Proceedings. Institute of Electrical and Electronics Engineers 1988 International Carnahan Conference on Security Technology, Crime Countermeasures最新文献

筛选
英文 中文
Development of a robotic security vehicle for exterior environments 开发用于外部环境的机器人安全车辆
P. Klarer, R. M. Workhoven
{"title":"Development of a robotic security vehicle for exterior environments","authors":"P. Klarer, R. M. Workhoven","doi":"10.1109/CCST.1988.75979","DOIUrl":"https://doi.org/10.1109/CCST.1988.75979","url":null,"abstract":"Sandia National Laboratories is developing a robotic vehicle capable of performing limited security functions autonomously in a structured exterior environment. Efforts to apply the navigation algorithms, originally developed for the Sandia Interior Robot, to a testbed vehicle more appropriate for an outdoor environment are described. The immediate goal is a full-scale demonstration of autonomous navigation capabilities on routine patrol and teleoperation by a human operator for alarm assessment and response. The discussion covers the vehicle itself, the command driving station, adapting the vehicle to the facility where it might be assigned and the missions that it would be expected to perform. The hardware and software are also described.<<ETX>>","PeriodicalId":129971,"journal":{"name":"Proceedings. Institute of Electrical and Electronics Engineers 1988 International Carnahan Conference on Security Technology, Crime Countermeasures","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1988-10-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130636745","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The CAIN II access-control system CAIN II访问控制系统
R. P. Rumble, D.Y. Jong, S.M. Kluz
{"title":"The CAIN II access-control system","authors":"R. P. Rumble, D.Y. Jong, S.M. Kluz","doi":"10.1109/CCST.1988.76001","DOIUrl":"https://doi.org/10.1109/CCST.1988.76001","url":null,"abstract":"A description is given of the access-control system that is being built at the Lawrence Livermore National Laboratory. Called the Controlled Access by Individual Number, Phase II (CAIN II) project, it is part of the Safeguards and Security Enhancements-Phase I (SSE-1) line item. Under normal circumstances, the CAIN II system operates without human intervention. The CAIN II system consists of three major subsystems: (1) the CAIN II main computer (CMC) subsystem-four DEC model 8250 VAX computers, connected in a cluster; (2) the front-end processor (FEP) subsystem-Micro VAX II computers driving communications servers; and (3) the entry control device (ECD) subsystem-the actual equipment that controls personnel access. There are four types of entry-control devices: booths, single-door portals, staffed badge-readers, and sally ports. Several hundred entry-control devices can be connected to the access-control system. Each entry-control device contains the entire list of persons permitted to enter its controlled area and can make the go/no-go decision about passage on its own.<<ETX>>","PeriodicalId":129971,"journal":{"name":"Proceedings. Institute of Electrical and Electronics Engineers 1988 International Carnahan Conference on Security Technology, Crime Countermeasures","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1988-10-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131138725","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Software and hardware bypass of customer-owned pay telephones 客户自有付费电话的软硬件绕过
M. W. Tobias
{"title":"Software and hardware bypass of customer-owned pay telephones","authors":"M. W. Tobias","doi":"10.1109/CCST.1988.75992","DOIUrl":"https://doi.org/10.1109/CCST.1988.75992","url":null,"abstract":"Over 100000 private pay telephones are in operation throughout the US. Improper or inadequate hardware and software design have contributed to significant losses through bypass of internal circuitry and functions. The author summarizes the problems associated with design defects in the customer-owned coin-operated telephone. He also discusses how to prevent fraudulent loss.<<ETX>>","PeriodicalId":129971,"journal":{"name":"Proceedings. Institute of Electrical and Electronics Engineers 1988 International Carnahan Conference on Security Technology, Crime Countermeasures","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1988-10-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134628304","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Communication privacy: a low cost digital approach 通信隐私:一种低成本的数字化方法
C. House
{"title":"Communication privacy: a low cost digital approach","authors":"C. House","doi":"10.1109/CCST.1988.75988","DOIUrl":"https://doi.org/10.1109/CCST.1988.75988","url":null,"abstract":"Support is demonstrated for an analog/digital system that can be scrambled while in digital form and may or may not transmit the key work for algorithm decoding. Multichannel audio and data communication is considered. In addition to digital audio and pulse code modulation concepts, frequency shift keying, frequency division multiplexing, and quadrature phase modulation are discussed. Both practical and cost aspects are considered. Commercially available integrated parts were used in the empirical work to achieve communication privacy at a low cost.<<ETX>>","PeriodicalId":129971,"journal":{"name":"Proceedings. Institute of Electrical and Electronics Engineers 1988 International Carnahan Conference on Security Technology, Crime Countermeasures","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1988-10-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121841314","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Security upgrades at the Lawrence Livermore National Laboratory 劳伦斯利弗莫尔国家实验室的安全升级
