2013 47th International Carnahan Conference on Security Technology (ICCST)最新文献

筛选
英文 中文
Interoperable biometric API for mobile devices 可互操作的移动设备生物识别API
2013 47th International Carnahan Conference on Security Technology (ICCST) Pub Date : 2013-10-01 DOI: 10.1109/CCST.2013.6922046
R. Sánchez-Reillo, Ruben Romero-Garcia, Daniel Herrero-Berengue, S. Elliott
{"title":"Interoperable biometric API for mobile devices","authors":"R. Sánchez-Reillo, Ruben Romero-Garcia, Daniel Herrero-Berengue, S. Elliott","doi":"10.1109/CCST.2013.6922046","DOIUrl":"https://doi.org/10.1109/CCST.2013.6922046","url":null,"abstract":"The development of biometric applications in mobile devices will require the use of a standard API in order to reach a high level of interoperability. For those mobile devices where their applications are developed in Java (e.g. Android based systems), the use of BioAPI Java is a solution. This paper shows how BioAPI Java can be applied to mobile devices, as well as the needs for further improvement to provide a larger adoption of this future standard.","PeriodicalId":243791,"journal":{"name":"2013 47th International Carnahan Conference on Security Technology (ICCST)","volume":"241 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122526154","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Emotion recognition system using Open Web Platform 基于开放式Web平台的情感识别系统
2013 47th International Carnahan Conference on Security Technology (ICCST) Pub Date : 2013-10-01 DOI: 10.1109/CCST.2013.6922065
Ana Carolina Nicolosi da Rocha Gracioso, C. C. Botero Suarez, Clecio Bachini, Francisco Javier Ramirez Fernandez
{"title":"Emotion recognition system using Open Web Platform","authors":"Ana Carolina Nicolosi da Rocha Gracioso, C. C. Botero Suarez, Clecio Bachini, Francisco Javier Ramirez Fernandez","doi":"10.1109/CCST.2013.6922065","DOIUrl":"https://doi.org/10.1109/CCST.2013.6922065","url":null,"abstract":"This paper proposes a model for recognizing emotions through movement of facial muscles inspired by FACS (Facial Action Coding System) and FACSAID (Facial Action Coding System Affect Interpretation Dictionary). The computational implementation of the proposed model, here called WeBSER (Web-Based System for Emotion Recognition), was produced in Open Web Platform and is able to infer the user's emotional state in real time. The images of the user's face are captured using a webcam and emotions are classified using a Computer Vision system that uses the Web as a platform. Given the sequences of images acquired in real time via webcam, the WeBSER performs the following steps: Face detection and segmentation (eyes with eyebrows, nose and mouth); Entering reading points; Classification of emotions based on the movement of the reading points. For face detection and segmentation of face regions such as eyes, nose and mouth, the Viola-Jones method was used. Given the face image and the location of the segmented regions, 20 reading points were identified in image. The movement of each reading point is analyzed relatively to the other points. The direction of the movement of reading points is classified in bands of 45 degrees; Thus, each point can assume one of eight directions or remain stationary. Finally, the classification of emotions is made based on the movement of the reading points. This proposed model has a mean accuracy of 76,6% for determining exact emotions, and 84.4% to indicate uncomfortable states of persons suggesting suspicious behaviors.","PeriodicalId":243791,"journal":{"name":"2013 47th International Carnahan Conference on Security Technology (ICCST)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130729955","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Building speakers' vowel models and its application in text independent speaker verification 说话人元音模型的建立及其在语篇独立说话人验证中的应用
2013 47th International Carnahan Conference on Security Technology (ICCST) Pub Date : 2013-10-01 DOI: 10.1109/CCST.2013.6922034
J. Leu, Liang-tsair Geeng, C. Pu, Jyh-Bin Shiau
