Detection of suspicious persons and special software | IEEE Conference Publication | IEEE Xplore