2010 IEEE International Conference on Technologies for Homeland Security (HST)最新文献

筛选
英文 中文
Disruption management optimization for defense industrial base systems 国防工业基础系统中断管理优化
2010 IEEE International Conference on Technologies for Homeland Security (HST) Pub Date : 2010-12-03 DOI: 10.1109/THS.2010.5655052
Saheed Hamid, T. Mazucchi, S. Sarkani
{"title":"Disruption management optimization for defense industrial base systems","authors":"Saheed Hamid, T. Mazucchi, S. Sarkani","doi":"10.1109/THS.2010.5655052","DOIUrl":"https://doi.org/10.1109/THS.2010.5655052","url":null,"abstract":"Military supplies have unique functions that are not widely used elsewhere, so there are likely limited producers of these items. In times of war, the usage rate for military materiel increases dramatically and demand follows a non-linear pattern. Whether the items are bullets or tanks, if their production facilities are destroyed or severely damaged by acts of terrorism, natural, or man-made disasters, what recourse would the military have in order to acquire these unique supplies? To mitigate this risk, is it worth the expense and effort to duplicate the capability or it is more advantageous to stockpile unique commodities in case of such disasters? Is it advisable to acquire a temporary or emergency capability, until an indigenous capability can be reconstituted? This paper seeks to develop an optimizing process to answer these logistics and policy questions, using a process similar to the Military Decision Making Process (MDMP).","PeriodicalId":106557,"journal":{"name":"2010 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132671160","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An automatic non-native speaker recognition system 非母语人士自动识别系统
2010 IEEE International Conference on Technologies for Homeland Security (HST) Pub Date : 2010-12-03 DOI: 10.1109/THS.2010.5655088
Bozhao Tan, Qi Li, Robert Foresta
{"title":"An automatic non-native speaker recognition system","authors":"Bozhao Tan, Qi Li, Robert Foresta","doi":"10.1109/THS.2010.5655088","DOIUrl":"https://doi.org/10.1109/THS.2010.5655088","url":null,"abstract":"Identification of non-native personnel is a critical piece of information for making crucial on-the-spot decisions for security purposes. Identification of a non-native speaker is often readily apparent in normal conversation with a native speaker through speech content and accent. Such identification which requires familiarity with language nuances may not be possible for a non-native interrogator or intelligence analyst or when conversing or listening through a machine language translator. Developing an automatic system to identify speakers as native or non-native, as well as their native language, including dialect, within input audio streams, is the major goal of this project. Such a system may be used alone or with other downstream applications such as machine language translation systems. In this paper we present four approaches to identify native and non-native speakers as a binary recognition problem. The approaches can be further categorized into phonetic-based approaches and non-phonetic-based approaches. These approaches were tested on two separate databases, including text-dependent read speech and text-independent spontaneous speech. The results show that our system is competitive in comparison with other published, state-of-the-art non-native speaker recognition systems. Key metrics for automated non-native recognition systems include: 1) positive identification rates, 2) false alarm/identification rates, and 3) length of captured speech sample required to reach a decision.","PeriodicalId":106557,"journal":{"name":"2010 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132942299","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Gamma-insensitive fast neutron detector with spectral source identification potential 具有光谱源识别潜力的伽马不敏感快中子探测器
2010 IEEE International Conference on Technologies for Homeland Security (HST) Pub Date : 2010-12-03 DOI: 10.1109/THS.2010.5654947
R. Chandra, G. Davatz, A. Howard
{"title":"Gamma-insensitive fast neutron detector with spectral source identification potential","authors":"R. Chandra, G. Davatz, A. Howard","doi":"10.1109/THS.2010.5654947","DOIUrl":"https://doi.org/10.1109/THS.2010.5654947","url":null,"abstract":"A neutron scintillation detector based on high-pressure 4He has been developed and tested. The detector responds to elastic scattering of unmoderated fast neutrons, preserving neutron energy, position, and timing information. Neutrons from three different sources, AmBe, 252Cf, and from the ambient background, have been measured with clearly distinct energy spectra. Exposing the detector to different levels of gamma radiation up to 1 mSv/h from a 60Co source has demonstrated that gamma exposure does not affect neutron detection performance within measurement statistics. Applications in the field of radiation portal monitoring are discussed.","PeriodicalId":106557,"journal":{"name":"2010 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134320060","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Automated computation of malware behavior 自动计算恶意软件行为
2010 IEEE International Conference on Technologies for Homeland Security (HST) Pub Date : 2010-12-03 DOI: 10.1109/THS.2010.5655085
R. Linger, M. Pleszkoch, Kirk Sayre, Timothy Daly
