2007 IEEE Conference on Technologies for Homeland Security最新文献

筛选
英文 中文
A Distributed Event-triggered Knowledge Sharing System for Agricultural Homeland Security 面向农业国土安全的分布式事件触发知识共享系统
2007 IEEE Conference on Technologies for Homeland Security Pub Date : 2007-05-16 DOI: 10.1109/THS.2007.370042
S. Degwekar, J. DePree, H. Beck, S. Su
{"title":"A Distributed Event-triggered Knowledge Sharing System for Agricultural Homeland Security","authors":"S. Degwekar, J. DePree, H. Beck, S. Su","doi":"10.1109/THS.2007.370042","DOIUrl":"https://doi.org/10.1109/THS.2007.370042","url":null,"abstract":"Government agencies globally are facing problems like illegal immigration, terrorism, and disease diagnostics and control. Solutions to these problems rely heavily on collaborating organizations' ability to effectively and efficiently share not only data but also knowledge embedded in organizational and inter-organizational policies, regulations, data and security constraints, processes and procedures. The United States Department of Agriculture has launched a multi-year national project to build the National Plant Diagnostic Network (NPDN) for strengthening the homeland security protection of food and agriculture by connecting five regional plant diagnostic centers with a national center. Complementing this effort, our research team has been developing a web-based, distributed system for event-triggered knowledge sharing among NPDN organizations. We capture multi-faceted knowledge using three types of rules and rule structures. A user-friendly interface is provided for collaborating organizations to define events of interest as well as knowledge rules and publish them in a global registry for browsing, querying, event subscription and notification, and processing. Event data are the dots that can be connected across organizational boundaries through the interoperation of knowledge rules and rule structures.","PeriodicalId":428684,"journal":{"name":"2007 IEEE Conference on Technologies for Homeland Security","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133579004","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Improving Collaborative Situation Awareness with Transmedial Infrastructure 通过跨医疗基础设施提高协作态势感知
2007 IEEE Conference on Technologies for Homeland Security Pub Date : 2007-05-16 DOI: 10.1109/THS.2007.370060
V.S. Wu, F. Velander
{"title":"Improving Collaborative Situation Awareness with Transmedial Infrastructure","authors":"V.S. Wu, F. Velander","doi":"10.1109/THS.2007.370060","DOIUrl":"https://doi.org/10.1109/THS.2007.370060","url":null,"abstract":"When attacks or natural disasters occur, emergency response organizations rely on Tactical Operations Center for situation awareness. Currently, there is a lack of connectivity and real-time data management across all agencies. Without a technology to support the harvesting and dissemination of real-time data relevant to each agent's roles and responsibilities, inter-agency communication can often be difficult and chaotic. Whether at the TOC or on-site, the combined use of fixed and mobile devices to access a common relevant picture makes each agent into an active node; as more nodes are networked in, the big picture of what's happening becomes increasingly clearer. This paper discusses how transmedial technologies can transform each agent into a network of nodes for collaborative situation awareness.","PeriodicalId":428684,"journal":{"name":"2007 IEEE Conference on Technologies for Homeland Security","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129816768","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Components of Continuous IT Availability & Disaster Tolerant Computing: 2007 IEEE Conference on Technologies for Homeland Security: Enhancing Critical Infrastructure Dependability 持续IT可用性和容灾计算组件:2007年IEEE国土安全技术会议:增强关键基础设施的可靠性
2007 IEEE Conference on Technologies for Homeland Security Pub Date : 2007-05-16 DOI: 10.1109/THS.2007.370028
Chad M. Lawler, S. Szygenda
{"title":"Components of Continuous IT Availability & Disaster Tolerant Computing: 2007 IEEE Conference on Technologies for Homeland Security: Enhancing Critical Infrastructure Dependability","authors":"Chad M. Lawler, S. Szygenda","doi":"10.1109/THS.2007.370028","DOIUrl":"https://doi.org/10.1109/THS.2007.370028","url":null,"abstract":"This paper provides a review of the components of disaster tolerant computing and communications and reviews the current state in light of recent man-made terrorist events. The technology, process and human resource challenges of traditional disaster recovery approaches to disaster preparedness are outlined. The paper examines the relationships between disaster tolerant systems, Information Technology (IT) application availability and executive level management visibility necessary for successful system operations in the event of a catastrophic disaster. The risks of IT application downtime attributable to the increasing dependence on critical information technology applications and infrastructure are explored. Opportunities to extend complex systems independence analysis to the private business sector, and disaster tolerance are explored. A general approach for disaster tolerance is reviewed which mitigates unplanned downtime through a disciplined approach of IT infrastructure design based on redundancy and distributed components, with special attention given to the ability of executive level management to comprehend the value of uptime of an application and make appropriate capital investment.","PeriodicalId":428684,"journal":{"name":"2007 IEEE Conference on Technologies for Homeland Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130040572","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A Modified Fluorescent Lamp for Discreet Biometric Surveillance 用于精细生物识别监测的改良荧光灯