E. Behrin
{"title":"Security upgrades at the Lawrence Livermore National Laboratory","authors":"E. Behrin","doi":"10.1109/CCST.1988.76000","DOIUrl":"https://doi.org/10.1109/CCST.1988.76000","url":null,"abstract":"Major upgrades to the physical security systems of Lawrence Livermore National Laboratory are in the form of two integrated multiyear projects: SSE-1 (Safeguards and Security Enhancements-Phase I) is a five-year effort that started in late 1984; the second five-year phase, SSE-2, began in 1986. SSE-1 upgrades obsolete operating systems and constructs the facilities needed to house the equipment. Its subprojects replace the existing alarm system, automate access-control functions, restructure security command and control, upgrade the security radio network, modernize nuclear materials accountability, construct two communications centers, and add perimeter-security features. SSE-2 consolidates and protects operations involving special nuclear materials in an area called the Superblock, as well as improving the lab-wide physical security system. SSE-2 subprojects add perimeter protection to the Superblock, construct processing facilities for special nuclear materials, construct an office complex with a secondary command and control center, build security training and housing facilities, and improve roads, fencing, and lighting.<<ETX>>","PeriodicalId":129971,"journal":{"name":"Proceedings. Institute of Electrical and Electronics Engineers 1988 International Carnahan Conference on Security Technology, Crime Countermeasures","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1988-10-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129801271","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Security of network element databases against increasing threats of intrusion via operations interfaces 网元数据库的安全性,防止日益增加的通过操作接口入侵的威胁
R. Bhattacharyya
{"title":"Security of network element databases against increasing threats of intrusion via operations interfaces","authors":"R. Bhattacharyya","doi":"10.1109/CCST.1988.75989","DOIUrl":"https://doi.org/10.1109/CCST.1988.75989","url":null,"abstract":"A security strategy is presented to protect the operations database of a network element (NE) of a telecommunications network from unauthorized access and/or unauthorized transactions. With the advent of technology, and increased control of networks and service features by customers, it is expected that the NE operations database will become increasingly accessible to third-party service providers, large-business customers, and even small-business and residential customers. This, in turn, will increase the security risk to the NE database and force NE manufacturers to consider introducing features to enhance the database security. The author discusses some of these security threats and proposes the introduction of NE features that could reduct such threats.<<ETX>>","PeriodicalId":129971,"journal":{"name":"Proceedings. Institute of Electrical and Electronics Engineers 1988 International Carnahan Conference on Security Technology, Crime Countermeasures","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1988-10-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124424197","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Adaptive real-time training strategies for a trainable multi-sensor perimeter intrusion detection system 一种可训练多传感器周边入侵检测系统的自适应实时训练策略
R. J. Bartek, A. Sanders
{"title":"Adaptive real-time training strategies for a trainable multi-sensor perimeter intrusion detection system","authors":"R. J. Bartek, A. Sanders","doi":"10.1109/CCST.1988.75996","DOIUrl":"https://doi.org/10.1109/CCST.1988.75996","url":null,"abstract":"This study was motivated by a need to simplify the operation of an existing multisensor perimeter intrusion-detection system, and by a step upward in processing power and storage capacity of small personal computers. The feasibility of centralizing and automating the processing was studied, and telemetry options were examined. While research is still needed to develop key algorithms, bandwidths and data rates have been checked for two processing structures and for perimeters in excess of 10 km and found to be easily within the capability of a centralized 386/1167 processing system.<<ETX>>","PeriodicalId":129971,"journal":{"name":"Proceedings. Institute of Electrical and Electronics Engineers 1988 International Carnahan Conference on Security Technology, Crime Countermeasures","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1988-10-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127736152","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信