KiB  
Article
Modelling Causal Factors of Unintentional Electromagnetic Emanations Compromising Information Technology Equipment Security
by Maxwell Martin, Funlade Sunmola and David Lauder
Sensors 2022, 22(18), 7064; https://0-doi-org.brum.beds.ac.uk/10.3390/s22187064 - 18 Sep 2022
Viewed by 1408
Abstract
Information technology equipment (ITE) processing sensitive information can have its security compromised by unintentional electromagnetic radiation. Appropriately assessing likelihood of a potential compromise relies on radio frequency (RF) engineering expertise—specifically, requiring knowledge of the associated causal factors and their interrelationships. Several factors that [...] Read more.
Information technology equipment (ITE) processing sensitive information can have its security compromised by unintentional electromagnetic radiation. Appropriately assessing likelihood of a potential compromise relies on radio frequency (RF) engineering expertise—specifically, requiring knowledge of the associated causal factors and their interrelationships. Several factors that can cause unintentional electromagnetic emanations that can lead to the compromise of ITE have been found in the literature. This paper confirms the list of causal factors reported in previous work, categorizes the factors as belonging to threat, vulnerability, or impact, and develops an interpretive structural model of the vulnerability factors. A participatory modelling approach was used consisting of focus groups of RF engineers. The resulting hierarchical structural model shows the relationships between factors and illustrates their relative significance. The paper concludes that the resulting model can motivate a deeper understanding of the structural relationship of the factors that can be incorporated in the RF engineers’ assessment process. Areas of future work are suggested. Full article
(This article belongs to the Special Issue State of the Art of Security Technology)
Show Figures

Figure 1

15 pages, 2313 KiB  
Article
How Realistic Is Threat Image Projection for X-ray Baggage Screening?
by Robin Riz à Porta, Yanik Sterchi and Adrian Schwaninger
Sensors 2022, 22(6), 2220; https://0-doi-org.brum.beds.ac.uk/10.3390/s22062220 - 13 Mar 2022
Cited by 5 | Viewed by 5090
Abstract
At airports, security officers (screeners) inspect X-ray images of passenger baggage in order to prevent threat items (bombs, guns, knives, etc.) from being brought onto an aircraft. Because threat items rarely occur, many airports use a threat-image-projection (TIP) system, which projects pre-recorded X-ray [...] Read more.
At airports, security officers (screeners) inspect X-ray images of passenger baggage in order to prevent threat items (bombs, guns, knives, etc.) from being brought onto an aircraft. Because threat items rarely occur, many airports use a threat-image-projection (TIP) system, which projects pre-recorded X-ray images of threat items onto some of the X-ray baggage images in order to improve the threat detection of screeners. TIP is regulatorily mandated in many countries and is also used to identify officers with insufficient threat-detection performance. However, TIP images sometimes look unrealistic because of artifacts and unrealistic scenarios, which could reduce the efficacy of TIP. Screeners rated a representative sample of TIP images regarding artifacts identified in a pre-study. We also evaluated whether specific image characteristics affect the occurrence rate of artifacts. 24% of the TIP images were rated to display artifacts and 26% to depict unrealistic scenarios, with 34% showing at least one of the two. With two-thirds of the TIP images having been perceived as realistic, we argue that TIP still serves its purpose, but artifacts and unrealistic scenarios should be reduced. Recommendations on how to improve the efficacy of TIP by considering image characteristics are provided. Full article
(This article belongs to the Special Issue State of the Art of Security Technology)
Show Figures

Figure 1

Back to TopTop