{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,5]],"date-time":"2025-12-05T12:22:51Z","timestamp":1764937371800,"version":"3.40.3"},"publisher-location":"Cham","reference-count":29,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030954833"},{"type":"electronic","value":"9783030954840"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-030-95484-0_27","type":"book-chapter","created":{"date-parts":[[2022,2,7]],"date-time":"2022-02-07T10:05:46Z","timestamp":1644228346000},"page":"461-476","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Severity Level Assessment from\u00a0Semantically Fused Video Content Analysis for\u00a0Physical Threat Detection in\u00a0Ground Segments of\u00a0Space Systems"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7424-8928","authenticated-orcid":false,"given":"Gerasimos","family":"Antzoulatos","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2908-7843","authenticated-orcid":false,"given":"Georgios","family":"Orfanidis","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3774-3161","authenticated-orcid":false,"given":"Panagiotis","family":"Giannakeris","sequence":"additional","affiliation":[]},{"given":"Giorgos","family":"Tzanetis","sequence":"additional","affiliation":[]},{"given":"Grigorios","family":"Kampilis-Stathopoulos","sequence":"additional","affiliation":[]},{"given":"Nikolaos","family":"Kopalidis","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5234-9795","authenticated-orcid":false,"given":"Ilias","family":"Gialampoukidis","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2505-9178","authenticated-orcid":false,"given":"Stefanos","family":"Vrochidis","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6447-9020","authenticated-orcid":false,"given":"Ioannis","family":"Kompatsiaris","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,2,8]]},"reference":[{"key":"27_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"183","DOI":"10.1007\/978-3-642-21064-8_13","volume-title":"The Semanic Web: Research and Applications","author":"G Babitski","year":"2011","unstructured":"Babitski, G., Bergweiler, S., Grebner, O., Oberle, D., Paulheim, H., Probst, F.: SoKNOS \u2013 using semantic technologies in disaster management software. In: Antoniou, G., et al. (eds.) ESWC 2011. LNCS, vol. 6644, pp. 183\u2013197. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-21064-8_13"},{"key":"27_CR2","doi-asserted-by":"publisher","unstructured":"Baubion, C.: OECD Risk Management: Strategic crisis management 23 (2013). https:\/\/doi.org\/10.1787\/5k41rbd1lzr7-en","DOI":"10.1787\/5k41rbd1lzr7-en"},{"issue":"12","key":"27_CR3","doi-asserted-by":"publisher","first-page":"2930","DOI":"10.1109\/TPAMI.2013.23","volume":"35","author":"PN Belhumeur","year":"2013","unstructured":"Belhumeur, P.N., Jacobs, D.W., Kriegman, D.J., Kumar, N.: Localizing parts of faces using a consensus of exemplars. IEEE Trans. pattern Anal. Mach. Intell. 35(12), 2930\u20132940 (2013)","journal-title":"IEEE Trans. pattern Anal. Mach. Intell."},{"key":"27_CR4","doi-asserted-by":"crossref","unstructured":"Chopra, S., Hadsell, R., LeCun, Y.: Learning a similarity metric discriminatively, with application to face verification. In: 2005 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR 2005), vol. 1, pp. 539\u2013546. IEEE (2005)","DOI":"10.1109\/CVPR.2005.202"},{"key":"27_CR5","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1016\/j.websem.2012.05.003","volume":"17","author":"M Compton","year":"2012","unstructured":"Compton, M., et al.: The SSN ontology of the W3C semantic sensor network incubator group. J. Web Seman. 17, 25\u201332 (2012). https:\/\/doi.org\/10.1016\/j.websem.2012.05.003","journal-title":"J. Web Seman."},{"key":"27_CR6","doi-asserted-by":"crossref","unstructured":"Deng, J., Guo, J., Xue, N., Zafeiriou, S.: ArcFace: additive angular margin loss for deep face recognition. