2014 International Carnahan Conference on Security Technology (ICCST)最新文献

筛选
英文 中文
Rapid inspection of general aviation aircraft for security threats and contraband 快速检查通用航空飞机的安全威胁和违禁品
2014 International Carnahan Conference on Security Technology (ICCST) Pub Date : 2014-12-18 DOI: 10.1109/CCST.2014.6987006
D. Dinca, J. Schubert
{"title":"Rapid inspection of general aviation aircraft for security threats and contraband","authors":"D. Dinca, J. Schubert","doi":"10.1109/CCST.2014.6987006","DOIUrl":"https://doi.org/10.1109/CCST.2014.6987006","url":null,"abstract":"In the US, inbound international general aviation flights need to be inspected daily. The objects of interest include explosives, weapons, currency, and contraband. An imaging system capable of seeing through the skin of the aircraft to identify suspicious items would considerably speed up the inspection process. For inspection of shipping containers, cars, trucks, and other vehicles, AS&E has fielded many hundreds of X-ray backscatter systems composed mostly of the Z Backscatter® Van and the Z Portal® system. Due to their complicated shapes, large variation in profiles and sizes, and particular operational settings, aircraft require a specialized type of scanner which has been developed by AS&E. Initial feasibility experiments have demonstrated that the X-ray backscatter method is very effective for detecting objects of interest inside aircraft of different types and sizes. Analysis of images illustrating the imaging tradeoffs is presented. In designing a product for this task the challenges are not limited to X-ray imaging. Due to operational issues, special considerations are needed for collision avoidance, zero-turn-radius, shape-following scanning, adaptive detection area, and video overlay. This paper details the requirements and tradeoffs involved in the system design, along with an overview of the prototype and its performance.","PeriodicalId":368721,"journal":{"name":"2014 International Carnahan Conference on Security Technology (ICCST)","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116341609","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Strengths, weaknesses and recommendations in implementing biometrics in mobile devices 在移动设备中实施生物识别技术的优势、劣势和建议
2014 International Carnahan Conference on Security Technology (ICCST) Pub Date : 2014-12-18 DOI: 10.1109/CCST.2014.6986973
R. Sánchez-Reillo, Daniel Sierra-Ramos, Roberto Estrada-Casarrubios, Jose A. Amores-Duran
{"title":"Strengths, weaknesses and recommendations in implementing biometrics in mobile devices","authors":"R. Sánchez-Reillo, Daniel Sierra-Ramos, Roberto Estrada-Casarrubios, Jose A. Amores-Duran","doi":"10.1109/CCST.2014.6986973","DOIUrl":"https://doi.org/10.1109/CCST.2014.6986973","url":null,"abstract":"Integrating biometrics in mobile applications imposes big challenges. This paper describes those challenges and proposes strategies to overcome them, illustrating them by 4 use cases that any mobile device should consider.","PeriodicalId":368721,"journal":{"name":"2014 International Carnahan Conference on Security Technology (ICCST)","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129960282","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Advanced portal-based multistatic millimeter-wave radar imaging for person security screening 先进的基于门户的多静态毫米波雷达成像,用于人员安全检查
2014 International Carnahan Conference on Security Technology (ICCST) Pub Date : 2014-12-18 DOI: 10.1109/CCST.2014.6987010
C. Rappaport, B. Gonzalez-Valdes, J. Lorenzo
{"title":"Advanced portal-based multistatic millimeter-wave radar imaging for person security screening","authors":"C. Rappaport, B. Gonzalez-Valdes, J. Lorenzo","doi":"10.1109/CCST.2014.6987010","DOIUrl":"https://doi.org/10.1109/CCST.2014.6987010","url":null,"abstract":"Millimeter-wave radar portal scanners are the most prevalent nearfield imaging passenger security systems. This paper presents an improved radar configuration that avoids dihedral artifacts, offers increased resolution, enhances depth information, allows for material characterization, and increases the overall percentage of well-imaged body regions, relative to currently-employed mm-wave systems. The improved system can produce accurate geometric reconstructions of the human body torso and body-borne metallic and non-metallic objects concealed under clothing with size as small as 1 cm. For this purpose, a multistatic Synthetic Radar Aperture (SAR) imaging system working in the 56-63 GHz frequency band, and a novel elliptic/parabolic reflector antenna design capable of providing wide illumination in azimuth and a very narrow beam in elevation is used. Narrow illumination enables independent processing of 2-dimensional contours of the human body, which can be mechanically translated and then stacked for a full 3D reconstruction. Fast and accurate SAR imaging techniques have been developed to recover the reflectivity of these stacked slices from the acquired scattered field. A first prototype of the mm-wave portal is presented in this contribution, together with an application example which clearly shows the system capability for detecting small objects placed on a manikin torso.","PeriodicalId":368721,"journal":{"name":"2014 International Carnahan Conference on Security Technology (ICCST)","volume":"88 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121213605","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Automated dependability analysis of a HDPE reactor HDPE反应器的自动化可靠性分析
