2010 IEEE International Conference on Technologies for Homeland Security (HST)最新文献

筛选
英文 中文
Wireless systems of threats monitoring 无线威胁监测系统
2010 IEEE International Conference on Technologies for Homeland Security (HST) Pub Date : 2011-10-19 DOI: 10.1007/978-3-642-24660-9_1
S. Ambroziak, R. Katulski, J. Sadowski, J. Stefanski
{"title":"Wireless systems of threats monitoring","authors":"S. Ambroziak, R. Katulski, J. Sadowski, J. Stefanski","doi":"10.1007/978-3-642-24660-9_1","DOIUrl":"https://doi.org/10.1007/978-3-642-24660-9_1","url":null,"abstract":"","PeriodicalId":106557,"journal":{"name":"2010 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125308604","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Cyber security concerns of Supervisory Control and Data Acquisition (SCADA) systems 监控和数据采集(SCADA)系统的网络安全问题
2010 IEEE International Conference on Technologies for Homeland Security (HST) Pub Date : 2010-12-03 DOI: 10.1109/THS.2010.5654964
D. Dumont
{"title":"Cyber security concerns of Supervisory Control and Data Acquisition (SCADA) systems","authors":"D. Dumont","doi":"10.1109/THS.2010.5654964","DOIUrl":"https://doi.org/10.1109/THS.2010.5654964","url":null,"abstract":"IEEE HST 2010 Conference Monitoring the distribution of our nation's critical infrastructure services is very complicated. Transportation, chemical, water, natural gas, petroleum, electricity, and energy sectors rely heavily on the ability of Supervisory Control and Data Acquisition (SCADA) systems to monitor and respond to changes and fluctuations within the system (NIPP, 2009). Changes can be reflected by natural elements such as the weather or based on customer demand. SCADA refers to the computer controlled and interfaced systems that run an industry's operations. SCADA systems at one time were not connected to the outside world and industrial operations were computer controlled within the property boundary that defined the facility. However, with maturity, technology and increased competition comes the advent of monitoring of customer usage. This also increases risk of cyber threat. In this paper, we will discuss SCADA usage and cyber vulnerability.","PeriodicalId":106557,"journal":{"name":"2010 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129146831","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Image fusion using the Parameterized Logarithmic Dual Tree Complex Wavelet Transform 基于参数化对数对偶树复小波变换的图像融合
2010 IEEE International Conference on Technologies for Homeland Security (HST) Pub Date : 2010-12-03 DOI: 10.1109/THS.2010.5655039
S. Nercessian, K. Panetta, S. Agaian
{"title":"Image fusion using the Parameterized Logarithmic Dual Tree Complex Wavelet Transform","authors":"S. Nercessian, K. Panetta, S. Agaian","doi":"10.1109/THS.2010.5655039","DOIUrl":"https://doi.org/10.1109/THS.2010.5655039","url":null,"abstract":"Image fusion combines multiple images into a single image containing the relevant information from each of the original source images. This paper introduces a new Parameterized Logarithmic Dual Tree Complex Wavelet Transform (PL-DT-CWT) and its application for image fusion. The new transform combines the Dual Tree Complex Wavelet Transform (DT-CWT) with the Parameterized Logarithmic Image Processing (PLIP) model, a nonlinear image processing framework for processing images. Experimental results via computer simulations illustrate the improved performance of the proposed algorithms by both qualitative and quantitative means.","PeriodicalId":106557,"journal":{"name":"2010 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"122 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128022189","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Image enhancement based on transform coefficient histogram shifting and shaping 基于变换系数直方图移位和整形的图像增强
2010 IEEE International Conference on Technologies for Homeland Security (HST) Pub Date : 2010-12-03 DOI: 10.1109/THS.2010.5654968
Junjun Xia, K. Panetta, S. Agaian
{"title":"Image enhancement based on transform coefficient histogram shifting and shaping","authors":"Junjun Xia, K. Panetta, S. Agaian","doi":"10.1109/THS.2010.5654968","DOIUrl":"https://doi.org/10.1109/THS.2010.5654968","url":null,"abstract":"This paper proposes two image enhancement algorithms that are based on utilizing histogram data gathered from wavelet transform domain coefficients. Computer simulations demonstrate that combining the spatial method of histogram equalization with the wavelet transform domain coefficient histograms achieves a much more balanced enhancement, which outperforms classical histogram equalization algorithms.","PeriodicalId":106557,"journal":{"name":"2010 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125641529","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
X-ray Phase Contrast Imaging with coded apertures for next generation baggage scanning systems 用于下一代行李扫描系统的带编码孔径的x射线相衬成像
2010 IEEE International Conference on Technologies for Homeland Security (HST) Pub Date : 2010-12-03 DOI: 10.1109/THS.2010.5655037
K. Ignatyev, P. Munro, R. Speller, A. Olivo
