Search the World's Largest Database of Information Science & Technology Terms & Definitions
InfInfoScipedia LogoScipedia
A Free Service of IGI Global Publishing House
Below please find a list of definitions for the term that
you selected from multiple scholarly research resources.

What is Closed-Circuit Television (CCTV)

Cyber Security of Industrial Control Systems in the Future Internet Environment
Also known as video surveillance system. It is a closed-circuit system consisted of video cameras which transmit visual information to a specific place found on the same network. It differs from broadcast television, where the signal is openly transmitted. The term is used for camera-based surveillance security systems where visual monitoring is needed (e.g., in stores, banks, airports, factories), and can have many industrial and non-industrial applications.
Published in Chapter:
Intelligent Automation Using Machine and Deep Learning in Cybersecurity of Industrial IoT: CCTV Security and DDoS Attack Detection
Ana Gavrovska (School of Electrical Engineering, University of Belgrade, Serbia) and Andreja Samčović (Faculty of Transport and Traffic Engineering, University of Belgrade, Serbia)
DOI: 10.4018/978-1-7998-2910-2.ch008
Abstract
Artificial intelligence is making significant changes in industrial internet of things (IIoT). Particularly, machine and deep learning architectures are now used for cybersecurity in smart factories, smart homes, and smart cities. Using advanced mathematical models and algorithms more intelligent protection strategies should be developed. Hacking of IP surveillance camera systems and Closed-Circuit TV (CCTV) vulnerabilities represent typical example where cyber attacks can make severe damage to physical and other Industrial Control Systems (ICS). This chapter analyzes the possibilities to provide better protection of video surveillance systems and communication networks. The authors review solutions related to migrating machine learning based inference towards edge and smart client devices, as well as methods for DDoS (Distributed Denial of Service) intelligent detection, where DDoS attack is recognized as one of the primary concerns in cybersecurity.
Full Text Chapter Download: US $37.50 Add to Cart
eContent Pro Discount Banner
InfoSci OnDemandECP Editorial ServicesAGOSR