2014 International Carnahan Conference on Security Technology (ICCST) Pub Date : 2014-12-18 DOI: 10.1109/CCST.2014.6987050
El-Arkam Mechhoud, M. Rouainia
{"title":"Automated dependability analysis of a HDPE reactor","authors":"El-Arkam Mechhoud, M. Rouainia","doi":"10.1109/CCST.2014.6987050","DOIUrl":"https://doi.org/10.1109/CCST.2014.6987050","url":null,"abstract":"The aim of our work is the implementation of a new approach for the dependability enhancement of a HDPE reactor (Skikda CP2K petrochemical plant) based on automated HAZOP analysis system including the digitization and automatization of the industrial system reliability analysis. After the system description, we present briefly the principle of the automated method. The system analysis in degraded mode is realized by the use of HAZOP method. This automated analysis brings out the different deviations of the all system in the CP2K plant operating parameters (Pressure, Flow, and Temperature). Possible causes of these deviations, their consequences and preventive actions are identified. The result is risks minimization and dependability enhancement of the considered system.","PeriodicalId":368721,"journal":{"name":"2014 International Carnahan Conference on Security Technology (ICCST)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132809759","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Evaluation of wavelet measures on automatic detection of emotion in noisy and telephony speech signals 小波变换在噪声语音信号和电话语音信号情感自动检测中的应用
2014 International Carnahan Conference on Security Technology (ICCST) Pub Date : 2014-12-18 DOI: 10.1109/CCST.2014.6986981
J. C. Vásquez-Correa, N. García, J. Vargas-Bonilla, J. Orozco-Arroyave, J. D. Arias-Londoño, M. Quintero
{"title":"Evaluation of wavelet measures on automatic detection of emotion in noisy and telephony speech signals","authors":"J. C. Vásquez-Correa, N. García, J. Vargas-Bonilla, J. Orozco-Arroyave, J. D. Arias-Londoño, M. Quintero","doi":"10.1109/CCST.2014.6986981","DOIUrl":"https://doi.org/10.1109/CCST.2014.6986981","url":null,"abstract":"Detection of emotion in humans from speech signals is a recent research field. One of the scenarios where this field has been applied is in situations where the human integrity and security are at risk. In this paper we are propossing a set of features based on the Teager energy operator, and several entropy measures obtained from the decomposition signals from discrete wavelet transform to characterize different types of negative emotions such as anger, anxiety, disgust, and desperation. The features are measured in three different conditions: (1) the original speech signals, (2) the signals that are contaminated with noise, or are affected by the presence of a phone channel, and (3) the signals that are obtained after processing using an algorithm for Speech Enhancement based on Karhunen-Love Transform. According to the results, when the speech enhancement is applied, the detection of emotion in speech is increased in up to 22% compared to results obtained when the speech signal is highly contaminated with noise.","PeriodicalId":368721,"journal":{"name":"2014 International Carnahan Conference on Security Technology (ICCST)","volume":"136 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123208151","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
A safer way to share a car based on SNS to increase use efficiency of released vehicles 一种基于SNS的更安全的拼车方式,提高车辆的使用效率
2014 International Carnahan Conference on Security Technology (ICCST) Pub Date : 2014-12-18 DOI: 10.1109/CCST.2014.6987042
Myunghee Son, Okgee Min, Jonghwan Kim, Sung Hoon Baek
