Christina M. Rudzinski, D. Masters, A. Buck, Martha Wall, David Tremblay, E. Wack
{"title":"Screening maritime shipping containers for weapons of mass destruction","authors":"Christina M. Rudzinski, D. Masters, A. Buck, Martha Wall, David Tremblay, E. Wack","doi":"10.1109/WSSC.2010.5730279","DOIUrl":"https://doi.org/10.1109/WSSC.2010.5730279","url":null,"abstract":"Tens of millions of shipping containers enter U.S. seaports every year carrying commerce surpassing 1.5 trillion dollars in value. As a result, the maritime shipping industry offers an attractive channel for terrorist organizations to smuggle weapons of mass destruction into the U.S., or to cripple the U.S. economy by directly attacking major ports and maritime infrastructure. In order to prevent such an event from occurring, the Department of Homeland Security has initiated the SAFECON and TRUST programs aimed at improving security measures to detect anomalous goods such as these threats in container air. These programs are working to develop aggressive solutions that minimize any disruption to the flow of commerce by identifying or developing airsample based sensors that can be installed on port gantry cranes or housed within shipping containers themselves. This paper describes the DHS Container Security Test Bed that is being established at the Transportation Security Laboratory to enable realistic evaluation of technologies against real operational challenges. Information highlighting many of these challenges including the concentrations and movement of threat simulants inside containers, background clutter, operational environment, and air sampling capabilities will be presented. This information and the additional data that is being collected at the test bed will allow us to derive sensor and operational requirements and enable the intelligent design and selection of critical technologies.","PeriodicalId":106557,"journal":{"name":"2010 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128857829","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Nathaniel Boggs, Sharath Hiremagalore, A. Stavrou, S. Stolfo
{"title":"Experimental results of cross-site exchange of web content Anomaly Detector alerts","authors":"Nathaniel Boggs, Sharath Hiremagalore, A. Stavrou, S. Stolfo","doi":"10.1109/THS.2010.5655103","DOIUrl":"https://doi.org/10.1109/THS.2010.5655103","url":null,"abstract":"We present our initial experimental findings from the collaborative deployment of network Anomaly Detection (AD) sensors. Our system examines the ingress http traffic and correlates AD alerts from two administratively disjoint domains: Columbia University and George Mason University. We show that, by exchanging packet content alerts between the two sites, we can achieve zero-day attack detection capabilities with a relatively small number of false positives. Furthermore, we empirically demonstrate that the vast majority of common abnormal data represent attack vectors rather than false positives. We posit that cross-site collaboration enables the automated detection of common abnormal data which are likely to ferret out zero-day attacks with high accuracy and minimal human intervention.","PeriodicalId":106557,"journal":{"name":"2010 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130193075","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Dion, G. Denolfo, S. Hunter, S. Son, N. Guardala
{"title":"Neutron Imaging Camera","authors":"M. Dion, G. Denolfo, S. Hunter, S. Son, N. Guardala","doi":"10.1117/12.777167","DOIUrl":"https://doi.org/10.1117/12.777167","url":null,"abstract":"We describe the Neutron Imaging Camera (NIC) being developed for the detection of special nuclear materials by NASA/GSFC and NSWC/Carderock. The NIC is a self-contained, robust, omni-directional and 3He-independent neutron detector based on the Three-Dimensional Track Imager (3-DTI) technology developed at GSFC for gamma-ray astrophysics applications. The 3-DTI is a large volume time-projection chamber that provides ∼ 0.4 mm resolution for the 3-D tracking of a charged particle. The incident direction of fast neutrons, 0.1 MeV < En < 10 MeV, are reconstructed from the momenta and energies of protons resulting from single and double scatters on methane (CH4). We present angular and energy resolution of the NIC derived from laboratory and accelerator testing.","PeriodicalId":106557,"journal":{"name":"2010 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122666664","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Israel Soibelman, Leader, R. Cunningham, Joseph Biondi, Howard A. Schmidt, Christopher Doyle, E. Starnes, Walker, Robert Griffin, T. A. Cellucci, Richard J Driggers, Track Speaker, Peter Fonash, Leslee Shumway, F. Molinet, R. Cunningham, Joseph Biondi, G. Larocque, Bob Alongi, Karen Krause, M. Chair, Cyber Security, Bob Hutchinson, J. Picciotto, W. Tirenin, Z. Tudor, M. Sri, Lincoln Zhivich, Laboratory, Stanley Pau, David Taylor, J. Contestabile, D. Schrader, A. Vidan, Lincoln Laboratory, K. Warren, L. Yang, R. Moro, Raytheon Rod Kunz, J. Oxley, K. Yasuda, Raytheon
{"title":"Westin hotel room layout","authors":"Israel Soibelman, Leader, R. Cunningham, Joseph Biondi, Howard A. Schmidt, Christopher Doyle, E. Starnes, Walker, Robert Griffin, T. A. Cellucci, Richard J Driggers, Track Speaker, Peter Fonash, Leslee Shumway, F. Molinet, R. Cunningham, Joseph Biondi, G. Larocque, Bob Alongi, Karen Krause, M. Chair, Cyber Security, Bob Hutchinson, J. Picciotto, W. Tirenin, Z. Tudor, M. Sri, Lincoln Zhivich, Laboratory, Stanley Pau, David Taylor, J. Contestabile, D. Schrader, A. Vidan, Lincoln Laboratory, K. Warren, L. Yang, R. Moro, Raytheon Rod Kunz, J. Oxley, K. Yasuda, Raytheon","doi":"10.1109/ths.2011.6107835","DOIUrl":"https://doi.org/10.1109/ths.2011.6107835","url":null,"abstract":"On behalf of the Boston Section of the IEEE, welcome to the tenth Conference on Homeland Security Technologies. I believe that the conference Steering Committee has assembled a very interesting and relevant program which will provide perspective on the current state of the art and recent advances to address homeland security concerns. It is hard to overemphasize the importance of the topics in this conference which include the core technologies to protect our homeland against such threats as weapons of mass destruction or attacks on critical or key infrastructure, potential attacks against our cyber infrastructure, the protection of our borders and the preparation, recovery and response to natural disasters. In this context, the conference includes a broad range of peer reviewed papers that address critical challenges. A new track this year addresses business development and user experience in the area of homeland security. We also welcome, for the first time, the participation of the U.S. Naval Postgraduate School who will work with the authors of selected best papers to publish them in their Homeland Security Affairs journal. I think that the topics and speakers cover a highly relevant range of material and that this conference is a unique forum that will bring together government, industry and academia to share ideas on these critical topics. I also wish to acknowledge the substantial efforts of the IEEE and, in particular, the Bos-ton office in making this event a reality. Special recognition is also due to Mr. Lennart Long for his sustained leadership in this conference over the last several years. On behalf of the Boston Section of the IEEE and the entire HST 2010 technical committee , we want to introduce the exciting program that we have developed for you, and to tell you about some new developments. In this, the tenth year of the Conference on Homeland Security Technologies, we have made a few changes we hope will build on and improve the quality of what was already a strong program. We recognize that one of the unusual and valuable aspects of HST is how it brings together users, researchers, and members of the business and industrial communities. We realize that it is critical to maintain this rare, interdisciplinary blend. We know that at-tendees from many backgrounds come to learn about the state of the art and recent advances. Some attendees come to deepen their understanding of their own field, and …","PeriodicalId":106557,"journal":{"name":"2010 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"97 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116900709","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}