{"title":"X-ray Phase Contrast Imaging with coded apertures for next generation baggage scanning systems","authors":"K. Ignatyev, P. Munro, R. Speller, A. Olivo","doi":"10.1109/THS.2010.5655037","DOIUrl":"https://doi.org/10.1109/THS.2010.5655037","url":null,"abstract":"X-ray Phase Contrast Imaging (XPCi) is a novel method which was proven to enhance the visibility of all details compared to conventional, absorption-based x-ray imaging. Here we propose the application of such a methodology to baggage scanners, a field in which XPCi had not been tested before, and we demonstrate improved detail visibility on a range of samples representing difficult cases in security inspections. A working prototype system has been built, and the results obtained by imaging several test objects mimicking possible components of threat objects. Test objects were also imaged with additional absorbing layers, to show that the method can be used with cluttered environment of baggage in realistic conditions. In all cases, all details were clearly detected with high contrast and high signal-to-noise ratio. Our laboratory-based system uses a conventional X-ray source and a commercially available X-ray detector for data generation. The system can be scaled up by using larger coded apertures.","PeriodicalId":106557,"journal":{"name":"2010 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125717262","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Articulation of social and organizational considerations in states' emergency management information sharing 国家应急管理信息共享中的社会和组织考虑
2010 IEEE International Conference on Technologies for Homeland Security (HST) Pub Date : 2010-12-03 DOI: 10.1109/THS.2010.5655058
J. Brooks, D. Bodeau, J. Fedorowicz
{"title":"Articulation of social and organizational considerations in states' emergency management information sharing","authors":"J. Brooks, D. Bodeau, J. Fedorowicz","doi":"10.1109/THS.2010.5655058","DOIUrl":"https://doi.org/10.1109/THS.2010.5655058","url":null,"abstract":"The Emergency Preparedness and Response (EP&R) community has embraced a wide array of information and communications technologies (ICTs) to support information sharing and communication among participating agencies. Yet many existing and proposed technological solutions remain inadequate to support the unpredictable and frequently changing information sharing needs that arise during emergencies. Participants turn away from emergency ICTs when social and organizational concerns supersede available technological support. This paper highlights the articulation process through which emergency managers attempt to reconcile intersecting organizational, social and technological concerns during emergency incidents. Illustrative examples from observations of operational exercises and interviews with emergency response personnel in several U.S. states inform our discussion of the resulting system design challenges. We conclude the paper by presenting three design principles for information sharing systems which support adaptive social and organizational aspects of emergency management.","PeriodicalId":106557,"journal":{"name":"2010 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115691254","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Computer-assisted validation and verification of cybersecurity requirements 网络安全要求的计算机辅助验证和验证
2010 IEEE International Conference on Technologies for Homeland Security (HST) Pub Date : 2010-12-03 DOI: 10.1109/THS.2010.5655087
D. Drusinsky, J. Michael, Thomas W. Otani, M. Shing, D. Wijesekera
{"title":"Computer-assisted validation and verification of cybersecurity requirements","authors":"D. Drusinsky, J. Michael, Thomas W. Otani, M. Shing, D. Wijesekera","doi":"10.1109/THS.2010.5655087","DOIUrl":"https://doi.org/10.1109/THS.2010.5655087","url":null,"abstract":"Errors in requirements are often a contributing cause of the failure of critical infrastructure and their underlying information systems to adequately guard against cyber intrusions and withstand cyber attacks. However, detecting errors in the cybersecurity requirements, and for requirements in general, is a challenging task. In this paper we describe how computer-aided formal verification and validation can be leveraged to address the challenge of correctly capturing natural language cybersecurity requirements, converting the natural language statements into formal requirements specifications, and then checking the formal specifications to ensure that they match the original intent of the stakeholders. Our approach centers on creating a one-to-one mapping between natural language requirements and UML statechart assertions. Statechart assertions are Boolean statements about the expected behavior of the system, expressed as UML statecharts. The set of assertions created by the security or software engineer is a formal model of the system's requirements. We demonstrate our approach using examples of formally specifying and validating requirements for correct cyber system behaviors and the detection of illegal business schemes in choreographed web services.","PeriodicalId":106557,"journal":{"name":"2010 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124152026","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Score level fusion of hand based biometrics using t-norms 基于t规范的手部生物特征评分融合
2010 IEEE International Conference on Technologies for Homeland Security (HST) Pub Date : 2010-12-03 DOI: 10.1109/THS.2010.5655093
M. Hanmandlu, J. Grover, V. Madasu, Shantaram Vasirkala
