Proceedings 39th Annual 2005 International Carnahan Conference on Security Technology最新文献

筛选
英文 中文
Towards microscope-video-based fire-detection 走向基于显微镜视频的火灾探测
T. Schultze, I. Willms
{"title":"Towards microscope-video-based fire-detection","authors":"T. Schultze, I. Willms","doi":"10.1109/CCST.2005.1594868","DOIUrl":"https://doi.org/10.1109/CCST.2005.1594868","url":null,"abstract":"Nowadays, video-based fire-detection is a nearly common application, as the number of installed surveillance video-systems is growing and the related processing units getting more powerful. The fire-detection-feature is usually only an add-on feature of 'intelligent' surveillance video-systems. The detection-criteria are therefore based on macroscopic characteristics observable in the surveillance video, like particular smoke dynamics, flame flickering or loss of image contrast due to obscuration by the smoke. In a new approach not the macroscopic, but the microscopic characteristics of aerosols are analysed with view to a more reliable discrimination between fire and non-fire aerosols. By monitoring an illuminated sheet of air some centimeters under the ceiling of a room, it is possible to get information about a limited range of the particle size distribution, density and flow characteristics of the suspended aerosol. A prototype of the scanning system has been developed and a series of test-fires (according to the EN54) and non-fire tests has been carried out in the Duisburg-Fire-Detection-Laboratory. The comparison between the test-fires and the non-fire scenarios shows that the discrimination between fire and non-fire aerosols is cogitable. The analyses of the aerosol characteristics are based on adapted pattern recognition techniques applied in the image processing. Some differences between different aerosol types are even visible to the naked eye. This paper presents the developed prototype specifying important features. Afterwards the most interesting results are shown and commented. Finally, the possibilities and limitations of an automatic fire-detection system based on the microscope-video analysis are discussed.","PeriodicalId":411051,"journal":{"name":"Proceedings 39th Annual 2005 International Carnahan Conference on Security Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123710916","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Scenario based threat detection and attack analysis 基于场景的威胁检测和攻击分析
P. Hsiu, Chin-Fu Kuo, Tei-Wei Kuo, E.Y.T. Juan
{"title":"Scenario based threat detection and attack analysis","authors":"P. Hsiu, Chin-Fu Kuo, Tei-Wei Kuo, E.Y.T. Juan","doi":"10.1109/CCST.2005.1594819","DOIUrl":"https://doi.org/10.1109/CCST.2005.1594819","url":null,"abstract":"This paper targets two essential issues in intrusion detection system designs: the optimization of rule selection and the attack discovery in attack analysis. A scenario-based approach is proposed to correlate malicious packets and to intelligently select intrusion detection rules to fire. We propose algorithms for rule selection and attack scenario identification. Potential threats and their relationship for a gateway and Web-server applications are explored as an example in the study. The proposed algorithms are implemented over Snort, a signature-based intrusion detection system, for which we have some encouraging performance evaluation results.","PeriodicalId":411051,"journal":{"name":"Proceedings 39th Annual 2005 International Carnahan Conference on Security Technology","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121755538","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Review of security inspection networking system development in China airports and its trend in the future 中国机场安检联网系统发展概况及未来发展趋势
D. Li, Huimin Chen
{"title":"Review of security inspection networking system development in China airports and its trend in the future","authors":"D. Li, Huimin Chen","doi":"10.1109/CCST.2005.1594825","DOIUrl":"https://doi.org/10.1109/CCST.2005.1594825","url":null,"abstract":"A new security inspection networking system, meeting objectives and functions required by the scheme of flow renovation of security inspection (FRSI) from Civil Aviation Administration of China (CAAC), was first developed and quickly deployed in many airports in China in the 1990's for 100% checked bag screening. During these years, the system was modified and retrofitted to integrate data from different inspection equipment, together packed with data of passenger and screener. This guarantees the consistency of the images and relevant passengers and keep screeners highly alert on duty. A broad marketing demand is still existed nowadays due to its special advantages. Although newly developed screening equipment such as advanced technology (AT) equipment and explosive detection system (EDS) have been widely used today, we still face the challenge of building a networked security inspection management system for all enforcement departments in airport. More work should be done to meet the needs and the forward steps never stop.","PeriodicalId":411051,"journal":{"name":"Proceedings 39th Annual 2005 International Carnahan Conference on Security Technology","volume":"2016 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128035711","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Secured key exchange protocol in wireless mobile ad hoc networks 无线移动自组网中的安全密钥交换协议
