1994 Proceedings of IEEE International Carnahan Conference on Security Technology最新文献

筛选
英文 中文
Alpha detection as a probe for counter proliferation 作为反扩散探针的阿尔法探测
1994 Proceedings of IEEE International Carnahan Conference on Security Technology Pub Date : 1994-10-12 DOI: 10.1109/CCST.1994.363803
J. E. Koster, J. P. Johnson, D. Macarthur, S. G. Walters
{"title":"Alpha detection as a probe for counter proliferation","authors":"J. E. Koster, J. P. Johnson, D. Macarthur, S. G. Walters","doi":"10.1109/CCST.1994.363803","DOIUrl":"https://doi.org/10.1109/CCST.1994.363803","url":null,"abstract":"An indication of the presence of special nuclear material (SNM) can be obtained by the detection of alpha particles from the decay of the SNM. Current techniques for detecting alpha particles have a number of limitations. Sensitive conventional detection of SNM traces involves off-site laboratory analysis-but at the loss of an on-site confirmation. Fieldable detection instruments, on the other hand, are delicate and have poor sensitivity. New long-range alpha detection (LRAD) technology mitigates these limitations. An LRAD-based instrument relies an the detection of the hundreds of thousands of ions produced in ambient air by one emitted alpha particle. The ions can be transported to an ion detector at a distance much greater than the range of the original alpha particle. The LRAD-based monitors have the characteristics of high sensitivity, fast (real-time) response, ruggedness, and reliability. Many of the designs are quite portable. In this paper, several scenarios are identified for which particular LRAD-based detectors can provide confirmation of proliferation activity.<<ETX>>","PeriodicalId":314758,"journal":{"name":"1994 Proceedings of IEEE International Carnahan Conference on Security Technology","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1994-10-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128648155","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Infra red lighting, heuristic or logical design 红外线照明,启发式或逻辑设计
1994 Proceedings of IEEE International Carnahan Conference on Security Technology Pub Date : 1994-10-12 DOI: 10.1109/CCST.1994.363785
H. Devereux
{"title":"Infra red lighting, heuristic or logical design","authors":"H. Devereux","doi":"10.1109/CCST.1994.363785","DOIUrl":"https://doi.org/10.1109/CCST.1994.363785","url":null,"abstract":"For many years Infra red (IR) lighting has been used with closed circuit television (CCTV) systems to provide covert lighting of a scene. Whilst much development of IR sources has been carried out to provide the most efficient IR illuminator, with a long lamp life, little research has been done on measuring the density of IR flux in the field, and using this to design IR lighting schemes. This paper will discuss results of the work carried out by the Security Equipment Assessment Laboratory into the use of similar design techniques to those used in Visible lighting schemes, to enable standards to be set. The aim of this work is to provide better quality IR illumination for sites where the additional cost of an area lighting scheme is vindicated by the enhanced image quality attained, and to look at the design techniques that can be used.<<ETX>>","PeriodicalId":314758,"journal":{"name":"1994 Proceedings of IEEE International Carnahan Conference on Security Technology","volume":"654 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1994-10-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120884270","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Integrating physical and computer access control systems 集成物理和计算机访问控制系统
1994 Proceedings of IEEE International Carnahan Conference on Security Technology Pub Date : 1994-10-12 DOI: 10.1109/CCST.1994.363771
J. Smith, R. Charland
{"title":"Integrating physical and computer access control systems","authors":"J. Smith, R. Charland","doi":"10.1109/CCST.1994.363771","DOIUrl":"https://doi.org/10.1109/CCST.1994.363771","url":null,"abstract":"Current systems for controlling access to buildings and to computers use the same basic ideas, but do not work together. Employees must memorize or carry many different access credentials. Security managers must learn how to use a variety of systems that cannot provide a consistent, company-wide security picture. All integrated access control system gives employees a single access token that lets them through doors and onto computer systems. It also has an integrated database that gives security managers a company-wide view of security. One way to move to an integrated system is to first introduce smart cards as dual-purpose access tokens. Later you can build an integrated access control database. There are challenges to building such a system, but clear benefits as well.<<ETX>>","PeriodicalId":314758,"journal":{"name":"1994 Proceedings of IEEE International Carnahan Conference on Security Technology","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1994-10-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124410618","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Smart gun technologies: one method of eliminating unauthorized firearm use 智能枪支技术:消除未经授权使用枪支的一种方法
1994 Proceedings of IEEE International Carnahan Conference on Security Technology Pub Date : 1994-10-12 DOI: 10.1109/CCST.1994.363773
D. R. Weiss
