2012 IEEE Conference on Technologies for Homeland Security (HST)最新文献

筛选
英文 中文
Information sharing requirements and framework needed for community cyber incident detection and response 社区网络事件检测和响应所需的信息共享要求和框架
2012 IEEE Conference on Technologies for Homeland Security (HST) Pub Date : 2012-12-01 DOI: 10.1109/THS.2012.6459893
K. Harrison, G. White
{"title":"Information sharing requirements and framework needed for community cyber incident detection and response","authors":"K. Harrison, G. White","doi":"10.1109/THS.2012.6459893","DOIUrl":"https://doi.org/10.1109/THS.2012.6459893","url":null,"abstract":"Communities, and the critical infrastructure that they rely upon, are becoming ever increasingly integrated into cyberspace. At the same time, communities are experiencing increasing activity and sophistication from a variety of threat agents. The effect of cyber attacks on communities has been observed, and the frequency and devastation of these attacks can only increase in the foreseeable future. Early detection of these attacks is critical for a fast and effective response. We propose detecting community cyber incidents by comparing indicators from community members across space and time. Performing spatiotemporal differentiation on these indicators requires that community members, such as private and governmental organizations, share information about these indicators. However, community members are, for good reasons, reluctant to share sensitive security related information. Additionally, sharing large amounts of information with a trusted, centralized location introduces scalability and reliability problems. In this paper we define the information sharing requirements necessary for fast, effective community cyber incident detection and response, while addressing both privacy and scalability concerns. Furthermore, we introduce a framework to meet these requirements, and analyze a proof of concept implementation.","PeriodicalId":355549,"journal":{"name":"2012 IEEE Conference on Technologies for Homeland Security (HST)","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131871917","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Maritime threat detection using plan recognition 基于计划识别的海上威胁检测
2012 IEEE Conference on Technologies for Homeland Security (HST) Pub Date : 2012-11-01 DOI: 10.1109/THS.2012.6459857
B. Auslander, K. Gupta, D. Aha
{"title":"Maritime threat detection using plan recognition","authors":"B. Auslander, K. Gupta, D. Aha","doi":"10.1109/THS.2012.6459857","DOIUrl":"https://doi.org/10.1109/THS.2012.6459857","url":null,"abstract":"Existing algorithms for maritime threat detection employ a variety of normalcy models that are probabilistic and/or rule-based. Unfortunately, they can be limited in their ability to model the subtlety and complexity of multiple vessel types and their spatio-temporal events, yet their representation is needed to accurately detect anomalies in maritime scenarios. To address these limitations, we apply plan recognition algorithms for maritime anomaly detection. In particular, we examine hierarchical task network (HTN) and case-based algorithms for plan recognition, which detect anomalies by generating expected behaviors for use as a basis for threat detection. We compare their performance with a behavior recognition algorithm on simulated riverine maritime traffic. On a set of simulated maritime scenarios, these plan recognition algorithms outperformed the behavior recognition algorithm, except for one reactive behavior task in which the inverse occurred. Furthermore, our case-based plan recognizer outperformed our HTN algorithm. On the short-term reactive planning scenarios, the plan recognition algorithms outperformed the behavior recognition algorithm on routine plan following. However, they are significantly outperformed on the anomalous scenarios.","PeriodicalId":355549,"journal":{"name":"2012 IEEE Conference on Technologies for Homeland Security (HST)","volume":"62 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121806511","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Modeling of a Regional Hub Reception Center to improve the speed of an urban area evacuation 区域枢纽接待中心的建模以提高城市区域疏散的速度
2012 IEEE Conference on Technologies for Homeland Security (HST) Pub Date : 2012-11-01 DOI: 10.1109/THS.2012.6459895
A. Kirby, J. E. Dietz, C. Wojtalewicz
