Y. Giang, W.-T. Chang, Y.-J. Wang, Ping-Chen Tsai, C.-W. Huang
{"title":"Two complementary approaches to the full identification of automobile paints","authors":"Y. Giang, W.-T. Chang, Y.-J. Wang, Ping-Chen Tsai, C.-W. Huang","doi":"10.1109/CCST.1993.386817","DOIUrl":"https://doi.org/10.1109/CCST.1993.386817","url":null,"abstract":"Pyrolysis/gas chromatography (Py-GC) and scanning electron microscope/energy dispersive X-ray spectrometry (SEM/EDX) are two commonly used methods for the identification of automobile paints. Some modifications were made on the conventional Py-GC to improve its discriminating power. Twelve exemplar samples of similar white remedy paint chip were unambiguously differentiated using this method. To further enhance the evidential value of automobile paints, nondestructive and convenient SEM/EDX is recommended whenever needed.<<ETX>>","PeriodicalId":404786,"journal":{"name":"1993 Proceedings of IEEE International Carnahan Conference on Security Technology","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1993-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127592555","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Securing a global village and its resources: Baseline security for interconnected Signaling System #7 telecommunications networks","authors":"H. Kluepfel","doi":"10.1109/CCST.1993.386804","DOIUrl":"https://doi.org/10.1109/CCST.1993.386804","url":null,"abstract":"The authors describes recent experience in countering the growing problem of network integrity security threats. He outlines the need for a security baseline standard for all SS7 (Signaling System #7) networked service providers. In describing the evolving intrusion threats to the global public network, he defines and comments on the seriousness of the problem. The important concept emphasized is that all service providers on the SS7 network may be placed at risk by the absence of effective security mechanisms in any one service provider's SS7 domain. The focus of the present work is to help define a baseline standard of due care on security applicable to any interconnectd SS7 service provider's or customer network to create a global industry equivalent to national and international trusted computer security evaluation criteria.<<ETX>>","PeriodicalId":404786,"journal":{"name":"1993 Proceedings of IEEE International Carnahan Conference on Security Technology","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1993-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117272109","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Development of computer-aided design software with standards for security engineering","authors":"A. Antelman, A. Miller, E. Rao","doi":"10.1109/CCST.1993.386795","DOIUrl":"https://doi.org/10.1109/CCST.1993.386795","url":null,"abstract":"The authors give an overview of the development of computer-aided design (CAD) software with standards for security engineering. The intent of the developed software is to increase design productivity and generate CAD standards for security engineering.<<ETX>>","PeriodicalId":404786,"journal":{"name":"1993 Proceedings of IEEE International Carnahan Conference on Security Technology","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1993-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121402143","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"CCTV systems; adding value with new technology","authors":"N. Custance","doi":"10.1109/CCST.1993.386829","DOIUrl":"https://doi.org/10.1109/CCST.1993.386829","url":null,"abstract":"The author examines the impact which new technologies and techniques will have upon both existing and future closed-circuit television (CCTV) systems. He considers devices ranging from video entry phones to advanced surveillance cameras and proposes ways in which value can be added by extending the range of functions which the devices can perform. Examples are presented which show how the value of CCTV systems will increase through the expansion of the basic imaging capability or through the use of CCTV within new, complex devices. Particular attention is given to the video entry phone and similar devices, where end users should expect to see products with much more flexibility and more functions. It is further noted that advances in computer technology will continue to impact upon the facilities and functions which operators have at their disposal, making through increased operator efficiency. Advanced surveillance camera systems are also considered.<<ETX>>","PeriodicalId":404786,"journal":{"name":"1993 Proceedings of IEEE International Carnahan Conference on Security Technology","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1993-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124555018","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Sequelagramy approach to the signature identification mixed with Chinese and English","authors":"C.-h. Lin, K. Chenyuan","doi":"10.1109/CCST.1993.386836","DOIUrl":"https://doi.org/10.1109/CCST.1993.386836","url":null,"abstract":"The sequelagramy tracing method was applied to 344 signatures of English-speaking Chinese, especially those in southeast Asia. It is shown that, by looking at the sequence and/or form of letters/characters of signatures, one can obtain a positive conclusive identification of signatures without a large sample volume.