38th Annual 2004 International Carnahan Conference on Security Technology, 2004.最新文献

筛选
英文 中文
Use of modeling and simulation to support airport security 使用建模和仿真来支持机场安全
38th Annual 2004 International Carnahan Conference on Security Technology, 2004. Pub Date : 2004-10-11 DOI: 10.1109/CCST.2004.1405400
D.L. Wilson
{"title":"Use of modeling and simulation to support airport security","authors":"D.L. Wilson","doi":"10.1109/CCST.2004.1405400","DOIUrl":"https://doi.org/10.1109/CCST.2004.1405400","url":null,"abstract":"Currently as well as in the past, an aggressive program to enhance security at airports throughout the United States has been pursued resulting in numerous advancements in the civil aviation security landscape. For government and industry planners concerned with future security improvements, being able to predict the overall impact of new technologies and/or procedures is an important issue, especially in the deployment of advanced airport security equipment. Recognized as part of the issue is that new security systems must be installed in and function as part of operating airports, which, throughout the entire process, must continue to handle ongoing operational requirements in a competitive and cost efficient manner to the satisfaction and safety of their customers - the airlines and traveling public. One approach to gaining a better understanding of this issue, as well as any new technologies and their impact in an airport's operational environment, is by using modeling and simulation tools. Modeling and simulation has become an effective way to target new technology advancements and operational concepts and to evaluate the behavior of complex systems, offering the opportunity to examine the complexities of the airport environment in a non-intrusive and cost-effective way, while also offering the means to evaluate, assess, and fine-tune equipment selections, configurations, and other operational factors without actually deploying or installing expensive security equipment or reconfiguring secure areas of the airport environment, unnecessarily interrupting passenger and baggage flow through an airport. In the long run, this will result in the implementation of more effective and efficient airport security solutions.","PeriodicalId":329160,"journal":{"name":"38th Annual 2004 International Carnahan Conference on Security Technology, 2004.","volume":"129 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127390577","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
Robohound/spl trade/ remote explosives detection 机器狗/spl交易/远程爆炸物探测
38th Annual 2004 International Carnahan Conference on Security Technology, 2004. Pub Date : 2004-10-11 DOI: 10.1109/CCST.2004.1405419
M. Baumann, J. Hunter, D. Hannum, R. Horton
{"title":"Robohound/spl trade/ remote explosives detection","authors":"M. Baumann, J. Hunter, D. Hannum, R. Horton","doi":"10.1109/CCST.2004.1405419","DOIUrl":"https://doi.org/10.1109/CCST.2004.1405419","url":null,"abstract":"With continued terrorist activities worldwide and the concern that explosive devices need to be detected in a variety of configurations while protecting individuals, there is a need to remotely detect potential explosive devices. Current handheld trace explosives detection sensors require the operator to stand within a few inches of a potential explosive device to ensure an adequate sample is collected. Because of the low vapor pressure of some explosives and the low vapor concentrations in airborne plumes emanating from a bulk explosive source, the sample collection method is critical when using an ion mobility spectrometer-based explosive detection sensor. The RoboHound/spl trade/, a prototype remote trace explosive detection system, is under development at Sandia National Laboratories to address this issue. The RoboHound/spl trade/ was designed for primary use in emergency response situations and could also be used for some checkpoint screening applications. The prototype uses a wheeled robotic platform with a manipulator arm and custom software for robotic controls; a chemical sample collector and preconcentrator; and a commercial explosives detector. The integrated system allows an operator to maneuver the system into position while remaining up to 100 feet away from a suspect vehicle, package, or other object, and take a sample for analysis.","PeriodicalId":329160,"journal":{"name":"38th Annual 2004 International Carnahan Conference on Security Technology, 2004.","volume":"146 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121643005","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Effects of illumination changes on the performance of Geometrix FaceVision/spl reg/ 3D FRS 光照变化对Geometrix FaceVision/spl reg/ 3D FRS性能的影响
38th Annual 2004 International Carnahan Conference on Security Technology, 2004. Pub Date : 2004-10-11 DOI: 10.1109/CCST.2004.1405414
E. Kukula, S. Elliott, R. Waupotitsch, B. Pesenti
{"title":"Effects of illumination changes on the performance of Geometrix FaceVision/spl reg/ 3D FRS","authors":"E. Kukula, S. Elliott, R. Waupotitsch, B. Pesenti","doi":"10.1109/CCST.2004.1405414","DOIUrl":"https://doi.org/10.1109/CCST.2004.1405414","url":null,"abstract":"This evaluation examined the effects of four frontal light intensities on the performance of a 3D face recognition algorithm, specifically testing the significance between an unchanging enrollment illumination condition (220-225 lux) and four different illumination levels for verification. The evaluation also analyzed the significance of external artifacts (i.e. glasses) and personal characteristics (i.e. facial hair) on the performance of the face recognition system (FRS). Collected variables from the volunteer crew included age, gender, ethnicity, facial characteristics, hair covering the forehead, scars on the face, and glasses. The analysis of data revealed that there are no statistically significant differences between environmental lighting and 3D FRS performance when a uniform or constant enrollment illumination level is used.","PeriodicalId":329160,"journal":{"name":"38th Annual 2004 International Carnahan Conference on Security Technology, 2004.","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121748481","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Secure computing using cryptographic assurance of execution correctness 使用加密保证执行正确性的安全计算