{"title":"A safer way to share a car based on SNS to increase use efficiency of released vehicles","authors":"Myunghee Son, Okgee Min, Jonghwan Kim, Sung Hoon Baek","doi":"10.1109/CCST.2014.6987042","DOIUrl":"https://doi.org/10.1109/CCST.2014.6987042","url":null,"abstract":"Due to rapid urbanization, a parking space in cities is very insufficient, and moreover, a use efficiency of released vehicles is greatly reduced. To solve such problems, a car sharing service has been introduced, but focuses on a service that overcomes limitations of rental cars. Our paper is focused on providing the safest car sharing service based on SNS(Social Networking Service) to increase a use efficiency of released vehicles. More particularly, a direct transaction between a car sharing service provider and a user can be provided. Therefore, it is not required to separately construct an infrastructure for the car sharing service. Our paper can be contributed to maximize the usability of the used car and to solve a problem which is lack of parking lots by using the cyber security mechanism.","PeriodicalId":368721,"journal":{"name":"2014 International Carnahan Conference on Security Technology (ICCST)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123551863","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Towards Security as a Service (SecaaS): On the modeling of Security Services for Cloud Computing 面向安全即服务(SecaaS):关于云计算安全服务的建模
2014 International Carnahan Conference on Security Technology (ICCST) Pub Date : 2014-12-18 DOI: 10.1109/CCST.2014.6986995
A. Furfaro, A. Garro, A. Tundis
{"title":"Towards Security as a Service (SecaaS): On the modeling of Security Services for Cloud Computing","authors":"A. Furfaro, A. Garro, A. Tundis","doi":"10.1109/CCST.2014.6986995","DOIUrl":"https://doi.org/10.1109/CCST.2014.6986995","url":null,"abstract":"The security of software services accessible via the Internet has always been a crosscutting non-functional requirement of uttermost importance. The recent advent of the Cloud Computing paradigm and its wide diffusion has given birth to new challenges towards the securing of existing Cloud services, by properly accounting the issues related to their delivery models and their usage patterns, and has opened the way to the new concept of Security as a Service(SecaaS), i.e. the ability of developing reusable software services which can be composed with standard Cloud services in order to offer them the suitable security features. In this context, there is a strong need for methods and tools for the modeling of security concerns, as well as for evaluation techniques, for supporting both the comparison of different design choices and the analysis of their impact on the behavior of new services before their actual realization. This paper proposes a meta-model for supporting the modeling of Security Services in a Cloud Computing environment as well as an approach for guiding the identification and the integration of security services within the standard Cloud delivery models. The proposal is exemplified through a case study.","PeriodicalId":368721,"journal":{"name":"2014 International Carnahan Conference on Security Technology (ICCST)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123838028","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 35
GPU: Application for CCTV systems GPU: CCTV系统的应用
2014 International Carnahan Conference on Security Technology (ICCST) Pub Date : 2014-12-18 DOI: 10.1109/CCST.2014.6987028
V. Saiz, Fernan Gallego
{"title":"GPU: Application for CCTV systems","authors":"V. Saiz, Fernan Gallego","doi":"10.1109/CCST.2014.6987028","DOIUrl":"https://doi.org/10.1109/CCST.2014.6987028","url":null,"abstract":"Current generation GPU's are really powerful, with lots of stream processors, fast memory and in some cases hardware video decoding support. Their prices are low and support multiple high resolution outputs. Its main use is in CAD applications and Video-games due they geometry processing capabilities, but they are really good at image processing. That makes them ideal for CCTV rendering. Traditional CCTV systems are based on a stack of decoder cards with analog outputs. These systems are expensive and hard to install due to its physical connections. We can replace such a system with a PC with a good GPU card. This system presents some advantages over the analog solution: it can use an existing network installation, can show any source that the PC can receive (HTML, VNC, Capturers, etc), can mix analog and IP cameras and the GPU shader capabilities permits apply complex filters to the video. Moreover, we can use the GPU video analysis (motion detection, face recognition, etc). In this paper we present a system aid to decode and render multiple video sources, based on a PC platform (but feasible in any platform with a modern GPU, we have it running on a Raspberry Pi) capable of decoding and rendering close to 100 video streams on a current system, with support of 24 monitors in a single machine. This system is already working and installed in multiple places with good results.","PeriodicalId":368721,"journal":{"name":"2014 International Carnahan Conference on Security Technology (ICCST)","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126304414","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
EMBERS: EpheMeral biometrically enhanced real-time location System 余烬:短暂的生物识别增强实时定位系统
