2010 IEEE International Conference on Technologies for Homeland Security (HST)最新文献

筛选
英文 中文
A framework for supplier-supply chain risk management: Tradespace factors to achieve risk reduction — Return on investment 供应商-供应链风险管理框架:降低风险的贸易空间因素-投资回报
2010 IEEE International Conference on Technologies for Homeland Security (HST) Pub Date : 2010-12-03 DOI: 10.1109/THS.2010.5655102
Serena Chan, Gregory N. Larsen
{"title":"A framework for supplier-supply chain risk management: Tradespace factors to achieve risk reduction — Return on investment","authors":"Serena Chan, Gregory N. Larsen","doi":"10.1109/THS.2010.5655102","DOIUrl":"https://doi.org/10.1109/THS.2010.5655102","url":null,"abstract":"The growing trend in information and communications technology (ICT) globalization and outsourcing provides opportunities for adversaries to attack the supply chains of critical information systems and networks in order to gain unauthorized access to data, alter data, disrupt operations, or interrupt communications by inserting malicious code into or otherwise corrupting components; or to obtain knowledge of the uses and users of systems. A challenging issue is the ability to assure that articles of supply and the suppliers can be trusted to do only that which is expected or specified and to do so reliably and dependably. This paper describes a framework for discovering, defining, learning, and establishing capabilities to manage the risks of suppliers and supply chains of ICT.","PeriodicalId":106557,"journal":{"name":"2010 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"109 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134474443","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Energy aware routing algorithm for WSN applications in border surveillance 边界监控中无线传感器网络的能量感知路由算法
2010 IEEE International Conference on Technologies for Homeland Security (HST) Pub Date : 2010-12-03 DOI: 10.1109/THS.2010.5654979
Yuping Dong, Hwa Chang, Zhongjian Zou, Sai Tang
{"title":"Energy aware routing algorithm for WSN applications in border surveillance","authors":"Yuping Dong, Hwa Chang, Zhongjian Zou, Sai Tang","doi":"10.1109/THS.2010.5654979","DOIUrl":"https://doi.org/10.1109/THS.2010.5654979","url":null,"abstract":"Wireless Sensor Networks (WSNs) are widely used in various applications for tracking or surveillance purposes. Border security monitoring and terrorist attack prevention are just two of many crucial homeland security applications which rely upon WSN technologies. In these applications, a great amount of sensors powered by batteries are deployed in a particular region. They detect events, process and relay data to the sink node at the base station. Power conservation is critical to these sensors. In this paper, we propose a routing algorithm which separates the sensor nodes to several scheduling sets and keeps track of the energy level of each sensor. This algorithm balances power consumption among sensors, and therefore prolongs the network lifetime. Simulation results verify that our algorithm outperforms the EECCR algorithm proposed in [1].","PeriodicalId":106557,"journal":{"name":"2010 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"370 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134322114","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
MEMS-based gravimetric sensors for explosives detection 基于mems的爆炸物探测重力传感器
2010 IEEE International Conference on Technologies for Homeland Security (HST) Pub Date : 2010-12-03 DOI: 10.1109/THS.2010.5655033
R. Mlcak, D. Doppalapudi, Paul Pyzowski, P. Gwynne, Scott Purchase, Jeffrey Bridgham, Gerald Schultz, M. Skelton, David Pelletier, H. Tuller
{"title":"MEMS-based gravimetric sensors for explosives detection","authors":"R. Mlcak, D. Doppalapudi, Paul Pyzowski, P. Gwynne, Scott Purchase, Jeffrey Bridgham, Gerald Schultz, M. Skelton, David Pelletier, H. Tuller","doi":"10.1109/THS.2010.5655033","DOIUrl":"https://doi.org/10.1109/THS.2010.5655033","url":null,"abstract":"A compact, rapid system for trace detection of explosives using MEMS-bases resonant structures is described. Various software algorithms are used to eliminate problems in previous implementations of array-based detectors. Results for detection of trace levels of explosives and other threat agents are given.","PeriodicalId":106557,"journal":{"name":"2010 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115430688","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Risks of unrecognized commonalities in information technology supply chains 信息技术供应链中未识别共性的风险
2010 IEEE International Conference on Technologies for Homeland Security (HST) Pub Date : 2010-12-03 DOI: 10.1109/THS.2010.5654970
C. Axelrod, Ph. D. Delta