{"title":"Automated computation of malware behavior","authors":"R. Linger, M. Pleszkoch, Kirk Sayre, Timothy Daly","doi":"10.1109/THS.2010.5655085","DOIUrl":"https://doi.org/10.1109/THS.2010.5655085","url":null,"abstract":"Automated software behavior computation is an emerging technology under development at the Software Engineering Institute that can be applied to analysis of malicious code. Behavior computation is based on the semantics of programming language instructions and the opportunity to compose them to determine net effects of programs. An initial implementation is targeted to malicious code expressed in Intel assembly language.","PeriodicalId":106557,"journal":{"name":"2010 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133143122","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A comparison of experimental and modeled results of an active millimeter wave inverse synthetic aperture radar system used to perform standoff detection of person-borne improvised explosive devices 有源毫米波逆合成孔径雷达系统对人载简易爆炸装置进行对峙探测的实验与仿真结果比较
2010 IEEE International Conference on Technologies for Homeland Security (HST) Pub Date : 2010-12-03 DOI: 10.1109/THS.2010.5654952
J. Fernandes, R. Obermeier, M. Hagelen, J. Martinez-Lorenzo, C. Rappaport
{"title":"A comparison of experimental and modeled results of an active millimeter wave inverse synthetic aperture radar system used to perform standoff detection of person-borne improvised explosive devices","authors":"J. Fernandes, R. Obermeier, M. Hagelen, J. Martinez-Lorenzo, C. Rappaport","doi":"10.1109/THS.2010.5654952","DOIUrl":"https://doi.org/10.1109/THS.2010.5654952","url":null,"abstract":"With the recent rise in casualties resulting from person-borne improvised explosive devices (PBIEDs) or ”suicide bombers,” there is an urgent need for standoff detection of such threats. An optimum system that fulfills the requirements of standoff detection must be portable, low cost, and have a high probability of detection with low probability of false alarm at a distance of at least 20 meters. Currently there are a variety of modalities being researched to perform standoff detection of PBIED's including: backscatter X-ray imaging, infrared imaging, optical detection, terahertz imaging, video analytics, and millimeter-wave (MMW) imaging. MMW imaging at 94 GHz is a very good modality for performing standoff detection of PBIEDs. MMWs can propagate through the atmosphere and clothing with very little attenuation, while at the same time do not cause damage to human skin tissue. A mono-static linear frequency modulated continuous wave (LFMCW) circular inverse synthetic aperture radar (ISAR) system has been developed and tested. A model of such a system using a two dimensional full wave analysis based on the finite difference method in the frequency domain has been developed and compared with results of the experimental system. Using a two dimensional matched filtering technique in the frequency domain, simulated images have been used as a means of performing target detection and classification. The imaging results of both simulated and experimentally obtained data is presented in this paper. Initial results using the 2D matched filtering target classification technique will also be presented.","PeriodicalId":106557,"journal":{"name":"2010 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130037954","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Cryptkeeper: Improving security with encrypted RAM Cryptkeeper:通过加密RAM提高安全性
2010 IEEE International Conference on Technologies for Homeland Security (HST) Pub Date : 2010-12-03 DOI: 10.1109/THS.2010.5655081
P. Peterson
{"title":"Cryptkeeper: Improving security with encrypted RAM","authors":"P. Peterson","doi":"10.1109/THS.2010.5655081","DOIUrl":"https://doi.org/10.1109/THS.2010.5655081","url":null,"abstract":"Random Access Memory (RAM) was recently shown to be vulnerable to physical attacks exposing the totality of memory, including user data and encryption keys. We present Cryptkeeper, a novel software-encrypted virtual memory manager that mitigates data exposure when used with a secure key-hiding mechanism. Cryptkeeper significantly reduces the amount of cleartext data in memory by dividing RAM into a smaller, cleartext working set and a larger, encrypted area. This extends the standard memory model and provides encrypted swap as a side effect. Despite a 9x slowdown in pathological cases, target applications such as Firefox are only 9% slower with our Linux-based prototype. We also identify several optimizations which can significantly improve performance. Cryptkeeper enables the expression of new security policies for memory, and demonstrates that modern personal computers can perform heavy-duty work on behalf of operating systems with surprisingly low overhead.","PeriodicalId":106557,"journal":{"name":"2010 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"598 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115106196","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 57
Location and identification of radioactive material with the GRETA (Gamma-Ray Experimental Telescope Assembly) 伽玛射线实验望远镜组件对放射性物质的定位和识别
2010 IEEE International Conference on Technologies for Homeland Security (HST) Pub Date : 2010-12-03 DOI: 10.1109/THS.2010.5654944
Joshua R. Wood, J. Legere, M. McConnell, J. Ryan
{"title":"Location and identification of radioactive material with the GRETA (Gamma-Ray Experimental Telescope Assembly)","authors":"Joshua R. Wood, J. Legere, M. McConnell, J. Ryan","doi":"10.1109/THS.2010.5654944","DOIUrl":"https://doi.org/10.1109/THS.2010.5654944","url":null,"abstract":"We previously reported Compton imaging measurements of 137Cs and 60Co laboratory sources using the full 15-channel readout of the Gamma-Ray Experimental Telescope Assembly (GRETA). We have since modified the detector geometry to accommodate a wider range of Compton scattering angles and implemented a neural networking method for the location of interaction positions with a 3-cm resolution inside the detector volumes. This paper describes the implementation of the neural networking method and culminates in the imaging of 137Cs, 60Co, and 252Cf sources using this technique.","PeriodicalId":106557,"journal":{"name":"2010 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128502393","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An imaging neutron spectrometer 成像中子谱仪