2014 International Carnahan Conference on Security Technology (ICCST) Pub Date : 2014-12-18 DOI: 10.1109/CCST.2014.6986971
Sung Choi, M. Bierma, Yung Ryn Choe, David Zage
{"title":"EMBERS: EpheMeral biometrically enhanced real-time location System","authors":"Sung Choi, M. Bierma, Yung Ryn Choe, David Zage","doi":"10.1109/CCST.2014.6986971","DOIUrl":"https://doi.org/10.1109/CCST.2014.6986971","url":null,"abstract":"In nuclear facilities, having efficient accountability of critical assets, personnel locations, and activities is essential for productive, safe, and secure operations. Such accountability tracked through standard manual procedures is highly inefficient and prone to human error. The ability to actively and autonomously monitor both personnel and critical assets can significantly enhance security and safety operations while removing significant levels of human reliability issues and reducing insider threat concerns. A Real-Time Location System (RTLS) encompasses several technologies that use wireless signals to determine the precise location of tagged critical assets or personnel. RTLS systems include tags that either transmit or receive signals at regular intervals, location sensors/beacons that receive/transmit signals, and a location appliance that collects and correlates the data. Combined with ephemeral biometrics (EB) to validate the live-state of a user, an ephemeral biometrically-enhanced RTLS (EMBERS) can eliminate time-consuming manual searches and audits by providing precise location data. If critical assets or people leave a defined secured area, EMBERS can automatically trigger an alert and function as an access control mechanism and/or ingress/egress monitoring tool. Three different EMBERS application scenarios for safety and security have been analyzed and the heuristic results of this study are outlined in this paper along with areas of technological improvements and innovations that can be made if EMBERS is to be used as safety and security tool.","PeriodicalId":368721,"journal":{"name":"2014 International Carnahan Conference on Security Technology (ICCST)","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126340804","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Screening technology based on DMS as an effective tool to help protect public and vital infrastructure from threats 基于DMS的筛选技术是帮助保护公共和重要基础设施免受威胁的有效工具
2014 International Carnahan Conference on Security Technology (ICCST) Pub Date : 2014-12-18 DOI: 10.1109/CCST.2014.6987003
A. Zalewska, T. Sikora, A. Buczkowska
{"title":"Screening technology based on DMS as an effective tool to help protect public and vital infrastructure from threats","authors":"A. Zalewska, T. Sikora, A. Buczkowska","doi":"10.1109/CCST.2014.6987003","DOIUrl":"https://doi.org/10.1109/CCST.2014.6987003","url":null,"abstract":"In the past few years terrorism became one of the biggest threat for the public life and that why in now days one of most important civilization problems is to guarantee safety for the civilians. Most often occurring form of terrorism is usage of explosives, which result is definitely greater number of casualties per year than in case of use biological, chemical or even radiological substances. Explosives for the reason that are easy to reach, have wide and specific range of use, belong to the group of substances widely used in military operations as well as in acts of terrorism. Because of this it is crucial to effective and fast detection even in traces amount, what is directly connected with necessity providing analytical apparatus using technical novelties. There are many known techniques used for explosives detection but diverse places and ways of their use as well as requirement of really low detection limit allowing for detection on the “dog's nose” level are reason for their continues improvement. One of the methods used for detection of traces amount of explosives is differential ion mobility spectrometry (DMS) which allows for detection of very low concentration analyzed substances. In Military Institute of Chemistry and Radiometry was made portable contamination signaling device (PRS-1) used for detection and identification wide range of chemical substances. PRS-1 was constructed based on the technique of gluing ceramic tiles and technology of depositing sensor electrodes on them. It is designed for the detection of chemical warfare agents, and initial testing of the detection explosives yielded positive results and form the basis for the concept of further research. Innovative solutions applied to the device PRS-1 cause that its technical parameters are very high - one of the best in the world.","PeriodicalId":368721,"journal":{"name":"2014 International Carnahan Conference on Security Technology (ICCST)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128068893","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信