{"title":"Risks of unrecognized commonalities in information technology supply chains","authors":"C. Axelrod, Ph. D. Delta","doi":"10.1109/THS.2010.5654970","DOIUrl":"https://doi.org/10.1109/THS.2010.5654970","url":null,"abstract":"In this paper we examine the interdependencies and common points of failure (and attack) that plague commonly-used system and network hardware and software. The proposed approach requires not only generating inventories of acquiring organizations' equipment and software products, and clear and detailed descriptions of every link in the supply chain, but also the identification of common components and their sources. This information is required not only for manufacturer and OEM supply chains, but also for the services supply chains of maintenance and repair organizations. When such critical components and services have been identified, one must prioritize their importance and apply appropriate security and testing. Such an identification and tracking system is only as good as its ability to incorporate up-to-the-minute changes and additions. This requires extensive real-time reporting and information sharing. The author presents a general description of a proprietary tool that facilitates the collaboration needed for such an approach to be effective.","PeriodicalId":106557,"journal":{"name":"2010 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114937403","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A geospatial integrated problem solving environment for Homeland Security applications 国土安全应用的地理空间集成问题解决环境
2010 IEEE International Conference on Technologies for Homeland Security (HST) Pub Date : 2010-12-03 DOI: 10.1109/THS.2010.5655060
D. Koch
{"title":"A geospatial integrated problem solving environment for Homeland Security applications","authors":"D. Koch","doi":"10.1109/THS.2010.5655060","DOIUrl":"https://doi.org/10.1109/THS.2010.5655060","url":null,"abstract":"Effective planning, response, and recovery (PRR) involving terrorist attacks or natural disasters come with a vast array of information needs. Much of the required information originates from disparate sources in widely differing formats. However, one common attribute the information often possesses is physical location. The organization and visualization of this information can be critical to the success of the PRR mission. Organizing information geospatially is often the most intuitive for the user. In the course of developing a field tool for the U.S. Department of Homeland Security (DHS) Office for Bombing Prevention, a geospatial integrated problem solving environment software framework was developed by Oak Ridge National Laboratory. This framework has proven useful as well in a number of other DHS, Department of Defense, and Department of Energy projects. An overview of the software architecture along with application examples are presented.","PeriodicalId":106557,"journal":{"name":"2010 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"192 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128850660","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Conceptual design of a nuclear material detection system based on the neutron / gamma-ray hybrid approach 基于中子/伽马射线混合方法的核材料探测系统的概念设计
2010 IEEE International Conference on Technologies for Homeland Security (HST) Pub Date : 2010-12-03 DOI: 10.1109/THS.2010.5654977
H. Ohgaki, T. Kii, K. Masuda, T. Misawa, C. Pyeon, R. Hajima, T. Hayakawa, T. Shizuma, K. Kawase, M. Kando, H. Toyokawa
{"title":"Conceptual design of a nuclear material detection system based on the neutron / gamma-ray hybrid approach","authors":"H. Ohgaki, T. Kii, K. Masuda, T. Misawa, C. Pyeon, R. Hajima, T. Hayakawa, T. Shizuma, K. Kawase, M. Kando, H. Toyokawa","doi":"10.1109/THS.2010.5654977","DOIUrl":"https://doi.org/10.1109/THS.2010.5654977","url":null,"abstract":"A nuclear material detection system based on neutron / gamma-ray hybrid approach has been proposed for the container inspection at the sea port. The neutron from the inertial electrostatic confinement fusion source will be used for a fast pre-screening process. The quasi-monochromatic gamma-ray beam from the laser Compton Backscattering source will be used for an isotope identification for the precise inspection. Nuclear resonance fluorescence method will be employed for the isotope identification because of its high selectivity and high penetration for the shielding.","PeriodicalId":106557,"journal":{"name":"2010 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124566422","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
A handheld active millimeter wave camera 手持有源毫米波相机
2010 IEEE International Conference on Technologies for Homeland Security (HST) Pub Date : 2010-12-03 DOI: 10.1109/THS.2010.5655040
C. Adams, D. Holbrook, Robert Sengsten
{"title":"A handheld active millimeter wave camera","authors":"C. Adams, D. Holbrook, Robert Sengsten","doi":"10.1109/THS.2010.5655040","DOIUrl":"https://doi.org/10.1109/THS.2010.5655040","url":null,"abstract":"A microwave imaging technology is described where large area diffraction limited images are created by a small, low cost, low power, handheld device. The camera actively illuminates targets with a circularly polarized scanning confocal spot beam. Backscattered radiation is collected to form an image on an LCD screen. The camera is configured to image behind walls and other flat surfaces. A set of encoded omni-wheels track camera position so that a 2500mm × 1700mm image may be stitched together. Operating in the 24GHz ISM band, the camera is approximately 6” diameter and 8.5” tall. At this size we believe it enables a broad range of new inspection tasks.","PeriodicalId":106557,"journal":{"name":"2010 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"94 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124582777","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Risk-informed assessment of regional preparedness 对区域准备进行风险知情评估
2010 IEEE International Conference on Technologies for Homeland Security (HST) Pub Date : 2010-12-03 DOI: 10.1109/THS.2010.5655049
