2008 IEEE Conference on Technologies for Homeland Security最新文献

筛选
英文 中文
Towards a High Assurance Multi-level Secure PC for Intelligence Communities 面向情报界的高保障多级安全PC
2008 IEEE Conference on Technologies for Homeland Security Pub Date : 2008-05-12 DOI: 10.1109/THS.2008.4534523
D. Kleidermacher
{"title":"Towards a High Assurance Multi-level Secure PC for Intelligence Communities","authors":"D. Kleidermacher","doi":"10.1109/THS.2008.4534523","DOIUrl":"https://doi.org/10.1109/THS.2008.4534523","url":null,"abstract":"Intelligence communities have long struggled with the burden of maintaining separate computers and networks to manage information at varying sensitivity levels. Commercial grade operating systems and virtualization solutions such as Windows, Linux, and VMware are unsuitable for security assurance to the high levels required for this kind of information sharing on a single PC platform. Custom solutions have failed to gain acceptance as cost containment pressures favor commercial, off-the-shelf (COTS) platforms. In addition, common PC hardware has had serious security limitations that prevent even a high assurance software solution from achieving the required domain separation. The hope for a truly high assurance, multi-level secure PC is coming closer to reality by virtue of recent innovations, both in software and hardware. We propose an operating environment architecture that combines the utility of virtualization with the robustness of a high assurance realtime kernel that can host trusted applications.","PeriodicalId":366416,"journal":{"name":"2008 IEEE Conference on Technologies for Homeland Security","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133020338","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Challenges to event formalization for information extraction 面向信息提取的事件形式化挑战
2008 IEEE Conference on Technologies for Homeland Security Pub Date : 2008-05-12 DOI: 10.1109/THS.2008.4635236
A. Badia
{"title":"Challenges to event formalization for information extraction","authors":"A. Badia","doi":"10.1109/THS.2008.4635236","DOIUrl":"https://doi.org/10.1109/THS.2008.4635236","url":null,"abstract":"Information Extraction (IE) is a vital technology for dealing with large volume of documents. IE extracts entities, links (relationships) and events of interest from text. Whi le much progress has occurred in recent years in Entity and Link Extraction, Event Extraction remains one of the weakest poi nts of IE. We hypothesize that one of the reasons is the fact that there is little understanding of, and agreement about, whatconstitutes an event. Moreover, in Intelligence and Counterte rrorism environments it is extremely difficult to describe all situations of interest, making monitoring for such situations quite chalenging. We propose a formal definition of event, developed within the framework of Situation Theory, a theory of information flow developed in logic and linguistics. Besides giving a solid y et intuitive foundation, the definition can be put to practical use. We develop a classification of event types on top of our definitio n to let a user (Intelligence Analyst or other) specify events of interest, and sketch an interpreter that can use Information Extraction tools to monitor a collection of documents in order to detect whether the specified events are taking place.","PeriodicalId":366416,"journal":{"name":"2008 IEEE Conference on Technologies for Homeland Security","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131657651","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Crime Information Extraction from Police and Witness Narrative Reports 从警察和证人叙述报告中提取犯罪信息
2008 IEEE Conference on Technologies for Homeland Security Pub Date : 2008-05-12 DOI: 10.1109/THS.2008.4534448
C. H. Ku, A. Iriberri, G. Leroy
{"title":"Crime Information Extraction from Police and Witness Narrative Reports","authors":"C. H. Ku, A. Iriberri, G. Leroy","doi":"10.1109/THS.2008.4534448","DOIUrl":"https://doi.org/10.1109/THS.2008.4534448","url":null,"abstract":"To solve crimes, investigators often rely on interviews with witnesses, victims, or criminals themselves. The interviews are transcribed and the pertinent data is contained in narrative form. To solve one crime, investigators may need to interview multiple people and then analyze the narrative reports. There are several difficulties with this process: interviewing people is time consuming, the interviews - sometimes conducted by multiple officers - need to be combined, and the resulting information may still be incomplete. For example, victims