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 4690\u20134699 (2019)","DOI":"10.1109\/CVPR.2019.00482"},{"key":"27_CR7","doi-asserted-by":"publisher","unstructured":"United Nations International Strategy for Disaster Reduction: Global Assessment Report on Disaster Risk Reduction 2019. United Nations (2019). https:\/\/doi.org\/10.18356\/f4ae4888-en, https:\/\/www.un-ilibrary.org\/content\/books\/9789210041805","DOI":"10.18356\/f4ae4888-en"},{"key":"27_CR8","unstructured":"EC: Overview of natural and man-made disaster risks the European union may face (2020). https:\/\/ec.europa.eu\/echo\/sites\/default\/files\/overview_of_natural_and_man-made_disaster_risks_the_european_union_may_face.pdf"},{"key":"27_CR9","doi-asserted-by":"publisher","unstructured":"EY: Evaluation study of council directive 2008\/114 on the identification and designation of european critical infrastructures and the assessment of the need to improve their protection (2019). https:\/\/op.europa.eu\/en\/publication-detail\/-\/publication\/118dcd3d-b041-11ea-bb7a-01aa75ed71a1. https:\/\/doi.org\/10.2837\/864404","DOI":"10.2837\/864404"},{"key":"27_CR10","doi-asserted-by":"publisher","unstructured":"Gomez, M., et al.: An ontology-centric approach to sensor-mission assignment. In: Gangemi, A., Euzenat, J. (eds.) EKAW 2008. LNCS (LNAI), vol. 5268, pp. 347\u2013363. Springer, Heidelberg (2008). https:\/\/doi.org\/10.1007\/978-3-540-87696-0_30","DOI":"10.1007\/978-3-540-87696-0_30"},{"key":"27_CR11","doi-asserted-by":"publisher","unstructured":"Hara, K., Kataoka, H., Satoh, Y.: Can spatiotemporal 3d CNNs retrace the history of 2d CNNs and imagenet? In: 2018 IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR), pp. 6546\u20136555 (2018). https:\/\/doi.org\/10.1109\/CVPR.2018.00685","DOI":"10.1109\/CVPR.2018.00685"},{"key":"27_CR12","doi-asserted-by":"publisher","unstructured":"He, K., Zhang, X., Ren, S., Sun, J.: Deep residual learning for image recognition. In: 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR), pp. 770\u2013778 (2016). https:\/\/doi.org\/10.1109\/CVPR.2016.90","DOI":"10.1109\/CVPR.2016.90"},{"key":"27_CR13","doi-asserted-by":"publisher","unstructured":"Hegde, J., Rokseth, B.: Applications of machine learning methods for engineering risk assessment - a review. Safety Sci. 122, 104492 (2020). https:\/\/doi.org\/10.1016\/j.ssci.2019.09.015","DOI":"10.1016\/j.ssci.2019.09.015"},{"key":"27_CR14","doi-asserted-by":"crossref","unstructured":"Hu, P., Ramanan, D.: Finding tiny faces. In: Proceedings of the IEEE conference on computer vision and pattern recognition, pp. 951\u2013959 (2017)","DOI":"10.1109\/CVPR.2017.166"},{"key":"27_CR15","doi-asserted-by":"publisher","unstructured":"Janowicz, K., Haller, A., Cox, S.J., Le Phuoc, D., Lefran\u00e7ois, M.: Sosa: a lightweight ontology for sensors, observations, samples, and actuators. J. Web Seman. 56, 1\u201310 (2019). https:\/\/doi.org\/10.1016\/j.websem.2018.06.003","DOI":"10.1016\/j.websem.2018.06.003"},{"key":"27_CR16","unstructured":"Limbu, M., Wang, D., Kauppinen, T., Ortmann, J.: Management of a crisis (MOAC) vocabulary specification (2012). http:\/\/observedchange.com\/moac\/ns\/(zuletzt besucht am: 29-07-2014)"},{"key":"27_CR17","doi-asserted-by":"publisher","unstructured":"Liu, W., et al.: SSD: single shot MultiBox detector. In: Leibe, B., Matas, J., Sebe, N., Welling, M. (eds.) ECCV 2016. LNCS, vol. 9905, pp. 21\u201337. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-46448-0_2","DOI":"10.1007\/978-3-319-46448-0_2"},{"key":"27_CR18","doi-asserted-by":"publisher","unstructured":"Redmon, J., Divvala, S., Girshick, R., Farhadi, A.: You only look once: unified, real-time object detection. In: 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR), pp. 779\u2013788 (2016). https:\/\/doi.org\/10.1109\/CVPR.2016.91","DOI":"10.1109\/CVPR.2016.91"},{"key":"27_CR19","doi-asserted-by":"publisher","first-page":"1137","DOI":"10.1109\/TPAMI.2016.2577031","volume":"39","author":"S Ren","year":"2015","unstructured":"Ren, S., He, K., Girshick, R.B., Sun, J.: Faster R-CNN: towards real-time object detection with region proposal networks. IEEE Trans. Pattern Anal. Mach. Intell. 