{"title":"Modeling of a Regional Hub Reception Center to improve the speed of an urban area evacuation","authors":"A. Kirby, J. E. Dietz, C. Wojtalewicz","doi":"10.1109/THS.2012.6459895","DOIUrl":"https://doi.org/10.1109/THS.2012.6459895","url":null,"abstract":"The city of Chicago, Illinois is making strides to become more prepared for large-scale disasters. One idea is called a Regional Hub Reception Center (RHRC), which converts an existing facility into a temporary shelter for evacuees in the event of a 10-kiloton nuclear blast being detonated in the center of downtown. The RHRC will provide the evacuees with basic needs and register them for assignment at a more permanent shelter. The Regional Catastrophic Planning Team needs to know if its estimates for time, personnel, and resources are accurate. The best and most reliable way to test what will be needed is to perform simulations. However, large full-scale simulations are time consuming and expensive. A computer-generated model, however, can accurately simulate many variables and scenarios to test the RHRC quickly, cheaply, and repetitively to make it more effective if used. A computer modeling software tool, called AnyLogic, is a multi-paradigm modeling program that allows users to build agent-based, discrete event, and system dynamics models. The modeling paradigm that best suits the simulation of an RHRC is discrete event modeling. This is because a discrete event model represents a chronological sequence of events. When an event occurs in a discrete event model, it represents a change to the entire system. An RHRC is a chronological sequence of events and a system of systems that are constantly changing. As evacuees move through the RHRC, they flow through a predefined set of points, ranging from registration, to care, to shelter assignment, and many others. The data provided is supported by research or by personal field experience where research has not yet been performed. A model is a simulation of the real world. Though it does not represent the 100% of the variables that could occur in an actual simulation, it takes into consideration as many as possible to provide the most accurate results. The RHRC AnyLogic model is a simulation that estimates resource needs and processes of an RHRC. The RHRC model created to support this paper was developed using data collected by all students in Dr. J. Eric Dietz's Homeland Security Seminar graduate level class at Purdue University in the spring semester of 2012. The purpose of this study is to determine if the goals of the Regional Catastrophic Planning Team are attainable based upon the data collected.","PeriodicalId":355549,"journal":{"name":"2012 IEEE Conference on Technologies for Homeland Security (HST)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124270360","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Biometric Interagency Testing & Evaluation Schema (BITES) 生物识别跨部门测试与评估方案(BITES)
2012 IEEE Conference on Technologies for Homeland Security (HST) Pub Date : 2012-11-01 DOI: 10.1109/THS.2012.6459907
R. Lazarick
{"title":"Biometric Interagency Testing & Evaluation Schema (BITES)","authors":"R. Lazarick","doi":"10.1109/THS.2012.6459907","DOIUrl":"https://doi.org/10.1109/THS.2012.6459907","url":null,"abstract":"This paper addresses the concepts of reusable biometric testing in a general sense, and then describes the US Government initiative to establish a mechanism to facilitate sharing of biometric testing information both within the government and with stakeholders. The fundamental motivation for promoting reuse of biometric testing information is to achieve cost avoidance. If a well defined test has been successfully completed and documented by a trusted party, then the results of that testing should be sufficient to allow other consumers of that product to rely on that test, and thereby avoid the cost of repeating that testing. The extent of reusability depends on the type of testing being conducted. The most straightforward type of testing suited for reuse are Conformance tests, such as conformance to American National Standards Institute/National Institute of Standards and Technology (ANSI/NIST) or International Organization for Standardization (ISO) standards. These tests are typically automated and are fully repeatable. Biometric Performance testing using the Technology Testing approach, is similarly repeatable and easily reused given a fixed set of biometric samples. Biometric Performance testing using the Scenario Testing approach is quite different in that it is inherently not repeatable due to the use of human test subjects, and not easily reusable. These tests are also typically expensive. There are several notable examples of testing programs for which the results have demonstrated reusability. One of the first and most visible may be the Federal Bureau of Investigation (FBI) Appendix F Certification of fingerprint image quality supported by the FBI for procurement of livescan fingerprint devices. There are fundamental prerequisites for reusable testing. First, there is a need for agreement on the method/procedure for conducting the testing and reporting the results. Secondly, the methods must be “Open”, and additionally, the product must be tested by a trusted party . In order for reusable testing to work, the participants in a test must have a willingness and the authority to share the results, and establish a common level of integration. In order for reusability to succeed, there must be a capability to disseminate the information. The United States Government (USG) has established an effort to develop a repository for biometrics test methods and successfully completed test results - “BITES” - Biometric Interagency Testing and Evaluation Schema, to promote efficient and effective reuse of biometric testing information.","PeriodicalId":355549,"journal":{"name":"2012 IEEE Conference on Technologies for Homeland Security (HST)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127258690","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Security in the cloud: Understanding the risks of cloud-as-a-service 云中的安全性:了解云即服务的风险