<<ETX>>","PeriodicalId":404786,"journal":{"name":"1993 Proceedings of IEEE International Carnahan Conference on Security Technology","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1993-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129079583","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Transferring technology to the terrain","authors":"J. Howlett","doi":"10.1109/CCST.1993.386824","DOIUrl":"https://doi.org/10.1109/CCST.1993.386824","url":null,"abstract":"The author highlights a number of areas in which designers, specifiers, and system operators of perimeter intruder detection system (PIDSs) should be careful to pay particular attention to whether the full benefits of existing technology, and new technologies can be transferred from the supplier's warehouse into reliable operational systems on site. He recommends a thorough survey in close cooperation both with the site owners and the intended system operators. Selection of a suitable system should be underpinned by rigorous testing of a number of possible options prior to making a final choice. The importance of quality control during the installation phase is stressed. A method of carrying out nondestructive tests on fences by the use of a cut simulator tool is described. This allows quick-and-easy tests to be carried out reliably by the guard force or other nontechnical staff. The present work draws on assessment, installation, and maintenance experience in the author's organization at sites throughout the United Kingdom.<<ETX>>","PeriodicalId":404786,"journal":{"name":"1993 Proceedings of IEEE International Carnahan Conference on Security Technology","volume":"1945 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1993-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129181310","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An application of neural networks to reconstruct crime scene based on non-mark theory-suspicious factors analysis","authors":"C. Kou, J.-M. Shih, C.-h. Lin, Z.-D. Lee","doi":"10.1109/CCST.1993.386820","DOIUrl":"https://doi.org/10.1109/CCST.1993.386820","url":null,"abstract":"A non-mark theory methodology for investigating crime scenes is proposed. A back propagation network model is used to analyze suspicion factors in order to setup a dynamic knowledge based to help investigators.<<ETX>>","PeriodicalId":404786,"journal":{"name":"1993 Proceedings of IEEE International Carnahan Conference on Security Technology","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1993-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121204633","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The emerging problem of technology and fraud prevention in the 1990's","authors":"D. Brown","doi":"10.1109/CCST.1993.386837","DOIUrl":"https://doi.org/10.1109/CCST.1993.386837","url":null,"abstract":"The development of a new security technique implemented on visa travel documents issued by the Canadian government is described. The concept was designed and developed for the Canadian government by combining emerging technologies and security printing techniques, creating a two-industry product called Enigma, the Machine Readable Security device (MRS).<<ETX>>","PeriodicalId":404786,"journal":{"name":"1993 Proceedings of IEEE International Carnahan Conference on Security Technology","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1993-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116859068","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Signal processing of gravitational field detector for prediction of large seismic waves","authors":"J. Chiba","doi":"10.1109/CCST.1993.386799","DOIUrl":"https://doi.org/10.1109/CCST.1993.386799","url":null,"abstract":"The author describes the basic concept and signal processing of a gravitational field detector for prediction of large seismic waves. When the seismograph and the gravitational field detector are set at the same place, the seismograph does not respond until the arrival of the primary wave, but the gravitational field detector will respond to the gravitational field before the primary wave arrival. Therefore, a large seismic wave can be predicted according to gravitational field turbulence.<<ETX>>","PeriodicalId":404786,"journal":{"name":"1993 Proceedings of IEEE International Carnahan Conference on Security Technology","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1993-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115235554","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A basic study of the properties of accelerants in fire residues for better sampling in arson analysis","authors":"Y. Giang, W.-T. Chang, C. Wang, C.-W. Huang","doi":"10.1109/CCST.1993.386791","DOIUrl":"https://doi.org/10.1109/CCST.1993.386791","url":null,"abstract":"Some basic physical aspects of the accelerants in fire residues and their effects on the detectability of the added accelerants were investigated based on a few simple experiments conducted on various accelerants and matrices. In order to more precisely locate the points where the accelerants have been added by the arsonist and to decide what kind of sample container can best fit the established arson analysis procedure, a series of experiments were also performed including those assisted by a dog. It is concluded that the understanding of such basic properties as the volatility, osmosis, and adsorption of accelerants in various matrices can be very helpful for arson investigators. Canine detection shows much promise in helping fire investigators more precisely locate the exact spot where the accelerants have been added by the arsonist.<<ETX>>","PeriodicalId":404786,"journal":{"name":"1993 Proceedings of IEEE International Carnahan Conference on Security Technology","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1993-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124872448","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}