{"title":"Smart gun technologies: one method of eliminating unauthorized firearm use","authors":"D. R. Weiss","doi":"10.1109/CCST.1994.363773","DOIUrl":"https://doi.org/10.1109/CCST.1994.363773","url":null,"abstract":"Many law enforcement agencies agree that a need does exist for a technology that would help prevent misuse of law enforcement firearms. This is a problem that has been in need of a solution. This problem can be addressed through the integration of modern sensors with control electronics to provide authorized user firearms for law enforcement and even recreational uses. A considerable benefit to law enforcement agencies, as well as society as a whole, would be gained by the application of recommended Smart Gun Technologies (SGT) as a method of limiting the use of firearms to authorized individuals. Sandia National Laboratory has been actively involved in the research and design of technologically sophisticated surety devices for weapons for the DOE and DOD. This experience is now being applied to criminal justice problems by transferring these technologies to commercial industry. In the SGT project Sandia is developing the user requirements that would limit a firearms use to its owner and/or authorized users. Various technologies that are capable of meeting the requirements are being investigated, these range from biometrics identification to radio-controlled devices. Research is presently underway to investigate which technologies represent the best solutions to the problem. Proof of concept demonstration models are being built for the most promising SGT with the intent of technology transfer. Different solutions are recommended for the possible applications: law enforcement, military, and commercial (personal protection/recreational) use.<<ETX>>","PeriodicalId":314758,"journal":{"name":"1994 Proceedings of IEEE International Carnahan Conference on Security Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1994-10-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116724829","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Video motion detection systems: a review for the nineties 视频运动检测系统:九十年代回顾
1994 Proceedings of IEEE International Carnahan Conference on Security Technology Pub Date : 1994-10-12 DOI: 10.1109/CCST.1994.363788
R. M. Rodger, I. J. Grist, A. O. Peskett
{"title":"Video motion detection systems: a review for the nineties","authors":"R. M. Rodger, I. J. Grist, A. O. Peskett","doi":"10.1109/CCST.1994.363788","DOIUrl":"https://doi.org/10.1109/CCST.1994.363788","url":null,"abstract":"Video motion detection systems (VMDs) have been available for many years. The development of microprocessors has enabled improvements to be made, particularly during the early 1980s, to the performance of these systems. Some further advances have been made in the 1990s. Most recently, relatively inexpensive computer based systems incorporating neural networks, have been employed for Intelligent Scene Monitoring (ISM). ISM identifies user defined events while ignoring other activity in the scene. It adapts to changing backgrounds and can be straightforward to set up and operate. Another recent innovation has used the geometry of three-dimensional space rather than the two dimensions of a single closed circuit television (CCTV) image. This is achieved by analyzing the overlap of television images, from more than one TV camera. This paper reviews the development of VMD, describes methods of operation and presents performance information on some recently developed systems.<<ETX>>","PeriodicalId":314758,"journal":{"name":"1994 Proceedings of IEEE International Carnahan Conference on Security Technology","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1994-10-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124005555","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Sensor for gravitational field and its application to measures against large earthquake disasters 重力场传感器及其在大地震灾害防治中的应用
1994 Proceedings of IEEE International Carnahan Conference on Security Technology Pub Date : 1994-10-12 DOI: 10.1109/CCST.1994.363779
J. Chiba
{"title":"Sensor for gravitational field and its application to measures against large earthquake disasters","authors":"J. Chiba","doi":"10.1109/CCST.1994.363779","DOIUrl":"https://doi.org/10.1109/CCST.1994.363779","url":null,"abstract":"A gravitational field sensor is described as well as its application to provide warnings so that measures can be taken to mitigate the effects large earthquakes. One of the most promising sensors uses the principle of Michelson interferometry. Assuming a great earthquake (magnitude M=7) where the epicentral distance to a city is long, for instance, /spl sim/100 km the sensor will respond to the turbulent gravitational field with about 20 dB sensitivity 7 seconds before the seismic wave (primary wave) arrival. Even in a short period such as this it will be possible to take some safety measures like turning off the gas and nuclear reactors, bringing trains to a sudden stop, etc.<<ETX>>","PeriodicalId":314758,"journal":{"name":"1994 Proceedings of IEEE International Carnahan Conference on Security Technology","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1994-10-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122124797","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Estimating performance limits for an intelligent scene monitoring system (ISM) as a perimeter intrusion detection system (PIDS) 智能场景监控系统(ISM)作为外围入侵检测系统(PIDS)的性能极限评估
1994 Proceedings of IEEE International Carnahan Conference on Security Technology Pub Date : 1994-10-12 DOI: 10.1109/CCST.1994.363787
K. Sage, K. Wickham, J. Boyce, S. Gornall, D. Toulson