{"title":"Building speakers' vowel models and its application in text independent speaker verification","authors":"J. Leu, Liang-tsair Geeng, C. Pu, Jyh-Bin Shiau","doi":"10.1109/CCST.2013.6922034","DOIUrl":"https://doi.org/10.1109/CCST.2013.6922034","url":null,"abstract":"In text-independent speaker verification, we compare two sets of sentences with different text content for their tonal similarity to determine if they were due to the same speaker. Since the sentences are different, we may not have matching words to compare. However, the sentences are constructed from the same set of phonemes of the language used, including vowels and consonants. Generally speaking, vowels are fewer in number, but are the more significant parts of a sentence in terms of duration and loudness, very suitable to be used for tonal comparison. In this paper, we first built spectral models for the simple vowels in Mandarin Chinese. Then we applied the models to analyze two given sets of speech sentences, detecting the various simple vowels in the sentences, and used the detected vowels to build a tonal model for each speaker. After that, we proceed to compare the two tonal models to determine the probability that the two speakers are indeed the same person.","PeriodicalId":243791,"journal":{"name":"2013 47th International Carnahan Conference on Security Technology (ICCST)","volume":"89 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134033447","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Usability analysis of a handwritten signature recognition system applied to mobile scenarios 应用于移动场景的手写签名识别系统的可用性分析
2013 47th International Carnahan Conference on Security Technology (ICCST) Pub Date : 2013-10-01 DOI: 10.1109/CCST.2013.6922053
Ramón Blanco-Gonzalo, O. Miguel-Hurtado, R. Sánchez-Reillo, A. González-Ramírez
{"title":"Usability analysis of a handwritten signature recognition system applied to mobile scenarios","authors":"Ramón Blanco-Gonzalo, O. Miguel-Hurtado, R. Sánchez-Reillo, A. González-Ramírez","doi":"10.1109/CCST.2013.6922053","DOIUrl":"https://doi.org/10.1109/CCST.2013.6922053","url":null,"abstract":"Along with the necessity to solve the problems due to the misuse of biometric systems and thus the consistent increase in the final products error rates, a usability evaluation on handwritten signature recognition was carried out. Furthermore, according to the popularity of mobile devices and the market trends, the evaluation was performed signing in mobile scenarios with smart phones, tablets and other common mobile devices. This study reveals interesting results correlating habituation and preferences with better or worst results and it shows the need of involve the user more incisively in the development of biometric solutions, not only for comfort issues but for better systems throughput.","PeriodicalId":243791,"journal":{"name":"2013 47th International Carnahan Conference on Security Technology (ICCST)","volume":"296 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115541219","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Cargo Supply Chain Technology Development: Secure locks assessment and qualification 货物供应链技术发展:安全锁评估与认证
2013 47th International Carnahan Conference on Security Technology (ICCST) Pub Date : 2013-10-01 DOI: 10.1109/CCST.2013.6922036
E. Rao, J. Remer
{"title":"Cargo Supply Chain Technology Development: Secure locks assessment and qualification","authors":"E. Rao, J. Remer","doi":"10.1109/CCST.2013.6922036","DOIUrl":"https://doi.org/10.1109/CCST.2013.6922036","url":null,"abstract":"The mitigation of threats posed by the potential introduction of improvised explosive devices into passenger aircraft via the cargo vector is the subject and driver of the Cargo Supply Chain Integrity Technology (CSIT) Research, Development, Test and Evaluation project undertaken jointly by the Transportation Security Administration (TSA) and the Department of Homeland Security's (DHS) Science and Technology (S&T) Directorate. Recognizing the security capability gap represented by unscreened cargo loaded into/ carried in the holds of passenger aircraft, section 1602(a) of the “Implementing the Recommendations of the 9/11 Commission Act of 2007”, (Public Law 110-53) mandated TSA to establish, by August 3, 2010, a system to screen 100% of all cargo shipped via passenger aircraft. The objective of the project is to develop standards and a process to evaluate and qualify technologies used to insure the security of screened cargo in transit to loading aboard aircraft.","PeriodicalId":243791,"journal":{"name":"2013 47th International Carnahan Conference on Security Technology (ICCST)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115654137","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Measuring security 测量安全
2013 47th International Carnahan Conference on Security Technology (ICCST) Pub Date : 2013-10-01 DOI: 10.1109/ccst.2013.6922054
A. Bilbao, E. Bilbao