2007 IEEE Conference on Technologies for Homeland Security Pub Date : 2007-05-16 DOI: 10.1109/THS.2007.370050
J. Cooley, A. Avestruz, S. Leeb
{"title":"A Modified Fluorescent Lamp for Discreet Biometric Surveillance","authors":"J. Cooley, A. Avestruz, S. Leeb","doi":"10.1109/THS.2007.370050","DOIUrl":"https://doi.org/10.1109/THS.2007.370050","url":null,"abstract":"A standard 48-inch two-bulb fluorescent lamp was modified to be used as a capacitive sensing system. The lamp sensor system demonstrated the ability to detect the presence and motion of human targets at ranges of up to 10 feet between the lamp and the closest edge of the target. Proof of concept was also demonstrated for metal detection by demonstrating the ability to differentiate between a human target and the same human target carrying conducting (metallic) objects. The lamp sensor shows potential for low-cost and widespread discreet security monitoring and biometric surveillance.","PeriodicalId":428684,"journal":{"name":"2007 IEEE Conference on Technologies for Homeland Security","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127469169","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Video Content Analysis with Effective Response 视频内容分析与有效响应
2007 IEEE Conference on Technologies for Homeland Security Pub Date : 2007-05-16 DOI: 10.1109/THS.2007.370020
D. Abrams, S. McDowall
{"title":"Video Content Analysis with Effective Response","authors":"D. Abrams, S. McDowall","doi":"10.1109/THS.2007.370020","DOIUrl":"https://doi.org/10.1109/THS.2007.370020","url":null,"abstract":"Video content analytics effectively identifies threats in video surveillance camera feeds. These behaviors include person/vehicle entering restricted zone, counter-flow detection, loitering, object left behind, and others. In order to provide enhanced security, events need to be integrated with a command and control system capable of effectively responding to hundreds of events per day in a busy, critical infrastructure facility. We describe a novel system -NerveCenter - that links analytic events with command center data wall camera pop-ups on alarm, extended notification tools that send multi-modal alerts, acknowledgement tracking, 911 computer aided dispatch (CAD), and geo-coded mapping tools that give operators a tactical map. The usability of these tools is discussed along with how to provide situational awareness and a common operating picture to operators and first responders.","PeriodicalId":428684,"journal":{"name":"2007 IEEE Conference on Technologies for Homeland Security","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115243088","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Passenger and Baggage Security Screening Challenges in Marine Mass Transit 海上公共交通中乘客和行李安全检查的挑战
2007 IEEE Conference on Technologies for Homeland Security Pub Date : 2007-05-16 DOI: 10.1109/THS.2007.370055
R. Hoaglund
{"title":"Passenger and Baggage Security Screening Challenges in Marine Mass Transit","authors":"R. Hoaglund","doi":"10.1109/THS.2007.370055","DOIUrl":"https://doi.org/10.1109/THS.2007.370055","url":null,"abstract":"As technologies continue to develop and test for deployment in marine mass transit applications, industry and government strive to make successful products that will provide cost effective solutions. These solutions will most probably emerge from a fusion of several technologies to create a more complete, multi-threat coverage. Many labor intensive technologies will be replaced by automated, accurate systems of the future. Until then, effective compensatory measures for technology gaps will continue to be the interim solution in deterring a significant security event in the ferry transport system.","PeriodicalId":428684,"journal":{"name":"2007 IEEE Conference on Technologies for Homeland Security","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128239064","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A New Mechanism for Achieving Secure and Reliable Data Transmission in Wireless Sensor Networks 一种实现无线传感器网络安全可靠数据传输的新机制
2007 IEEE Conference on Technologies for Homeland Security Pub Date : 2007-05-16 DOI: 10.1109/THS.2007.370058
Ruiping Ma, L. Xing, Howard E. Michel
{"title":"A New Mechanism for Achieving Secure and Reliable Data Transmission in Wireless Sensor Networks","authors":"Ruiping Ma, L. Xing, Howard E. Michel","doi":"10.1109/THS.2007.370058","DOIUrl":"https://doi.org/10.1109/THS.2007.370058","url":null,"abstract":"Wireless sensor networks must be designed to be both secure and reliable, especially when they are used in national security and safety-critical applications. In this paper, we propose a new mechanism, called MVMP (multi-version multi-path), which integrates data segmentation, Forward Error Correction coding, multiple paths, and multiple versions of cryptographic algorithms for achieving both secure and reliable data transmission in sensor networks. The MVMP is also energy-aware in that each piece of the original data will be encrypted by a single encryption algorithm once, and it will be transmitted only once. The proposed MVMP mechanism is compared with existing mechanisms, in particular, the secret sharing mechanism using performance criteria including redundancy level, self-healing capability, and security.","PeriodicalId":428684,"journal":{"name":"2007 IEEE Conference on Technologies for Homeland Security","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124137515","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
Systems Engineering of Datacasting for Public Safety Vehicles 公共安全车辆数据广播系统工程