38th Annual 2004 International Carnahan Conference on Security Technology, 2004. Pub Date : 2004-10-01 DOI: 10.1109/CCST.2004.1405399
L. Pierson, P. Campbell, J. Eldridge, P. Robertson, T. Tarman, E. L. Witzke
{"title":"Secure computing using cryptographic assurance of execution correctness","authors":"L. Pierson, P. Campbell, J. Eldridge, P. Robertson, T. Tarman, E. L. Witzke","doi":"10.1109/CCST.2004.1405399","DOIUrl":"https://doi.org/10.1109/CCST.2004.1405399","url":null,"abstract":"Current computing architectures are \"inherently insecure\" because they are designed to execute ANY arbitrary sequence of instructions. As a result they are subject to subversion by malicious code. Our goal is to produce a cryptographic method of \"tamper-proofing\" trusted code over a large portion of the software life cycle. We have developed a technique called \"faithful execution\", to cryptographically protect instruction sequences from subversion. This paper presents an overview of, and the lessons learned from, our implementations of faithful execution in a Java virtual machine prototype and also in a configurable soft-core processor implemented in a field programmable gate array (FPGA).","PeriodicalId":329160,"journal":{"name":"38th Annual 2004 International Carnahan Conference on Security Technology, 2004.","volume":"279 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114630412","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
3D facial recognition: a quantitative analysis 3D面部识别:定量分析
38th Annual 2004 International Carnahan Conference on Security Technology, 2004. Pub Date : 2004-06-01 DOI: 10.1109/CCST.2004.1405415
T. Russ, M. W. Koch, C. Little
{"title":"3D facial recognition: a quantitative analysis","authors":"T. Russ, M. W. Koch, C. Little","doi":"10.1109/CCST.2004.1405415","DOIUrl":"https://doi.org/10.1109/CCST.2004.1405415","url":null,"abstract":"Two-dimensional facial recognition has, traditionally, been an attractive biometric, however, the accuracy of 2D facial recognition (FR) is performance limited and insufficient when confronted with extensive numbers of people to screen and identify, and the numerous appearances that a 2D face can exhibit. In efforts to overcome many of the issues limiting 2D FR technology, researchers are beginning to focus their attention on 3D FR technology. In this paper, an analysis of a 3D FR system being developed at Sandia National Laboratories is performed. The study involves the use of 200 subjects on which verification (one-to-one) matches are performed using a single probe database (one correct match per subject) and 30 subjects on which identification matches are performed. The system is evaluated in terms of probability of detection (Pd) and probability of false accepts (FAR). The results presented will aid in providing an initial understanding of the performance of 3D FR.","PeriodicalId":329160,"journal":{"name":"38th Annual 2004 International Carnahan Conference on Security Technology, 2004.","volume":"107 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131561368","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 45
Seeing beyond the perimeter: the Advanced Exterior Sensor (AES) 超越边界:高级外部传感器(AES)
38th Annual 2004 International Carnahan Conference on Security Technology, 2004. Pub Date : 2004-06-01 DOI: 10.1109/CCST.2004.1405389
R. Ashby, D. Pritchard
{"title":"Seeing beyond the perimeter: the Advanced Exterior Sensor (AES)","authors":"R. Ashby, D. Pritchard","doi":"10.1109/CCST.2004.1405389","DOIUrl":"https://doi.org/10.1109/CCST.2004.1405389","url":null,"abstract":"The system design of the Advanced Exterior Sensor (AES), test data and Sandia National Laboratories' current work on the AES is described. The AES integrates three sensor technologies (thermal infrared waveband, visible waveband, and microwave radar) in a Remote Sensor Module communicating with three motion detection target trackers and a sensor fusion software module in the Data Processor Module to achieve higher performance than single technology devices. Wide areas are covered by continuously scanning the three sensors 360 degrees in about one second. The images from the infrared and visible detector sets and the radar range data are updated as the sensors rotate each second. The radar provides range data with approximately one-meter resolution. Panoramic imagery is generated for immediate visual assessment of alarms using the Display Control Module. There is great potential for site security enhancement using the AES, which was designed for low-cost, easy use and rapid deployment to cover wide areas beyond typical perimeters, possibly in place of typical perimeter sensors, and for tactical applications around fixed or temporary high-value assets. Commercial-off-the-shelf (COTS) systems have neither the three sensor technologies nor the imaging sensor resolution. Cost and performance will be discussed for different scenarios.","PeriodicalId":329160,"journal":{"name":"38th Annual 2004 International Carnahan Conference on Security Technology, 2004.","volume":"173 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116637511","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
History Note - 39th Annual 2005 IEEE International Carnahan Conference on Security Technology 历史记录-第39届年度2005 IEEE国际卡纳汉安全技术会议
38th Annual 2004 International Carnahan Conference on Security Technology, 2004. Pub Date : 1900-01-01 DOI: 10.1109/ccst.2004.1405361
{"title":"History Note - 39th Annual 2005 IEEE International Carnahan Conference on Security Technology","authors":"","doi":"10.1109/ccst.2004.1405361","DOIUrl":"https://doi.org/10.1109/ccst.2004.1405361","url":null,"abstract":"","PeriodicalId":329160,"journal":{"name":"38th Annual 2004 International Carnahan Conference on Security Technology, 2004.","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124033405","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信