or witnesses are often too scared or embarrassed to report or prefer to remain anonymous. We are developing an online reporting system that combines natural language processing with insights from the cognitive interview approach to obtain more information from witnesses and victims. We report here on information extraction from police and witness narratives. We achieved high precision, 94% and 96% and recall, 85% and 90%, for both narrative types.","PeriodicalId":366416,"journal":{"name":"2008 IEEE Conference on Technologies for Homeland Security","volume":"21 25","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113973335","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
A Modeling Framework for Evaluating Effectiveness of Smart-Infrastructure Crises Management Systems 智能基础设施危机管理系统有效性评估的建模框架
2008 IEEE Conference on Technologies for Homeland Security Pub Date : 2008-05-12 DOI: 10.1109/THS.2008.4534512
T. Mukherjee, S.K.S. Gupta
{"title":"A Modeling Framework for Evaluating Effectiveness of Smart-Infrastructure Crises Management Systems","authors":"T. Mukherjee, S.K.S. Gupta","doi":"10.1109/THS.2008.4534512","DOIUrl":"https://doi.org/10.1109/THS.2008.4534512","url":null,"abstract":"Crises management for smart-infrastructure - infused with sensors, actuators, and intelligent agent technologies for monitoring, access control, and crisis response - requires objective and quantitative evaluation to learn for future. The concept of criticality - characterizing the effect of crises on the inhabitants of smart-infrastructure - is used in this regard. This paper establishes a criticality response modeling (CRM) framework to perform quantitative evaluation of criticality response. The framework can further be incorporated in any criticality-aware middleware for smart-infrastructure. An established stochastic model for criticality response is used from our previous work. The effectiveness of criticality response is measured in terms of the Manageability metric, characterized by the Q-value or qualifiedness of the response actions. The CRM is applied to fire emergencies in an envisioned smart oil & gas production platforms (OGPP). A simulation based evaluation, using CRM over OGPP, show that high manageability is achieved with - i) fast criticality detection, ii) fast response actuation, and iii) non-obliviousness to any subsequent criticality during response actuation - verifying the applicability of Q-value as the manageability metric.","PeriodicalId":366416,"journal":{"name":"2008 IEEE Conference on Technologies for Homeland Security","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121771258","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
A PlugN'Play Platform Independent Solution That Eliminates Unauthorized Access Without the Use of Passwords or Encryption Keys 一个即插即用平台独立的解决方案,消除未经授权的访问,而无需使用密码或加密密钥
2008 IEEE Conference on Technologies for Homeland Security Pub Date : 2008-05-12 DOI: 10.1109/THS.2008.4534427
S. Tuzzo
{"title":"A PlugN'Play Platform Independent Solution That Eliminates Unauthorized Access Without the Use of Passwords or Encryption Keys","authors":"S. Tuzzo","doi":"10.1109/THS.2008.4534427","DOIUrl":"https://doi.org/10.1109/THS.2008.4534427","url":null,"abstract":"This paper describes breakthrough cyber security technology developed by 4thDTtrade security that addresses today's critical need for legacy system security, particularly SCADA networks, that rely on network communication systems. This technology transcends current security methods and guarantees absolute security for network communications and data storage. The 4thDTtrade security solution allows the Internet to function as intended - an efficient point-to-point transport medium. This hardware/firmware solution performs quantum cryptographic payload scrambling, allows OS platform independence, ease of integration, low cost of ownership, and eliminates the need for enterprise key management. This makes 4thDTtrade security an ideal solution to address the SCADA, legacy system, and network database security issues that are a critical need today. Research prototypes of 4thDTtrade security hardware are being evaluated now.","PeriodicalId":366416,"journal":{"name":"2008 IEEE Conference on Technologies for Homeland Security","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132007064","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Energy-Efficient Target Monitoring in Wireless Sensor Networks 无线传感器网络中的节能目标监测
2008 IEEE Conference on Technologies for Homeland Security Pub Date : 2008-05-12 DOI: 10.1109/THS.2008.4534463