{"title":"Measuring security","authors":"A. Bilbao, E. Bilbao","doi":"10.1109/ccst.2013.6922054","DOIUrl":"https://doi.org/10.1109/ccst.2013.6922054","url":null,"abstract":"Measuring Security is a clear need widely spread in the field of Cyber Security. It is part of the standardized risk management, such as ISO 27001, and it is an essential tool in the PDCA cycle of continuous improvement.On the other hand, in Physical Security environment just a few organizations are still using risk management systems oriented on continuous improvement, based on PDCA cycles, such as ISO 31000. This may be the reason why Physical Security does not have extended experience on how to measure its performance. Notwithstanding, Managing Security, Information Technology, Customs Relations, Production, or any other function of a company or organization should be measured. Obviously what it is not measured cannot be evaluated. And if you cannot evaluate a function of a company, how do you know if their leaders are doing well? How do you know if you are providing appropriate resources or not? In this paper we analyze which Security aspects can be measured and how. Several sets of parameters are proposed to be considered, in order to analyze the Security resources of an Organization: Effectiveness (incidents and the success of his rejection); Efficiency (money, people, work hours); Performance (equipment breakdowns attendance times, officers absenteeism, etc.); Evolution of the threats addressed (incidents and attempts); Maturity of the resources (projects planned, implemented, on operation, audited). The existence of a methodology for measuring Security is essential in the implementation of a risk management system focused on continuous improvement. Measuring Security is a key to propose organizational goals and generate benchmarking among different branches or at different moments. Cuevavaliente Ingenieros has specific experience on implementing security metrics for international companies.","PeriodicalId":243791,"journal":{"name":"2013 47th International Carnahan Conference on Security Technology (ICCST)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114084905","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Multipoint primary radar detection association and tracking construction based on BLUE filter 基于BLUE滤波的多点一次雷达探测关联与跟踪构造
2013 47th International Carnahan Conference on Security Technology (ICCST) Pub Date : 2013-10-01 DOI: 10.1109/CCST.2013.6922064
Ana M. Ramiirez G, Mario A. Munoz G, Jimmy A. Florez Z, Claudia C. Botero S, S. Kofuji
{"title":"Multipoint primary radar detection association and tracking construction based on BLUE filter","authors":"Ana M. Ramiirez G, Mario A. Munoz G, Jimmy A. Florez Z, Claudia C. Botero S, S. Kofuji","doi":"10.1109/CCST.2013.6922064","DOIUrl":"https://doi.org/10.1109/CCST.2013.6922064","url":null,"abstract":"Illegal flights in South America is one of the major problems that aviation authorities must face every day. Illicit aircrafts fly every day over countries and they keep their transponder inactivate to avoid secondary radar location over radar systems. This problem has become a major issue for the commercial aviation and the authorities. In an effort to determine the position of these aircrafts and predict their future movements, the authorities only have a spread and variable primary radar detection point over the radar system. A statistical approach of those data are presented in this paper trying to build a methodology to estimate and associate spread points detected by primary radar with at least two different targets. The parameters used to make that estimation are speed, direction and position. To develop the association of the spread points in a single track and further prediction a Kalman filter and a Best Linear Unbiased Estimator filter are used. Simulations results are presented to demonstrate the effectiveness of the proposed approach. Real time primary radar information is used to test the model.","PeriodicalId":243791,"journal":{"name":"2013 47th International Carnahan Conference on Security Technology (ICCST)","volume":"153 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123535070","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Review on state of art intrusion detection systems designed for the cloud computing paradigm 针对云计算范式设计的入侵检测系统现状综述
2013 47th International Carnahan Conference on Security Technology (ICCST) Pub Date : 2013-10-01 DOI: 10.1109/CCST.2013.6922049
Nalaka Arjuna Premathilaka, A. Aponso, Naomi Krishnarajah