2007 IEEE Conference on Technologies for Homeland Security Pub Date : 2007-05-16 DOI: 10.1109/THS.2007.370018
S. Valcourt, K. Chamberlin, B. McMahon, A. Kun
{"title":"Systems Engineering of Datacasting for Public Safety Vehicles","authors":"S. Valcourt, K. Chamberlin, B. McMahon, A. Kun","doi":"10.1109/THS.2007.370018","DOIUrl":"https://doi.org/10.1109/THS.2007.370018","url":null,"abstract":"Public safety officers need current, accurate and complete information to maintain the security of their communities. Existing communications systems for public safety officers consist of analog and digital radios, supplemented with cell phone communications. Dispatchers with a need to broadcast information can only do so via voice. Small data packets can be exchanged via point-to-point methods with modern digital radios, but no data broadcast exists for public safety communications. Broadcasting images, audio and text to officers in the field will offer a better collection of information necessary to make critical, time-sensitive public safety decisions. Live updates to in-vehicle databases and computer systems will provide officers with critical, up-to-the-minute information. Working with New Hampshire Public Television and the National Institute of Justice, we are researching a system to utilize excess bandwidth available in the public television broadcast spectrum. The system is to be implemented using the onboard data and car management system known as Project54TM. The use of this excess bandwidth for the delivery of digital data in a one-way, high-speed, broadcast stream is called datacasting. While datacasting has existed since the initial draft ATSC standards defining digital television, few locations have installed full datacasting capabilities, and no other datacasting effort has implemented a mobile, two-way datacasting system. This paper will outline the design of the datacasting environment for the New Hampshire Department of Safety, the results of field tests performed by 10 State Police vehicles collecting data during routine public safety patrols, and the status of the two-way datacasting implementation.","PeriodicalId":428684,"journal":{"name":"2007 IEEE Conference on Technologies for Homeland Security","volume":"123 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132846371","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Apply STAMP to Critical Infrastructure Protection 将STAMP应用于关键基础设施保护
2007 IEEE Conference on Technologies for Homeland Security Pub Date : 2007-05-16 DOI: 10.1109/THS.2007.370048
Joseph R. Laracy, N. Leveson
{"title":"Apply STAMP to Critical Infrastructure Protection","authors":"Joseph R. Laracy, N. Leveson","doi":"10.1109/THS.2007.370048","DOIUrl":"https://doi.org/10.1109/THS.2007.370048","url":null,"abstract":"Classical risk-based or game theoretic security models rely on assumptions from reliability theory and rational expectations economics that are not applicable for security risks. Additionally, these models suffer from serious deficiencies when they are applied to software-intensive, complex engineering systems. Recent work in the area of system safety engineering has led to the development of a new accident model for system safety that acknowledges the dynamic complexity of accidents. System-theoretic accident models and processes (STAMP) applies principles from control theory to enforce constraints on hazards and thereby prevent accidents. Appreciating the similarities between safety and security while still acknowledging the differences, this paper introduces the use of STAMP to security problems. In particular, it is applied to identify and mitigate the threats that could emerge in critical infrastructure systems such as the air transportation network.","PeriodicalId":428684,"journal":{"name":"2007 IEEE Conference on Technologies for Homeland Security","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121681455","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Perforated Semiconductor Neutron Detector Modules for Detection of Spontaneous Fission Neutrons 用于探测自发裂变中子的穿孔半导体中子探测器模块
2007 IEEE Conference on Technologies for Homeland Security Pub Date : 2007-05-16 DOI: 10.1109/THS.2007.370039
D. Mcgregor, S. Bellinger, D. Bruno, S. Cowley, M. Elazegui, W. McNeil, E. Patterson, T. Unruh, C. J. Solomon, J. Shultis, B. B. Rice
{"title":"Perforated Semiconductor Neutron Detector Modules for Detection of Spontaneous Fission Neutrons","authors":"D. Mcgregor, S. Bellinger, D. Bruno, S. Cowley, M. Elazegui, W. McNeil, E. Patterson, T. Unruh, C. J. Solomon, J. Shultis, B. B. Rice","doi":"10.1109/THS.2007.370039","DOIUrl":"https://doi.org/10.1109/THS.2007.370039","url":null,"abstract":"Compact neutron detectors are being designed and tested for use as low-power real-time personnel dosimeters and for remote neutron sensing. The neutron detectors are pin diodes that are mass produced from high-purity Si wafers. Each detector has thousands of circular perforations etched vertically into the device. The perforations are backfilled with 6LiF to make the pin diodes sensitive to thermal neutrons. The prototype devices delivered over 3.8% thermal neutron detection efficiency while operating on only 15 volts. The highest efficiency devices thus far have delivered over 12% thermal neutron detection efficiency. Devices moderated with high density polyethylene (HDPE) can be used for fast neutron detection. Compact packages with or without remote readout electronics are under construction and characterization.","PeriodicalId":428684,"journal":{"name":"2007 IEEE Conference on Technologies for Homeland Security","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127446506","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信