{"title":"Estimating performance limits for an intelligent scene monitoring system (ISM) as a perimeter intrusion detection system (PIDS)","authors":"K. Sage, K. Wickham, J. Boyce, S. Gornall, D. Toulson","doi":"10.1109/CCST.1994.363787","DOIUrl":"https://doi.org/10.1109/CCST.1994.363787","url":null,"abstract":"Intelligent Scene Monitoring (ISM) is an evolutionary next step beyond basic Video Motion Detection. An ISM system takes video imagery as an input and is expected to alarm only when a specific user-defined event or sequence of events occurs in the scene. It is expected to work in \"busy\" scenes, alarming only on the target patterns of behaviour, to the exclusion of all other activity. A fundamental question arises out of using video as a PIDS input. What levels of performance (in terms of Probability of Detection P/sub D/ and False alarm Rate FAR)? Video (particularly outdoors) is a complex data source and the image processing task for PIDS is non-trivial in the ISM context. We have investigated the performance limits for ISM systems using neural network classifiers in an outdoors \"sterile zone\" application. This paper defines the sterile zone analysis and image processing tasks, the study methodology and presents some feasibility results (obtained using seal data). It presents an academic, and experimentally justifiable, viewpoint on the tractability of the problem given a predetermined system performance.<<ETX>>","PeriodicalId":314758,"journal":{"name":"1994 Proceedings of IEEE International Carnahan Conference on Security Technology","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1994-10-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129953686","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Intrepid: a new outdoor perimeter sensor technology Intrepid:一种新的户外周边传感器技术
1994 Proceedings of IEEE International Carnahan Conference on Security Technology Pub Date : 1994-10-12 DOI: 10.1109/CCST.1994.363778
R. K. Harman
{"title":"Intrepid: a new outdoor perimeter sensor technology","authors":"R. K. Harman","doi":"10.1109/CCST.1994.363778","DOIUrl":"https://doi.org/10.1109/CCST.1994.363778","url":null,"abstract":"Southwest Microwave Inc. (SMI) announces Intrepid Reflex Cable (RC), a new (patent pending) acoustic cable intrusion sensor technology that offers fewer false alarms, much lower installed cost and many new features. Intrepid is a radically new intrusion sensor which redefines the term \"security system\". It provides an inexpensive yet comprehensive answer to the most demanding of perimeter security problems. Intrepid is simple. Its unique (patents pending) Reflex Cable technology consists of a cable which is fastened along each surface to be protected - fence, wall, roof or ground - a Processor Module and a few accessories. Installation, calibration and maintenance is made easy using a Laptop or Palmtop computer.<<ETX>>","PeriodicalId":314758,"journal":{"name":"1994 Proceedings of IEEE International Carnahan Conference on Security Technology","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1994-10-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133219250","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Protecting information assets through effective computer security training 透过有效的电脑保安训练,保护资讯资产
1994 Proceedings of IEEE International Carnahan Conference on Security Technology Pub Date : 1994-10-12 DOI: 10.1109/CCST.1994.363782
T. R. Walsh
{"title":"Protecting information assets through effective computer security training","authors":"T. R. Walsh","doi":"10.1109/CCST.1994.363782","DOIUrl":"https://doi.org/10.1109/CCST.1994.363782","url":null,"abstract":"Once you give users access to your computer systems, you're vulnerable! Giving untrained users access to your computer information systems is like giving the keys of a Lamborghini to a teenager! Your computer systems are an accident waiting to happen, unless you have an effective computer security training program embedded within your high-technology security. Because computer security training is usually mandatory, employee attitude affects what they'll get out of the training. Employees dread (and resist) computer security training. The author discusses how to deliver computer security training to users, to reduce the risks to your information systems.<<ETX>>","PeriodicalId":314758,"journal":{"name":"1994 Proceedings of IEEE International Carnahan Conference on Security Technology","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1994-10-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130968967","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Cost effective perimeter security 具有成本效益的周界安全
1994 Proceedings of IEEE International Carnahan Conference on Security Technology Pub Date : 1994-10-12 DOI: 10.1109/CCST.1994.363794
C. Tarr
{"title":"Cost effective perimeter security","authors":"C. Tarr","doi":"10.1109/CCST.1994.363794","DOIUrl":"https://doi.org/10.1109/CCST.1994.363794","url":null,"abstract":"There are many measures that could be taken to make a perimeter more secure. These measures can be expensive and the benefits they provide may not justify this expense. The primary concern of this work is to make more cost-effective decisions by finding the right balance between security and cost. A computer software package known as CLASP (comparative Layout Analysis for Secure Perimeters) has been developed to support this decision making process. It is based on a mathematical model which evaluates sets of performance measures, including data on costs. The model was initially presented at an earlier conference [C.J. Tarr, Proceeding of the 1992 international Carnahan Conference, p.164]. It has now been operational for about two years. This paper examines the experience of using the package in various operational situations during that period. The advantages and limitations of using the package are discussed in comparison with previous approaches.<<ETX>>","PeriodicalId":314758,"journal":{"name":"1994 Proceedings of IEEE International Carnahan Conference on Security Technology","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1994-10-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114927881","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信