S. Liaw, Pin-Chang Su, H. Chang, E. Lu, S. Pon
{"title":"Secured key exchange protocol in wireless mobile ad hoc networks","authors":"S. Liaw, Pin-Chang Su, H. Chang, E. Lu, S. Pon","doi":"10.1109/CCST.2005.1594839","DOIUrl":"https://doi.org/10.1109/CCST.2005.1594839","url":null,"abstract":"Wireless mobile ad hoc networks (MANET) are an emerging area of mobile computing. Security issues concerning MANET are attracting increasing attention nowadays. MANET is a new wireless networking paradigm without a fixed infrastructure, and includes base stations or mobile switching centers. Mobile nodes rely on each other to maintain the network connection. In this paper, a secured identity-based key exchange protocol is proposed for networks in environments without any public key infrastructure. This investigation proposes a secured key exchange protocol without the auxiliary of certification authority for application to wireless mobile ad hoc networks. This protocol solved the security problem in the MANET and is suitable for application to other wired network structures.","PeriodicalId":411051,"journal":{"name":"Proceedings 39th Annual 2005 International Carnahan Conference on Security Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133651064","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
New detection algorithm of extended targets for radar and electro optical sensors 雷达与电光传感器扩展目标检测新算法
J.C. Gallego, F.P. Martinez, A. Asensio-López
{"title":"New detection algorithm of extended targets for radar and electro optical sensors","authors":"J.C. Gallego, F.P. Martinez, A. Asensio-López","doi":"10.1109/CCST.2005.1594851","DOIUrl":"https://doi.org/10.1109/CCST.2005.1594851","url":null,"abstract":"This paper presents a new technique able to detect extended targets (small ones and big ones) (Ostrovityanov and Basalov, 1985), under very low signal to noise ratios (SNR) and signal to clutter ratios (SCR) with a high probability of detection and a low probability of false alarm. The method is based on the calculation of some modified statistical descriptors (Gonzalez and Woods, 2002), and the peak plots (Rihaczek and Hershkowitz, 2000) from raw sensor image. The peak plots are extracted by means of the shift-and-convolution technique (Perez Martinez et al., 2001). Experimental results are also presented demonstrating the quality of this technique. Experimental results have been obtained with ARIES radar (Perez et al., 2002), a surface marine and coast surveillance LFM-CW high resolution radar (HRR) (Wehner, 1995) developed by INDRA SISTEMAS S.A. in collaboration with the Technical University of Madrid. The Spanish Ministry of Defence has founded this research.","PeriodicalId":411051,"journal":{"name":"Proceedings 39th Annual 2005 International Carnahan Conference on Security Technology","volume":"33 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114059419","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Intelligent video systems for perimeter and secured entry access control 用于周边和安全入口访问控制的智能视频系统
D.L. Wilson
{"title":"Intelligent video systems for perimeter and secured entry access control","authors":"D.L. Wilson","doi":"10.1109/CCST.2005.1594822","DOIUrl":"https://doi.org/10.1109/CCST.2005.1594822","url":null,"abstract":"The continued threat of terrorism has spurred the development of sophisticated systems that enhance transportation security and monitoring. Much emphasis has been placed on systems that facilitate threat identification and responder intervention and enable the tracking and identification of people inside, outside or along perimeters of transportation facilities (airports, railways, ports, etc.). The most unpredictable element in any transportation facility is the sheer number of people having access. Identifying a suspicious individual or a threatening activity and then monitoring a person or threat through a crowded and unpredictable path present a most challenging task for even the most experienced of security personnel. Automated intelligent video systems are gaining in popularity and capitalize on advances in computer, camera and networking hardware, as well as the maturation of computer imaging and vision algorithms. These systems are designed to integrate with legacy systems and enhance existing infrastructure protection to facilitate an effective and risk favorable apprehension of security violators/intruders.","PeriodicalId":411051,"journal":{"name":"Proceedings 39th Annual 2005 International Carnahan Conference on Security Technology","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116469867","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Secure agent-based management for pervasive environments 针对普及环境的基于安全代理的管理
G. Navarro, J. A. Ortega-Ruiz, J. Garcia, S. Robles
