Chapter Risk Assessment and Automated Anomaly Detection Using a Deep Learning Architecture

Risk-based security is a concept introduced in order to provide security checks without inconveniencing travelers that are being checked with unqualified scrutiny checks while maintaining the same level of security with current check point practices without compromising security standards. Furthermo...

Full description

Saved in:
Bibliographic Details
Main Author: Thomopoulos, Stelios C.A (auth)
Format: Electronic Book Chapter
Language:English
Published: InTechOpen 2021
Subjects:
Online Access:DOAB: download the publication
DOAB: description of the publication
Tags: Add Tag
No Tags, Be the first to tag this record!

MARC

LEADER 00000naaaa2200000uu 4500
001 doab_20_500_12854_70615
005 20210210
003 oapen
006 m o d
007 cr|mn|---annan
008 20210210s2021 xx |||||o ||| 0|eng d
020 |a intechopen.96209 
040 |a oapen  |c oapen 
024 7 |a 10.5772/intechopen.96209  |c doi 
041 0 |a eng 
042 |a dc 
072 7 |a U  |2 bicssc 
100 1 |a Thomopoulos, Stelios C.A.  |4 auth 
245 1 0 |a Chapter Risk Assessment and Automated Anomaly Detection Using a Deep Learning Architecture 
260 |b InTechOpen  |c 2021 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
506 0 |a Open Access  |2 star  |f Unrestricted online access 
520 |a Risk-based security is a concept introduced in order to provide security checks without inconveniencing travelers that are being checked with unqualified scrutiny checks while maintaining the same level of security with current check point practices without compromising security standards. Furthermore, risk-based security, as a means of improving travelers' experience at check points is expected to reduce queueing and waiting times while improving at the same travelers' experience during checks. A number of projects have been funded by the European Commission to investigate the concept of risk-based security and develop the means and technology required to implement it. The author is the Coordinator of two of the flagship projects funded by EC on risk-based security: FLYSEC and TRESSPASS. This chapter discusses and analyses the concept of risk-based security, the inherent competing mechanism between risk assessment, screening time and level of security, and means to implement risk-based security based on anomaly detection using deep learning and artificial intelligence (AI) methods. 
540 |a Creative Commons  |f https://creativecommons.org/licenses/by/3.0/  |2 cc  |4 https://creativecommons.org/licenses/by/3.0/ 
546 |a English 
650 7 |a Computing & information technology  |2 bicssc 
653 |a risk assessment, security, anomaly detection, deep learning, neural networks, crowd simulation, control and command, surveillance, risk-based security 
773 1 0 |7 nnaa 
856 4 0 |a www.oapen.org  |u https://library.oapen.org/bitstream/20.500.12657/49391/1/75329.pdf  |7 0  |z DOAB: download the publication 
856 4 0 |a www.oapen.org  |u https://library.oapen.org/bitstream/20.500.12657/49391/1/75329.pdf  |7 0  |z DOAB: download the publication 
856 4 0 |a www.oapen.org  |u https://directory.doabooks.org/handle/20.500.12854/70615  |7 0  |z DOAB: description of the publication