@inproceedings{9cabf88559334a7fb8d590eb8f6ac7e6,
title = "A review of threat profiling techniques for use in concealed weapon detection systems",
abstract = "In this paper, we discuss different types of threat assessment approaches for use in surveillance systems. We look at each method separately from others with the aim of showing the evolvement of the technology. A detailed description and an in-depth look at current research are conducted in order to give a more concise review. Doing an in-depth individual analysis of each method allows for a better comparison approach with other methods. We also look at the advantages and disadvantages of each approach and compare it with other methods in order to get a better sense of the performance of the technique as compared to others. A discussion on a benchmark comparison of these methods is also given and a few recommendations are presented along with our proposed approach.",
keywords = "Close circuit television (CCTV), Concealed weapon detection (CWD)",
author = "Kudzaishe Mhou and {van der Haar}, Dustin",
note = "Publisher Copyright: {\textcopyright} 2019, Springer Nature Singapore Pte Ltd.; International Conference on Information Science and Applications, ICISA 2018 ; Conference date: 25-06-2018 Through 27-06-2018",
year = "2019",
doi = "10.1007/978-981-13-1056-0_21",
language = "English",
isbn = "9789811310553",
series = "Lecture Notes in Electrical Engineering",
publisher = "Springer Verlag",
pages = "201--209",
editor = "Kim, {Kuinam J.} and Kim, {Kuinam J.} and Nakhoon Baek",
booktitle = "Information Science and Applications 2018 - ICISA 2018",
address = "Germany",
}