D. Jain, V. Vokkarane
{"title":"Energy-Efficient Target Monitoring in Wireless Sensor Networks","authors":"D. Jain, V. Vokkarane","doi":"10.1109/THS.2008.4534463","DOIUrl":"https://doi.org/10.1109/THS.2008.4534463","url":null,"abstract":"One of the fundamental purpose of sensing information is to immediately respond to any anomalies. Wireless sensor network (WSN) is a network of inexpensive, low-power nodes with embedded processors, radios, sensors, and actuators, often integrated on a single chip, to communicate with the physical world in applications, such as security and surveillance, smart classroom, monitoring of natural habitats, and medical monitoring. WSNs differ considerably from current networked and embedded systems and due to its extreme energy constraints its design requires a proper understanding of the interplay between network protocols, energy-aware design, signal-processing algorithms, and distributed programming. Though the small form-factor of sensor nodes makes them attractable for use in monitoring applications, at the same time their small size affects resources such as the energy, computational power, and storage. Therefore, improvising on the energy constraints of wireless sensor networks is crucial. We propose two base-station relocation policies that aim to minimize the energy consumed for transmitting the data to base station. Both the policies involve a mobile base station, and focus on moving the base station closer to the active sensors that detect the target. Our first policy involves having a mobile base station and relocating it to the geometric centroid of all the sensors detecting the target. This approach significantly reduces the energy overhead required for transmitting data from the sensors to the base station. Our second policy for performing network lifetime optimization is to move the base station to geometric centroid of the base station locations obtained over several time periods. However, in each case, moving the base station at each time period involves a considerable overhead and therefore we observe the effects of moving the base station after a specific number of time periods as opposed to moving after every time period. We evaluate the network lifetime performance of these two proposed policies over different network scenarios.","PeriodicalId":366416,"journal":{"name":"2008 IEEE Conference on Technologies for Homeland Security","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132232220","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Information Architecture for Threat Detection Systems 威胁检测系统的信息体系结构
2008 IEEE Conference on Technologies for Homeland Security Pub Date : 2008-05-12 DOI: 10.1109/THS.2008.4534519
M. Schiefelbein
{"title":"Information Architecture for Threat Detection Systems","authors":"M. Schiefelbein","doi":"10.1109/THS.2008.4534519","DOIUrl":"https://doi.org/10.1109/THS.2008.4534519","url":null,"abstract":"An information-centric approach is necessary to design systems for threat detection, facility protection, and decision support. The Hanscom-Lincoln testbed architecture was developed with the understanding that information, both sensor data and contextual information, is the currency of all system components. The information architecture is agnostic with regard to sensing modalities and flexible with regard to data dissemination requirements. In addition, the architecture supports both fixed-site CONOPS (e.g. airport, subway, offices) and rapid-deployment CONOPS (e.g. convention, concert). Various proactive and reactive measures can be tested as well.","PeriodicalId":366416,"journal":{"name":"2008 IEEE Conference on Technologies for Homeland Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133246634","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A New Hybrid Static/Run-time Secure Memory Access Protection 一种新的混合静态/运行时安全内存访问保护
2008 IEEE Conference on Technologies for Homeland Security Pub Date : 2008-05-12 DOI: 10.1109/THS.2008.4534522
Nannan He, Xueqi Cheng, M. Hsiao