{"title":"Secure agent-based management for pervasive environments","authors":"G. Navarro, J. A. Ortega-Ruiz, J. Garcia, S. Robles","doi":"10.1109/CCST.2005.1594864","DOIUrl":"https://doi.org/10.1109/CCST.2005.1594864","url":null,"abstract":"A typical pervasive computing scenario may consist of a wide range of devices interconnected through ad-hoc networks. One of the problems that pervasive computing introduces is the management and interaction between these devices, as well as the security implications of this management. We present in this paper an architecture, which provides initial mechanisms to solve these problems. Inspired by trust management systems, our architecture is built on top of a multi-agent system. However, our proposal is sufficiently open to allow the integration with other technologies. Results of our work can be easily applied to existing pervasive computing software and associated technologies.","PeriodicalId":411051,"journal":{"name":"Proceedings 39th Annual 2005 International Carnahan Conference on Security Technology","volume":"515 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123080175","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Perimeter intruder detection systems performance standard 周边入侵者检测系统性能标准
D. Armstrong, C. Peile
{"title":"Perimeter intruder detection systems performance standard","authors":"D. Armstrong, C. Peile","doi":"10.1109/CCST.2005.1594845","DOIUrl":"https://doi.org/10.1109/CCST.2005.1594845","url":null,"abstract":"This paper includes discussion of the main high level principles upon which the development of the standards is based. These are: impartiality; objectivity; reproducibility (precision by other organisations); repeatability (precision by the same tester); validity and, of course, accuracy. A comparison is made between application and technology specific based testing in order to demonstrate why the former is most suited to the PIDS performance standard. The paper then addresses the key characteristics of a PIDS (false alarm rate, detection rate, and vulnerability to defeat) and suggest how these could be assessed as part of a general evaluation methodology in order to give the end user the required level of information. Finally, an update on the progress of the drafting of the standard is given","PeriodicalId":411051,"journal":{"name":"Proceedings 39th Annual 2005 International Carnahan Conference on Security Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130968069","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Digital text watermarking: secure content delivery and data hiding in digital documents 数字文本水印:在数字文档中安全的内容传递和数据隐藏
M. Qadir, I. Ahmad
{"title":"Digital text watermarking: secure content delivery and data hiding in digital documents","authors":"M. Qadir, I. Ahmad","doi":"10.1109/MAES.2006.284353","DOIUrl":"https://doi.org/10.1109/MAES.2006.284353","url":null,"abstract":"Secure communication of data over public channel is one of the most important challenges. Both the activities to secure contents and to break security are very hot. In order to reduce the chances of attack, security need to be made invisible. Need to preserve originality, ownership information and integrity of text documents in a way that cannot be identified by every one is being felt badly. Watermarking of the documents is a step towards achieving these objectives. However to watermark a plain text document (ASCII) in a way that original text is not changed and it would be very difficult to break it, is a great challenge. We have developed a novel encoding scheme, which can be used to insert information in a plain text without changing the text. A system has been developed based upon this encoding scheme. This paper describes the system and demonstrates its working.","PeriodicalId":411051,"journal":{"name":"Proceedings 39th Annual 2005 International Carnahan Conference on Security Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131350986","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 42
A security evaluation methodology for smart cards against electromagnetic analysis 针对电磁分析的智能卡安全评估方法
Huiyun Li, A. T. Markettos, S. Moore
{"title":"A security evaluation methodology for smart cards against electromagnetic analysis","authors":"Huiyun Li, A. T. Markettos, S. Moore","doi":"10.1109/CCST.2005.1594857","DOIUrl":"https://doi.org/10.1109/CCST.2005.1594857","url":null,"abstract":"Cryptographic processors can be vulnerable in electromagnetic analysis (EMA) attacks due to their EM side-channel leakage. A design-time security evaluation methodology has been proposed to assess the security level of cryptographic processors against EMA attacks. This EM simulation methodology involves current flow simulation, chip layout parasitics extraction then data processing to simulate direct EM emissions or modulated emissions. The proposed simulation methodology can be easily employed in the framework of an integrated circuit (IC) design flow to perform a systematic EM characteristics analysis","PeriodicalId":411051,"journal":{"name":"Proceedings 39th Annual 2005 International Carnahan Conference on Security Technology","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123980057","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信