39, 1137\u20131149 (2015)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"27_CR20","doi-asserted-by":"crossref","unstructured":"Schroff, F., Kalenichenko, D., Philbin, J.: FaceNet: a unified embedding for face recognition and clustering. In: Proceedings of the IEEE conference on computer vision and pattern recognition, pp. 815\u2013823 (2015)","DOI":"10.1109\/CVPR.2015.7298682"},{"key":"27_CR21","doi-asserted-by":"crossref","unstructured":"Shi, Y., Jain, A.K.: Probabilistic face embeddings. In: Proceedings of the IEEE\/CVF International Conference on Computer Vision, pp. 6902\u20136911 (2019)","DOI":"10.1109\/ICCV.2019.00700"},{"key":"27_CR22","unstructured":"Simonyan, K., Zisserman, A.: Two-stream convolutional networks for action recognition in videos. CoRR abs\/1406.2199 (2014). http:\/\/arxiv.org\/abs\/1406.2199"},{"key":"27_CR23","doi-asserted-by":"crossref","unstructured":"Sun, Y., Wang, X., Tang, X.: Deeply learned face representations are sparse, selective, and robust. In: Proceedings of the IEEE conference on computer vision and pattern recognition, pp. 2892\u20132900 (2015)","DOI":"10.1109\/CVPR.2015.7298907"},{"key":"27_CR24","unstructured":"Tan, M., Le, Q.: EfficientNet: Rethinking model scaling for convolutional neural networks. In: Chaudhuri, K., Salakhutdinov, R. (eds.) Proceedings of the 36th International Conference on Machine Learning. Proceedings of Machine Learning Research, vol. 97, pp. 6105\u20136114. PMLR (2019)"},{"key":"27_CR25","doi-asserted-by":"publisher","unstructured":"Tan, M., Pang, R., Le, Q.V.: Efficientdet: scalable and efficient object detection. In: 2020 IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR), pp. 10778\u201310787 (2020). https:\/\/doi.org\/10.1109\/CVPR42600.2020.01079","DOI":"10.1109\/CVPR42600.2020.01079"},{"key":"27_CR26","doi-asserted-by":"crossref","unstructured":"Tang, X., Du, D.K., He, Z., Liu, J.: Pyramidbox: A context-assisted single shot face detector. In: Proceedings of the European Conference on Computer Vision (ECCV), pp. 797\u2013813 (2018)","DOI":"10.1007\/978-3-030-01240-3_49"},{"issue":"4","key":"27_CR27","doi-asserted-by":"publisher","first-page":"1149","DOI":"10.5194\/nhess-20-1149-2020","volume":"20","author":"D Wagenaar","year":"2020","unstructured":"Wagenaar, D., et al.: Invited perspectives: how machine learning will change flood risk and impact assessment. Natural Hazards Earth Syst. Sci. 20(4), 1149\u20131161 (2020). https:\/\/doi.org\/10.5194\/nhess-20-1149-2020","journal-title":"Natural Hazards Earth Syst. Sci."},{"key":"27_CR28","doi-asserted-by":"crossref","unstructured":"Wang, C.Y., Liao, H.Y.M., Wu, Y.H., Chen, P.Y., Hsieh, J.W., Yeh, I.H.: Cspnet: a new backbone that can enhance learning capability of CNN. In: Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition workshops, pp. 390\u2013391 (2020)","DOI":"10.1109\/CVPRW50498.2020.00203"},{"key":"27_CR29","doi-asserted-by":"crossref","unstructured":"Yang, S., Luo, P., Loy, C.C., Tang, X.: Wider face: a face detection benchmark. In: Proceedings of the IEEE conference on computer vision and pattern recognition, pp. 5525\u20135533 (2016)","DOI":"10.1109\/CVPR.2016.596"}],"container-title":["Lecture Notes in Computer Science","Computer Security. ESORICS 2021 International Workshops"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-95484-0_27","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,18]],"date-time":"2024-09-18T00:47:37Z","timestamp":1726620457000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-95484-0_27"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783030954833","9783030954840"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-95484-0_27","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"8 February 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ESORICS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"European Symposium on Research in Computer Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Darmstadt","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Germany","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4 October 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 October 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"esorics2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/esorics2021.athene-center.de\/index.php","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"351","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"71","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"20% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3.07","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"6.06","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"The conference was held virtually due to the COVID-19 pandemic.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}