1993 Proceedings of IEEE International Carnahan Conference on Security Technology最新文献

筛选
英文 中文
Two complementary approaches to the full identification of automobile paints 两种互补的方法来全面识别汽车油漆
1993 Proceedings of IEEE International Carnahan Conference on Security Technology Pub Date : 1993-10-13 DOI: 10.1109/CCST.1993.386817
Y. Giang, W.-T. Chang, Y.-J. Wang, Ping-Chen Tsai, C.-W. Huang
{"title":"Two complementary approaches to the full identification of automobile paints","authors":"Y. Giang, W.-T. Chang, Y.-J. Wang, Ping-Chen Tsai, C.-W. Huang","doi":"10.1109/CCST.1993.386817","DOIUrl":"https://doi.org/10.1109/CCST.1993.386817","url":null,"abstract":"Pyrolysis/gas chromatography (Py-GC) and scanning electron microscope/energy dispersive X-ray spectrometry (SEM/EDX) are two commonly used methods for the identification of automobile paints. Some modifications were made on the conventional Py-GC to improve its discriminating power. Twelve exemplar samples of similar white remedy paint chip were unambiguously differentiated using this method. To further enhance the evidential value of automobile paints, nondestructive and convenient SEM/EDX is recommended whenever needed.<<ETX>>","PeriodicalId":404786,"journal":{"name":"1993 Proceedings of IEEE International Carnahan Conference on Security Technology","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1993-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127592555","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Securing a global village and its resources: Baseline security for interconnected Signaling System #7 telecommunications networks 保护地球村及其资源:互连信令系统#7电信网络的基线安全性
1993 Proceedings of IEEE International Carnahan Conference on Security Technology Pub Date : 1993-10-13 DOI: 10.1109/CCST.1993.386804
H. Kluepfel
{"title":"Securing a global village and its resources: Baseline security for interconnected Signaling System #7 telecommunications networks","authors":"H. Kluepfel","doi":"10.1109/CCST.1993.386804","DOIUrl":"https://doi.org/10.1109/CCST.1993.386804","url":null,"abstract":"The authors describes recent experience in countering the growing problem of network integrity security threats. He outlines the need for a security baseline standard for all SS7 (Signaling System #7) networked service providers. In describing the evolving intrusion threats to the global public network, he defines and comments on the seriousness of the problem. The important concept emphasized is that all service providers on the SS7 network may be placed at risk by the absence of effective security mechanisms in any one service provider's SS7 domain. The focus of the present work is to help define a baseline standard of due care on security applicable to any interconnectd SS7 service provider's or customer network to create a global industry equivalent to national and international trusted computer security evaluation criteria.<<ETX>>","PeriodicalId":404786,"journal":{"name":"1993 Proceedings of IEEE International Carnahan Conference on Security Technology","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1993-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117272109","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Development of computer-aided design software with standards for security engineering 安全工程标准计算机辅助设计软件的开发
1993 Proceedings of IEEE International Carnahan Conference on Security Technology Pub Date : 1993-10-13 DOI: 10.1109/CCST.1993.386795
A. Antelman, A. Miller, E. Rao
{"title":"Development of computer-aided design software with standards for security engineering","authors":"A. Antelman, A. Miller, E. Rao","doi":"10.1109/CCST.1993.386795","DOIUrl":"https://doi.org/10.1109/CCST.1993.386795","url":null,"abstract":"The authors give an overview of the development of computer-aided design (CAD) software with standards for security engineering. The intent of the developed software is to increase design productivity and generate CAD standards for security engineering.<<ETX>>","PeriodicalId":404786,"journal":{"name":"1993 Proceedings of IEEE International Carnahan Conference on Security Technology","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1993-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121402143","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
CCTV systems; adding value with new technology 闭路电视系统;用新技术增加价值
1993 Proceedings of IEEE International Carnahan Conference on Security Technology Pub Date : 1993-10-13 DOI: 10.1109/CCST.1993.386829
N. Custance