{"title":"A New Hybrid Static/Run-time Secure Memory Access Protection","authors":"Nannan He, Xueqi Cheng, M. Hsiao","doi":"10.1109/THS.2008.4534522","DOIUrl":"https://doi.org/10.1109/THS.2008.4534522","url":null,"abstract":"Secure memory access protection plays a critical role in making software systems resilient to malicious security attacks. Run-time checking is one of the major strategies that provides safe memory accesses. However, in many security-critical applications, the performance overhead due to the extra computation at runtime is often unacceptable. In order to reduce this cost, we propose a new strategy that minimizes the number of runtime checks by efficiently integrating the results from static software verification. Our strategy applies a verification approach called SAT-based software bounded model checking (BMC) to detect memory access violations as well as to prove the absence of such violations within a given bound statically, followed by a runtime checking to synergistically and completely secure the memory accesses. Our method makes use of static verification in a fine-grained manner, in which redundant runtime checks can be avoided for those safe accesses. Furthermore, with BMC, our strategy can provide the error traces useful for debugging if the instance is proved unsafe.","PeriodicalId":366416,"journal":{"name":"2008 IEEE Conference on Technologies for Homeland Security","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127463981","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Comparison of Zernike and Tchebichef Moments for Image Tampering Detection Sensitivity and Watermark Recovery Zernike矩与chebichef矩对图像篡改检测灵敏度和水印恢复的比较
2008 IEEE Conference on Technologies for Homeland Security Pub Date : 2008-05-12 DOI: 10.1109/THS.2008.4534524
S. M. Elshoura, D. Megherbi
{"title":"Comparison of Zernike and Tchebichef Moments for Image Tampering Detection Sensitivity and Watermark Recovery","authors":"S. M. Elshoura, D. Megherbi","doi":"10.1109/THS.2008.4534524","DOIUrl":"https://doi.org/10.1109/THS.2008.4534524","url":null,"abstract":"The main contribution of this paper is to present an empirical comparative study of Tchebichef and Zernike moments in image watermarking applications. In particular, we consider the case of moment-based watermarking schemes involving watermarks or their moments being hidden in the original image moments. Here, comparisons are in terms of higher image tampering sensitivity and better watermark extraction accuracy. We show that watermarks hidden in the low order Tchebichef moments of a given original image can be extracted and reconstructed with higher accuracy than in the case where they are rather hidden in the low order Zernike moments of the given image. We also show that the Tchebichef moments of a given image are more sensitive to intended or malicious image manipulations than its Zernike moments, and hence are more capable of detecting tampering performed on watermarked images during their transmission.","PeriodicalId":366416,"journal":{"name":"2008 IEEE Conference on Technologies for Homeland Security","volume":"97 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123203988","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Microfabricated Gas Chromatograph for Trace Analysis 微量分析用微型气相色谱仪
2008 IEEE Conference on Technologies for Homeland Security Pub Date : 2008-05-12 DOI: 10.1109/THS.2008.4534440
Rekha S. Pai, David R. Mott, J. Stepnowski, R. Mcgill, Bernadette A. Higgins, D. Simonson
{"title":"Microfabricated Gas Chromatograph for Trace Analysis","authors":"Rekha S. Pai, David R. Mott, J. Stepnowski, R. Mcgill, Bernadette A. Higgins, D. Simonson","doi":"10.1109/THS.2008.4534440","DOIUrl":"https://doi.org/10.1109/THS.2008.4534440","url":null,"abstract":"Microfabricated portable gas analyzers with high sensitivity and selectivity offer utility in a variety of critical applications including aviation security, food safety and toxic industrial waste monitoring. An integral component of such analyzers is the gas chromatographic (GC) column which is used for separations of an injected mixture based on the relative sorption of the various analytes in the carrier gas by the stationary phase. In this interim report, we describe our efforts in the design and development of a microfabricated GC column for the trace detection of hazardous chemicals. Specifically, in this work an optimized serpentine layout with a circular cross- sectional profile has been microfabricated. In this work, computational fluid dynamic (CFD) modeling has been employed as a method to aid in the GC column design optimization. Selectivity to hazardous hydrogen bond basic (HBB) analytes (e.g. TNT, GB, VX) was achieved by using an NRL developed hydrogen bond acid (HBA) sorbent polymer HCSFA2 as the stationary phase. HCSFA2 offers a higher partition coefficient than the more commonly used polysiloxanes.","PeriodicalId":366416,"journal":{"name":"2008 IEEE Conference on Technologies for Homeland Security","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124911330","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信