{"title":"Review on state of art intrusion detection systems designed for the cloud computing paradigm","authors":"Nalaka Arjuna Premathilaka, A. Aponso, Naomi Krishnarajah","doi":"10.1109/CCST.2013.6922049","DOIUrl":"https://doi.org/10.1109/CCST.2013.6922049","url":null,"abstract":"Cloud Computing is an emerging technology that enhances capability, usability and scalability of computer systems. On account of some exclusive features, cloud computing system always differs from the traditional computer system; not only the capabilities but also the vulnerabilities and threats. Intrusion Detection System (IDS) is a significant component of computer system security and compliance practices that protects computer systems from various types of malicious activities and attacks. Intrusion Detection Systems have been evolved over decades and various types of systems are currently available to identify and eradicate attacks based on different system conditions and different aptitudes. The main purpose of this paper is to review the state-of-art Intrusion Detection Systems available for cloud computing paradigm, which adhere to features of cloud computing architecture. Scalability, elasticity, reliability, performance, security and distributed nature of the Intrusion Detection Systems will be reviewed in order to identify suitable approaches for cloud computing.","PeriodicalId":243791,"journal":{"name":"2013 47th International Carnahan Conference on Security Technology (ICCST)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121929186","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Secure key management in low power wireless sensor networks 低功耗无线传感器网络中的安全密钥管理
2013 47th International Carnahan Conference on Security Technology (ICCST) Pub Date : 2013-10-01 DOI: 10.1109/CCST.2013.6922070
L. A. Cardona, S. D. L. Fe, B. Lorente, S. Villar, Carles Ferrer
{"title":"Secure key management in low power wireless sensor networks","authors":"L. A. Cardona, S. D. L. Fe, B. Lorente, S. Villar, Carles Ferrer","doi":"10.1109/CCST.2013.6922070","DOIUrl":"https://doi.org/10.1109/CCST.2013.6922070","url":null,"abstract":"Wireless Sensor Networks present the challenge of including robust security mechanisms in resource-constrained and low-power devices. Cryptography is at the heart of security and key management is a fundamental part of it. Adequate analysis and selection of efficient cryptographic algorithms and key management schemes are required. This paper presents a key management implementation using an FPGA device. Detailed description on the implementation of a symmetric scheme is presented to analyze the influence in computing power and power consumption by using this type of device.","PeriodicalId":243791,"journal":{"name":"2013 47th International Carnahan Conference on Security Technology (ICCST)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132766731","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Fire safety in tunnels forming part of critical infrastructure 隧道消防安全是基础设施的重要组成部分
2013 47th International Carnahan Conference on Security Technology (ICCST) Pub Date : 2013-10-01 DOI: 10.1109/CCST.2013.6922042
V. Mózer, A. Osvald, T. Loveček, Adelaida Fanfarová, Lubica Vrablova
{"title":"Fire safety in tunnels forming part of critical infrastructure","authors":"V. Mózer, A. Osvald, T. Loveček, Adelaida Fanfarová, Lubica Vrablova","doi":"10.1109/CCST.2013.6922042","DOIUrl":"https://doi.org/10.1109/CCST.2013.6922042","url":null,"abstract":"Road and railway tunnels form vital part of transportation infrastructure as they often represent the only means of crossing a difficult geography. Failure of such critical links may lead to significant disruption to large parts of the transportation system. Due to their enclosed construction they are very vulnerable to fire damage resulting from a terrorist attack or accident. This paper deals with the problem of fire safety in tunnels and the prediction of the effects of a fire on the tunnel construction and the evacuation of the persons inside the tunnel. A realistic worst case fire scenario was modelled for a selected tunnel in the Slovak critical infrastructure, with the aim to establish the potential structural damage as well as the tenability and evacuation conditions. The outcomes are two-fold; firstly, to demonstrate computer modelling capabilities in this area, and secondly, to determine the required fire safety measures and precautions to ensure appropriate structural fire resistance and adequate means of escape. The ability to accurately predict fire severity is key to the robustness of critical infrastructure design and it greatly reduces the likelihood of a catastrophic failure.","PeriodicalId":243791,"journal":{"name":"2013 47th International Carnahan Conference on Security Technology (ICCST)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128573821","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信