{"title":"Airport Perimeter Security: Where we've been, Where we are, and Where we're going","authors":"A. Barry, D. S. Mazel","doi":"10.1109/THS.2008.4534423","DOIUrl":null,"url":null,"abstract":"Perimeter security at an airport requires disparate sensors to operate in concert to detect intruders; track them; assess threats; coordinate responses; (for example, human responders for investigation, or door and gate closings); gather evidence for law enforcement prosecution; and coordinate responses between law enforcement agencies. At present, no one system accomplishes all these tasks. Our work and development has evolved a system that meets these needs. In this paper we describe that evolution and show where we've been in system development, how that past has shaped our present deployment of systems and how our current work will lead to a complete solution.","PeriodicalId":366416,"journal":{"name":"2008 IEEE Conference on Technologies for Homeland Security","volume":"33 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2008-05-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2008 IEEE Conference on Technologies for Homeland Security","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/THS.2008.4534423","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2
Abstract
Perimeter security at an airport requires disparate sensors to operate in concert to detect intruders; track them; assess threats; coordinate responses; (for example, human responders for investigation, or door and gate closings); gather evidence for law enforcement prosecution; and coordinate responses between law enforcement agencies. At present, no one system accomplishes all these tasks. Our work and development has evolved a system that meets these needs. In this paper we describe that evolution and show where we've been in system development, how that past has shaped our present deployment of systems and how our current work will lead to a complete solution.