Return to Article Details Principles for detecting suspicious activity and programs for analyzing suspicious activity using CCTV cameras Download Download PDF