{"title":"CCTV systems; adding value with new technology","authors":"N. Custance","doi":"10.1109/CCST.1993.386829","DOIUrl":"https://doi.org/10.1109/CCST.1993.386829","url":null,"abstract":"The author examines the impact which new technologies and techniques will have upon both existing and future closed-circuit television (CCTV) systems. He considers devices ranging from video entry phones to advanced surveillance cameras and proposes ways in which value can be added by extending the range of functions which the devices can perform. Examples are presented which show how the value of CCTV systems will increase through the expansion of the basic imaging capability or through the use of CCTV within new, complex devices. Particular attention is given to the video entry phone and similar devices, where end users should expect to see products with much more flexibility and more functions. It is further noted that advances in computer technology will continue to impact upon the facilities and functions which operators have at their disposal, making through increased operator efficiency. Advanced surveillance camera systems are also considered.<<ETX>>","PeriodicalId":404786,"journal":{"name":"1993 Proceedings of IEEE International Carnahan Conference on Security Technology","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1993-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124555018","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Sequelagramy approach to the signature identification mixed with Chinese and English 续迹法进行中英文混合签名识别
1993 Proceedings of IEEE International Carnahan Conference on Security Technology Pub Date : 1993-10-13 DOI: 10.1109/CCST.1993.386836
C.-h. Lin, K. Chenyuan
{"title":"Sequelagramy approach to the signature identification mixed with Chinese and English","authors":"C.-h. Lin, K. Chenyuan","doi":"10.1109/CCST.1993.386836","DOIUrl":"https://doi.org/10.1109/CCST.1993.386836","url":null,"abstract":"The sequelagramy tracing method was applied to 344 signatures of English-speaking Chinese, especially those in southeast Asia. It is shown that, by looking at the sequence and/or form of letters/characters of signatures, one can obtain a positive conclusive identification of signatures without a large sample volume.<<ETX>>","PeriodicalId":404786,"journal":{"name":"1993 Proceedings of IEEE International Carnahan Conference on Security Technology","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1993-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129079583","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Transferring technology to the terrain 将技术转移到地形上
1993 Proceedings of IEEE International Carnahan Conference on Security Technology Pub Date : 1993-10-13 DOI: 10.1109/CCST.1993.386824
J. Howlett
{"title":"Transferring technology to the terrain","authors":"J. Howlett","doi":"10.1109/CCST.1993.386824","DOIUrl":"https://doi.org/10.1109/CCST.1993.386824","url":null,"abstract":"The author highlights a number of areas in which designers, specifiers, and system operators of perimeter intruder detection system (PIDSs) should be careful to pay particular attention to whether the full benefits of existing technology, and new technologies can be transferred from the supplier's warehouse into reliable operational systems on site. He recommends a thorough survey in close cooperation both with the site owners and the intended system operators. Selection of a suitable system should be underpinned by rigorous testing of a number of possible options prior to making a final choice. The importance of quality control during the installation phase is stressed. A method of carrying out nondestructive tests on fences by the use of a cut simulator tool is described. This allows quick-and-easy tests to be carried out reliably by the guard force or other nontechnical staff. The present work draws on assessment, installation, and maintenance experience in the author's organization at sites throughout the United Kingdom.<<ETX>>","PeriodicalId":404786,"journal":{"name":"1993 Proceedings of IEEE International Carnahan Conference on Security Technology","volume":"1945 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1993-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129181310","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An application of neural networks to reconstruct crime scene based on non-mark theory-suspicious factors analysis 基于非标记理论-可疑因素分析的神经网络重构犯罪现场
1993 Proceedings of IEEE International Carnahan Conference on Security Technology Pub Date : 1993-10-13 DOI: 10.1109/CCST.1993.386820
C. Kou, J.-M. Shih, C.-h. Lin, Z.-D. Lee