2012 IEEE Conference on Technologies for Homeland Security (HST) Pub Date : 2012-11-01 DOI: 10.1109/THS.2012.6459871
Chris Peake
{"title":"Security in the cloud: Understanding the risks of cloud-as-a-service","authors":"Chris Peake","doi":"10.1109/THS.2012.6459871","DOIUrl":"https://doi.org/10.1109/THS.2012.6459871","url":null,"abstract":"Cloud services are susceptible to faults, failures, and attacks just like enterprise IT architectures, the difference is that when a cloud suffers an outage it can affect numerous customers. But cloud security is not just about accessibility and availability; it must also provide information integrity and confidentiality to assure effective business operations. Therefore, cloud-based services (i.e. SaaS, PaaS, and IaaS) will also have to provide resilient and fault tolerant resources at the application, platform, and infrastructure levels in order to assure cloud consumer mission objectives can be met. This will require the development of a new breed of security technologies that not only provide Information Assurance but also Mission Assurance.","PeriodicalId":355549,"journal":{"name":"2012 IEEE Conference on Technologies for Homeland Security (HST)","volume":"107 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126120995","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Bio-inspired Evolutionary Sensory system for Cyber-Physical System defense 用于网络物理系统防御的仿生进化传感系统
2012 IEEE Conference on Technologies for Homeland Security (HST) Pub Date : 2012-11-01 DOI: 10.1007/978-3-662-43616-5_2
M. Azab, M. Eltoweissy
{"title":"Bio-inspired Evolutionary Sensory system for Cyber-Physical System defense","authors":"M. Azab, M. Eltoweissy","doi":"10.1007/978-3-662-43616-5_2","DOIUrl":"https://doi.org/10.1007/978-3-662-43616-5_2","url":null,"abstract":"","PeriodicalId":355549,"journal":{"name":"2012 IEEE Conference on Technologies for Homeland Security (HST)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126156031","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Comparison of commercial and next generation quantum key distribution: Technologies for secure communication of information 商业和下一代量子密钥分发的比较:信息安全通信技术
2012 IEEE Conference on Technologies for Homeland Security (HST) Pub Date : 2012-11-01 DOI: 10.1109/THS.2012.6459842
Lee Oesterling, Don Hayford, Georgeanne Friend
{"title":"Comparison of commercial and next generation quantum key distribution: Technologies for secure communication of information","authors":"Lee Oesterling, Don Hayford, Georgeanne Friend","doi":"10.1109/THS.2012.6459842","DOIUrl":"https://doi.org/10.1109/THS.2012.6459842","url":null,"abstract":"Battelle has been actively exploring emerging quantum key distribution (QKD) cryptographic technologies for secure communication of information with a goal of expanding the use of this technology by commercial enterprises in the United States. In QKD systems, the principles of quantum physics are applied to generate a secret data encryption key, which is distributed between two users. The security of this key is guaranteed by the laws of quantum physics, and this distributed key can be used to encrypt data to enable secure communication on insecure channels. To date, Battelle has studied commercially available and custom-built QKD systems in controlled laboratory environments and is actively working to establish a QKD Test Bed network to characterize performance in real world metropolitan (10-100 km) and long distance (>; 100 km) environments. All QKD systems that we have tested to date utilize a discrete variable (DV) binary approach. In this approach, discrete information is encoded onto a quantum state of a single photon, and binary data are measured using single photon detectors. Recently, continuous variable (CV) QKD systems have been developed and are expected to be commercially available shortly. In CV-QKD systems, randomly generated continuous variables are encoded on coherent states of weak pulses of light, and continuous data values are measured with homodyne detection methods. In certain applications for cyber security, the CV-QKD systems may offer advantages over traditional DV-QKD systems, such as a higher secret key exchange rate for short distances, lower cost, and compatibility with telecommunication technologies. In this paper, current CV- and DV-QKD approaches are described, and security issues and technical challenges fielding these quantum-based systems are discussed. Experimental and theoretical data that have been published on quantum key exchange rates and distances that are relevant to metropolitan and long distance network applications are presented. From an analysis of these data, the relative performance of the two approaches is compared as a function of distance and environment (free space and optical fiber). Additionally, current research activities are described for both technologies, which include network integration and methods to increase secret key distribution rates and distances.","PeriodicalId":355549,"journal":{"name":"2012 IEEE Conference on Technologies for Homeland Security (HST)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123740034","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 30