K. Crowther
{"title":"Risk-informed assessment of regional preparedness","authors":"K. Crowther","doi":"10.1109/THS.2010.5655049","DOIUrl":"https://doi.org/10.1109/THS.2010.5655049","url":null,"abstract":"Risk-informed and sustainable preparedness of our nation's regions and localities is central to the safety and security of the United States. The first step to technology development for preparedness is clear requirements and correct methodologies. This paper presents methods for creating regional homeland security plans to ensure continuity of regional operations. First, regional preparedness strategy should focus on a region's vital socioeconomic interests. These industries can be identified through the application of key sector analysis methods that exploit large-scale and open-source databases reporting economic sector production and interdependence. Second, planning for regional preparedness should follow two complementary approaches focusing on catastrophic scenario-driven planning as well as all-hazards capabilities. Third, regional preparedness strategy should exploit existing organizations and preparedness governance structure. Most existing regional preparedness institutions organize around the concept of emergency support functions (ESFs). Defining the relationships between ESFs and critical infrastructure sectors will enable these existing organizations to broaden their mission to adopt more holistic preparedness planning and homeland security practices, and provide a foundation technology. This paper provides preliminary results from case studies in Virginia to illustrate each of these methods.","PeriodicalId":106557,"journal":{"name":"2010 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134299583","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Supply chain risk mitigation for IT electronics IT电子产品的供应链风险缓解
2010 IEEE International Conference on Technologies for Homeland Security (HST) Pub Date : 2010-12-03 DOI: 10.1109/THS.2010.5655094
F. McFadden, Richard D. Arnold
{"title":"Supply chain risk mitigation for IT electronics","authors":"F. McFadden, Richard D. Arnold","doi":"10.1109/THS.2010.5655094","DOIUrl":"https://doi.org/10.1109/THS.2010.5655094","url":null,"abstract":"Supply Chain Risk Management (SCRM) is one of the 12 Comprehensive National Cybersecurity Inititiatives (CNCI), but the range of supply chain problems has not been defined rigorously, and effective defenses have not yet been developed. Risks range from the increased unreliability of counterfeits to data exfiltration and adversary control enabled by hardware Trojan horses embedded in chips. Risks are different for military vs. non-military Government vs. civilian organizations. We cite cases that underscore the reality of supply chain risk, and analyze the structure of supply chains that affect different part of the market for IT electronics, in order to provide a better understanding of attack methods. We discuss techniques for defending against the range of threats, and propose a practical solution based on a suite of simple, inexpensive test procedures that could be used to build an \"80% solution\" for detection of counterfeits and embedded malicious implants before they are deployed. Tests we have prototyped include power signatures and of IR thermographic signatures of boot events. Deployment of such a test suite would change the SCRM game by making it significantly more difficult for supply chain exploits to succeed.","PeriodicalId":106557,"journal":{"name":"2010 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131295851","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 31
Information sharing infrastructure for pharmaceutical supply chain management in emergency response 应急药品供应链管理的信息共享基础设施
2010 IEEE International Conference on Technologies for Homeland Security (HST) Pub Date : 2010-12-03 DOI: 10.1109/THS.2010.5655099
V. Atluri, Basit Shafiq, Jaideep Vaidya, Soon Ae Chun, Ghulam Nabi, Michael Trocchia, Nabil Adam, Christopher Doyle, Lawrence E Skelly
{"title":"Information sharing infrastructure for pharmaceutical supply chain management in emergency response","authors":"V. Atluri, Basit Shafiq, Jaideep Vaidya, Soon Ae Chun, Ghulam Nabi, Michael Trocchia, Nabil Adam, Christopher Doyle, Lawrence E Skelly","doi":"10.1109/THS.2010.5655099","DOIUrl":"https://doi.org/10.1109/THS.2010.5655099","url":null,"abstract":"For an effective and timely acquisition, deployment, and distribution of needed drugs in emergencies, it is crucial to provide the end-to-end visibility of the pharmaceutical supply chain (PSC) to the involved parties. Recently, the Science and Technology Directorate of the U.S. Department of Homeland Security has developed a standard-based framework for maintaining and sharing of the emergency data, called Unified Incident Command Decision Support (UICDS). UICDS provides an infrastructure for information sharing among the disparate organizations responding to an emergency. In this paper, we leverage the UICDS infrastructure, and extend it to enable information sharing for pharmaceutical supply chain management in emergency response.","PeriodicalId":106557,"journal":{"name":"2010 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"151 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123408464","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信