{"title":"An application of neural networks to reconstruct crime scene based on non-mark theory-suspicious factors analysis","authors":"C. Kou, J.-M. Shih, C.-h. Lin, Z.-D. Lee","doi":"10.1109/CCST.1993.386820","DOIUrl":"https://doi.org/10.1109/CCST.1993.386820","url":null,"abstract":"A non-mark theory methodology for investigating crime scenes is proposed. A back propagation network model is used to analyze suspicion factors in order to setup a dynamic knowledge based to help investigators.<<ETX>>","PeriodicalId":404786,"journal":{"name":"1993 Proceedings of IEEE International Carnahan Conference on Security Technology","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1993-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121204633","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
The emerging problem of technology and fraud prevention in the 1990's 20世纪90年代出现的技术和欺诈预防问题
1993 Proceedings of IEEE International Carnahan Conference on Security Technology Pub Date : 1993-10-13 DOI: 10.1109/CCST.1993.386837
D. Brown
{"title":"The emerging problem of technology and fraud prevention in the 1990's","authors":"D. Brown","doi":"10.1109/CCST.1993.386837","DOIUrl":"https://doi.org/10.1109/CCST.1993.386837","url":null,"abstract":"The development of a new security technique implemented on visa travel documents issued by the Canadian government is described. The concept was designed and developed for the Canadian government by combining emerging technologies and security printing techniques, creating a two-industry product called Enigma, the Machine Readable Security device (MRS).<<ETX>>","PeriodicalId":404786,"journal":{"name":"1993 Proceedings of IEEE International Carnahan Conference on Security Technology","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1993-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116859068","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Signal processing of gravitational field detector for prediction of large seismic waves 引力场探测器在大地震波预报中的信号处理
1993 Proceedings of IEEE International Carnahan Conference on Security Technology Pub Date : 1993-10-13 DOI: 10.1109/CCST.1993.386799
J. Chiba
{"title":"Signal processing of gravitational field detector for prediction of large seismic waves","authors":"J. Chiba","doi":"10.1109/CCST.1993.386799","DOIUrl":"https://doi.org/10.1109/CCST.1993.386799","url":null,"abstract":"The author describes the basic concept and signal processing of a gravitational field detector for prediction of large seismic waves. When the seismograph and the gravitational field detector are set at the same place, the seismograph does not respond until the arrival of the primary wave, but the gravitational field detector will respond to the gravitational field before the primary wave arrival. Therefore, a large seismic wave can be predicted according to gravitational field turbulence.<<ETX>>","PeriodicalId":404786,"journal":{"name":"1993 Proceedings of IEEE International Carnahan Conference on Security Technology","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1993-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115235554","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A basic study of the properties of accelerants in fire residues for better sampling in arson analysis 对火灾残留物中助燃剂的性质进行了初步研究,以便在纵火案分析中更好地取样
1993 Proceedings of IEEE International Carnahan Conference on Security Technology Pub Date : 1993-10-13 DOI: 10.1109/CCST.1993.386791
Y. Giang, W.-T. Chang, C. Wang, C.-W. Huang
{"title":"A basic study of the properties of accelerants in fire residues for better sampling in arson analysis","authors":"Y. Giang, W.-T. Chang, C. Wang, C.-W. Huang","doi":"10.1109/CCST.1993.386791","DOIUrl":"https://doi.org/10.1109/CCST.1993.386791","url":null,"abstract":"Some basic physical aspects of the accelerants in fire residues and their effects on the detectability of the added accelerants were investigated based on a few simple experiments conducted on various accelerants and matrices. In order to more precisely locate the points where the accelerants have been added by the arsonist and to decide what kind of sample container can best fit the established arson analysis procedure, a series of experiments were also performed including those assisted by a dog. It is concluded that the understanding of such basic properties as the volatility, osmosis, and adsorption of accelerants in various matrices can be very helpful for arson investigators. Canine detection shows much promise in helping fire investigators more precisely locate the exact spot where the accelerants have been added by the arsonist.<<ETX>>","PeriodicalId":404786,"journal":{"name":"1993 Proceedings of IEEE International Carnahan Conference on Security Technology","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1993-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124872448","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信