2010 IEEE International Conference on Technologies for Homeland Security (HST) Pub Date : 2010-12-03 DOI: 10.1109/THS.2010.5654943
J. Ryan, C. Bancroft, P. Bloser, U. Bravar, C. Frost, M. McConnell, J. Legere, Joshua R. Wood, R. Woolf, D. Fourguette, L. Larocque, Jane C. Pavlich, G. Ritter, Gregory J. Wassick
{"title":"An imaging neutron spectrometer","authors":"J. Ryan, C. Bancroft, P. Bloser, U. Bravar, C. Frost, M. McConnell, J. Legere, Joshua R. Wood, R. Woolf, D. Fourguette, L. Larocque, Jane C. Pavlich, G. Ritter, Gregory J. Wassick","doi":"10.1109/THS.2010.5654943","DOIUrl":"https://doi.org/10.1109/THS.2010.5654943","url":null,"abstract":"We have developed, fabricated and tested a prototype imaging neutron spectrometer designed for real-time neutron source location and identification. Real-time detection and identification is important for locating materials. These materials, specifically uranium and transuranics, emit neutrons via spontaneous or induced fission. Unlike other forms of radiation (e.g. gamma rays), penetrating neutron emission is very uncommon. The instrument detects these neutrons, constructs images of the emission pattern, and reports the neutron spectrum. The device will be useful for security and proliferation deterrence, as well as for nuclear waste characterization and monitoring. The instrument is optimized for imaging and spectroscopy in the 1–20 MeV range. The detection principle is based upon multiple elastic neutron-proton scatters in organic scintillator. Two detector panel layers are utilized. By measuring the recoil proton and scattered neutron locations and energies, the direction and energy spectrum of the incident neutrons can be determined and discrete and extended sources identified. Event reconstruction yields an image of the source and its location. The hardware is low power, low mass, and rugged. Its modular design allows the user to combine multiple units for increased sensitivity. We will report the results of laboratory testing of the instrument, including exposure to a calibrated Cf-252 source. Instrument parameters include energy and angular resolution, gamma rejection, minimum source identification distances and times, and projected effective area for a fully populated instrument.","PeriodicalId":106557,"journal":{"name":"2010 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134157143","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Improving supply chain robustness and preventing counterfeiting through authenticated product labels 通过认证的产品标签提高供应链的稳健性和防止假冒
2010 IEEE International Conference on Technologies for Homeland Security (HST) Pub Date : 2010-12-03 DOI: 10.1109/THS.2010.5655097
Vivek Pathak
{"title":"Improving supply chain robustness and preventing counterfeiting through authenticated product labels","authors":"Vivek Pathak","doi":"10.1109/THS.2010.5655097","DOIUrl":"https://doi.org/10.1109/THS.2010.5655097","url":null,"abstract":"Counterfeiting is a serious problem impacting customers and producers in the global economy. We design authenticated product labels (APL), a cryptography based practical counterfeit detection method. Our solution can be used by customers, distributors, and law enforcement alike. APLs not only detects counterfeit goods, but also deters counterfeiting by provably pinpointing its source in the supply chain. Counterfeiting is a serious problem impacting customers and producers in the global economy. We design authenticated product labels (APL), a cryptography based practical counterfeit detection method. Our solution can be used by customers, distributors, and law enforcement alike. APLs not only detects counterfeit goods, but also deters counterfeiting by provably pinpointing its source in the supply chain.","PeriodicalId":106557,"journal":{"name":"2010 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133168693","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
System of systems analysis of catastrophic events: A preliminary investigation of unprecedented scenarios 灾难性事件的系统分析系统:对前所未有的情景的初步调查
2010 IEEE International Conference on Technologies for Homeland Security (HST) Pub Date : 2010-12-03 DOI: 10.1109/THS.2010.5654962
L. Levine, Carol Woody
{"title":"System of systems analysis of catastrophic events: A preliminary investigation of unprecedented scenarios","authors":"L. Levine, Carol Woody","doi":"10.1109/THS.2010.5654962","DOIUrl":"https://doi.org/10.1109/THS.2010.5654962","url":null,"abstract":"When catastrophes occur, what key dynamics take place? How do these dynamics affect our technical infrastructure, and how can we understand these patterns of failure in order to better build and operate future technologies and systems of systems? What happens when catastrophes are unprecedented and the known range of emergency response activities is ineffective? This research analyzes multiple catastrophes, viewed through designated lenses, with consideration of how systems of systems fail, as well as the implications for future systems of systems. In this phase we studied two cases, Hurricane Katrina and 9/11, representing threats from natural forces and terrorism. The lens used is the Generic Error Modeling System (GEMS). The GEMS framework helps us to understand types of errors that occur in operational situations and distinguishes among skill-, rule-, and knowledge-based modes. We report on key findings in three areas: (1) the problematic role that technology plays given its fragility and dominance, (2) a coordination and centralization effect, and (3) the failure to consider failure.","PeriodicalId":106557,"journal":{"name":"2010 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125975251","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信