By Topic

Security technology

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$33 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

Security requirements and capabilities have changed dramatically over the past fifty years. Personal identification and detection of illegal substances including explosives have come to the forefront. With the proliferation of computers the security of information has also become a major concern. Substantial advances have been made over the last three decades in entry control, counter-terrorism, cryptology and airport protection. The utilization of technology has become an irreversible trend. Electronic devices and systems are capable of automatically and tirelessly monitoring and reporting breaches of security. For example, airport security began with physical protection of the facility with fences and area surveillance. The most recent concern is detecting explosives in both checked and early-on baggage, Other techniques relate to monitoring passengers for weapons as they transit the terminal building, especially crowds gathered at the metal detectors and X-ray machines. The application of electronics has produced reliability improvements and cost savings in systems that protect against unauthorized entry and numerous other threats. PCs have become the heart of security command and control systems. Most PC platforms rely on the proven software stability of Windows NT and present data in human-friendly, graphic format. It is expected that in the near future security monitoring will be consolidated in a central location, possibly to be integrated with other command and control functions.

Published in:

IEEE Aerospace and Electronic Systems Magazine  (Volume:15 ,  Issue: 10 )