A compressed sensing approach for detection of explosive threats at standoff distances using a Passive Array of Scatters 一种利用无源散射阵在离地距离探测爆炸威胁的压缩感知方法
2012 IEEE Conference on Technologies for Homeland Security (HST) Pub Date : 2012-11-01 DOI: 10.1109/THS.2012.6459838
J. Martinez-Lorenzo, Y. Rodriguez-Vaqueiro, C. Rappaport, O. R. Lopez, A. Pino
{"title":"A compressed sensing approach for detection of explosive threats at standoff distances using a Passive Array of Scatters","authors":"J. Martinez-Lorenzo, Y. Rodriguez-Vaqueiro, C. Rappaport, O. R. Lopez, A. Pino","doi":"10.1109/THS.2012.6459838","DOIUrl":"https://doi.org/10.1109/THS.2012.6459838","url":null,"abstract":"This work presents a new radar system concept, working at millimeter wave frequencies, capable of detecting explosive related threats at standoff distances. The system consists of a two dimensional aperture of randomly distributed transmitting/receiving antenna elements, and a Passive Array of Scatters (PAS) positioned in the vicinity of the target. In addition, a novel norm one minimization imaging algorithm has been implemented that is capable of producing super-resolution images. This paper also includes a numerical example in which 7.5 mm resolution is achieved at the standoff range of 40 m for a working frequency of 60 GHz.","PeriodicalId":355549,"journal":{"name":"2012 IEEE Conference on Technologies for Homeland Security (HST)","volume":"192 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122389635","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Face recognition and learning via adaptive dictionaries 通过自适应字典进行人脸识别和学习
2012 IEEE Conference on Technologies for Homeland Security (HST) Pub Date : 2012-11-01 DOI: 10.1109/THS.2012.6459862
Katia Estabridis
{"title":"Face recognition and learning via adaptive dictionaries","authors":"Katia Estabridis","doi":"10.1109/THS.2012.6459862","DOIUrl":"https://doi.org/10.1109/THS.2012.6459862","url":null,"abstract":"This paper proposes an adaptive face recognition algorithm to jointly classify and learn from unlabeled data. It presents an efficient design that specifically addresses the case when only a single sample per person is available for training. A dictionary composed of regional descriptors serves as the basis for the recognition system while providing a flexible framework to augment or update dictionary atoms. The algorithm is based on l1 minimization techniques and the decision to update the dictionary is made in an unsupervised mode via non-parametric Bayes. The dictionary learning is done via reverse-OMP to select atoms that are orthogonal or near orthogonal to the current dictionary elements. The proposed algorithm was tested with two face databases showing the capability to handle illumination, scale, and some moderate pose and expression variations. Classification results as high as 96% were obtained with the Georgia Tech database and 94% correct classification rates for the Multi-PIE database for the frontal-view scenarios.","PeriodicalId":355549,"journal":{"name":"2012 IEEE Conference on Technologies for Homeland Security (HST)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122634943","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Multimodal biometric collection and evaluation architecture 多模态生物特征收集和评估架构
2012 IEEE Conference on Technologies for Homeland Security (HST) Pub Date : 2012-11-01 DOI: 10.1109/THS.2012.6459826
J. Lacirignola, P. Pomianowski, D. Ricke, D. Strom, E. Wack
{"title":"Multimodal biometric collection and evaluation architecture","authors":"J. Lacirignola, P. Pomianowski, D. Ricke, D. Strom, E. Wack","doi":"10.1109/THS.2012.6459826","DOIUrl":"https://doi.org/10.1109/THS.2012.6459826","url":null,"abstract":"The size and scope of standoff multimodal biometric datasets can be increased through the adoption of a common architecture to collect, describe, archive, and analyze subject traits. The Extendable Multimodal Biometric Evaluation Range (EMBER) system developed by MIT Lincoln Laboratory is a field-ready, easily adaptable architecture to streamline collections requiring multiple biometric devices in environments of interest. Its data architecture includes a fully featured metadata-rich relational database that supports the aggregation of biometric data collected with proliferated systems into a single corpus for analytical use.","PeriodicalId":355549,"journal":{"name":"2012 IEEE Conference on Technologies for Homeland Security (HST)","volume":"117 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128258921","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信