{"title":"Score level fusion of hand based biometrics using t-norms","authors":"M. Hanmandlu, J. Grover, V. Madasu, Shantaram Vasirkala","doi":"10.1109/THS.2010.5655093","DOIUrl":"https://doi.org/10.1109/THS.2010.5655093","url":null,"abstract":"A multimodal biometric system amalgamates the information from multiple biometric sources to alleviate the limitations in performance of each individual biometric system. In this paper a multimodal biometric system employing hand based biometrics (i.e. palmprint, hand veins, and hand geometry) is developed. A general combination approach is proposed for the score level fusion which combines the matching scores from these hand based modalities using t-norms due to Hamacher, Yager, Weber, Schweizer and Sklar. This study aims at exploring the potential usefulness of t-norms for multimodal biometrics. These norms deal with the real challenge of uncertainty and imperfection pervading the different sources of knowledge (scores from different modalities). We construct the membership functions of fuzzy sets formed from the genuine and imposter scores of each of the modalities considered. The fused genuine score and imposter scores are obtained by integrating the fuzzified genuine scores and imposter scores respectively from each of the modalities. These norms are relatively very simple to apply unlike the other methods (example SVM, decision trees, discriminant analysis) as no training or any learning is required here. The proposed approach renders very good performance as it is quite computationally fast and outperforms the score level fusion using the conventional rules (min, max, sum, median) The experimental evaluation on a database of 100 users confirms the effectiveness of score level fusion. The preliminary results are encouraging in terms of decision accuracy and computing efficiency.","PeriodicalId":106557,"journal":{"name":"2010 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124457080","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 35
Information systems management (ISM): Repertoires of collaboration for community warning (CW) and emergency incident response (EIR) 信息系统管理(ISM):社区预警(CW)和紧急事件响应(EIR)的协作库
2010 IEEE International Conference on Technologies for Homeland Security (HST) Pub Date : 2010-12-03 DOI: 10.1109/THS.2010.5655055
D. Bunker
{"title":"Information systems management (ISM): Repertoires of collaboration for community warning (CW) and emergency incident response (EIR)","authors":"D. Bunker","doi":"10.1109/THS.2010.5655055","DOIUrl":"https://doi.org/10.1109/THS.2010.5655055","url":null,"abstract":"Due to the nature of disasters as emergent scenarios involving diverse stakeholders, it is suggested that ESA should consider supplementing their traditional command and control ISM responses with varying repertoires of collaborative action. Collaborative management and integration of information and processes around the organizations, people, systems and ICT infrastructure that support CW & EIR represents a paradigmatic shift in our thinking. This paper firstly defines the areas of focus for ISM in CW & EIR and then examines data collected by the Victorian Bushfires Royal Commission to highlight ISM issues and problems in this scenario that impacted effective collaborative action. This analysis is summarized to focus on lessons learned and make preliminary recommendations in the development of a set of high-level scenario dependent, information and process management improvement guidelines. These recommendations are expressed through the combination of “command and control” structures with suggested “repertoires of collaboration” as well as ISM structural and management improvements and metrics.","PeriodicalId":106557,"journal":{"name":"2010 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116804334","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
PortSec: A port security risk analysis and resource allocation system PortSec:一个港口安全风险分析和资源分配系统
2010 IEEE International Conference on Technologies for Homeland Security (HST) Pub Date : 2010-12-03 DOI: 10.1109/THS.2010.5655048
M. Orosz, Carl Southwell, A. Barrett, Jennifer Chen, Petros A. Ioannou, A. Abadi, I. Maya
{"title":"PortSec: A port security risk analysis and resource allocation system","authors":"M. Orosz, Carl Southwell, A. Barrett, Jennifer Chen, Petros A. Ioannou, A. Abadi, I. Maya","doi":"10.1109/THS.2010.5655048","DOIUrl":"https://doi.org/10.1109/THS.2010.5655048","url":null,"abstract":"Ports are important nodal points that stimulate the US economy. This is particularly true of the Ports of Los Angeles and Long Beach (POLA/LB). Over 40% of all containers shipped to and out of the US flow through this two-port complex. The POLA/LB along with other port complexes face many challenges — including maximizing operational efficiency while simultaneously minimizing risk from catastrophes, including terrorism and other man-made or natural disaster events and minimizing environmental impacts. Often these challenges are at odds with one another — increasing one often comes at the expense of achieving the other. The DHS-funded Center for Risk and Economic Analysis of Terrorism Events (CREATE) is developing a port security risk management and resource allocation system (PortSec). PortSec will support both tactical day-to-day security decision-making and long-term strategic security planning. An initial PortSec prototype (1.0) that supports tactical day-to-day risk assessment and resource allocation is currently undergoing evaluation at POLA/LB.","PeriodicalId":106557,"journal":{"name":"2010 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124044047","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信