Pub Date : 2021-10-11DOI: 10.1109/ICCST49569.2021.9717398
F. Garzia, F. Borghini, A. Castagnolo, M. Lombardi, S. Ramalingam
The estimation of perceived safeness and risk by individuals is very significant for security and safety managing. Every person is based on the judgments of other persons to do a choosing and the Internet personifies the location where these judgments are mostly tracked, obtained, and assessed. From this point of view, social networks have a significant influence. For this reason, Opinion Mining and Sentiment Analysis have found remarkable utilizes in a multiplicity of circumstances and one of the most notable is represented by public safety and security. The purpose of the present work is to investigate the perception of safeness and risk of drones during COVID-19 pandemic in Italy. It was considered the period from Aprile 15 to December 10, 2020, properly divided into 4 significant phases, highlighting the emotional components using the semantic analysis of the textual contents present in Twitter.
{"title":"Emotional analysis of safeness and risk perception of drones during the COVID-19 pandemic in Italy","authors":"F. Garzia, F. Borghini, A. Castagnolo, M. Lombardi, S. Ramalingam","doi":"10.1109/ICCST49569.2021.9717398","DOIUrl":"https://doi.org/10.1109/ICCST49569.2021.9717398","url":null,"abstract":"The estimation of perceived safeness and risk by individuals is very significant for security and safety managing. Every person is based on the judgments of other persons to do a choosing and the Internet personifies the location where these judgments are mostly tracked, obtained, and assessed. From this point of view, social networks have a significant influence. For this reason, Opinion Mining and Sentiment Analysis have found remarkable utilizes in a multiplicity of circumstances and one of the most notable is represented by public safety and security. The purpose of the present work is to investigate the perception of safeness and risk of drones during COVID-19 pandemic in Italy. It was considered the period from Aprile 15 to December 10, 2020, properly divided into 4 significant phases, highlighting the emotional components using the semantic analysis of the textual contents present in Twitter.","PeriodicalId":101539,"journal":{"name":"2021 International Carnahan Conference on Security Technology (ICCST)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130455816","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-10-11DOI: 10.1109/ICCST49569.2021.9717404
S. Manonmani, L. Akshita, L. AnnetteShajan, L. AneeshSidharth, S. Rangaswamy
For the naval defense forces, underwater mines pose a serious threat to safety and security to their lives and property. Studies conducted in this field which used side scan sonar imagery have not yielded sufficient accuracy for the detection of underwater mines and hence can lead to false alarms. In this paper feature extraction methods-Histogram of oriented gradients and edge-based feature extraction are used. These methods were chosen as they have shown very high accuracy in other studies which used different datasets. The data undergoes preprocessing-resizing and converting to grayscale images-after which the feature extraction method is applied. To classify whether the image contains a mine or not, template matching and classification methods feature vectors are used. It was found that this method yields high accuracy for the detection of mines. This same study can be extended for other object detection methods. The method followed here can help the naval defense in more accurate detection hence minimizing the damage which can be incurred in case of contact with a mine.
{"title":"Underwater Mine Detection Using Histogram of oriented gradients and Canny Edge Detector","authors":"S. Manonmani, L. Akshita, L. AnnetteShajan, L. AneeshSidharth, S. Rangaswamy","doi":"10.1109/ICCST49569.2021.9717404","DOIUrl":"https://doi.org/10.1109/ICCST49569.2021.9717404","url":null,"abstract":"For the naval defense forces, underwater mines pose a serious threat to safety and security to their lives and property. Studies conducted in this field which used side scan sonar imagery have not yielded sufficient accuracy for the detection of underwater mines and hence can lead to false alarms. In this paper feature extraction methods-Histogram of oriented gradients and edge-based feature extraction are used. These methods were chosen as they have shown very high accuracy in other studies which used different datasets. The data undergoes preprocessing-resizing and converting to grayscale images-after which the feature extraction method is applied. To classify whether the image contains a mine or not, template matching and classification methods feature vectors are used. It was found that this method yields high accuracy for the detection of mines. This same study can be extended for other object detection methods. The method followed here can help the naval defense in more accurate detection hence minimizing the damage which can be incurred in case of contact with a mine.","PeriodicalId":101539,"journal":{"name":"2021 International Carnahan Conference on Security Technology (ICCST)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123855292","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-10-11DOI: 10.1109/ICCST49569.2021.9717385
M. Jamro
Security aspects of Internet of Things (IoT) focusing on quality of service (QoS) and quality of experience (QoE) are critically appraised. The paper highlights various useful features of viable IoT protocols and ranked these accordingly for qualitative assessments to develop a consensus towards a unified IoT standard. The IoT challenges to industry and academic institutions are addressed with recommendations to adopt a holistic approach developing and engaging graduates with more QoS/QoE related IoT mini-projects for STEM education.
{"title":"IoT Security with QoS: Game changer for Industry and STEM Education","authors":"M. Jamro","doi":"10.1109/ICCST49569.2021.9717385","DOIUrl":"https://doi.org/10.1109/ICCST49569.2021.9717385","url":null,"abstract":"Security aspects of Internet of Things (IoT) focusing on quality of service (QoS) and quality of experience (QoE) are critically appraised. The paper highlights various useful features of viable IoT protocols and ranked these accordingly for qualitative assessments to develop a consensus towards a unified IoT standard. The IoT challenges to industry and academic institutions are addressed with recommendations to adopt a holistic approach developing and engaging graduates with more QoS/QoE related IoT mini-projects for STEM education.","PeriodicalId":101539,"journal":{"name":"2021 International Carnahan Conference on Security Technology (ICCST)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116915272","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-10-11DOI: 10.1109/ICCST49569.2021.9717391
Robert Gurney, Mike Rhead, W. E. Martin
This paper considers the implications of displaying two rear registration plates on trailers following the UK's ratification of the Vienna Convention of Road Traffic. The UK's application of the Vienna Convention is at variance with that of the EU.
{"title":"Assessment of Foreign Trailer Number Plates on UK Roads, Implications for ANPR","authors":"Robert Gurney, Mike Rhead, W. E. Martin","doi":"10.1109/ICCST49569.2021.9717391","DOIUrl":"https://doi.org/10.1109/ICCST49569.2021.9717391","url":null,"abstract":"This paper considers the implications of displaying two rear registration plates on trailers following the UK's ratification of the Vienna Convention of Road Traffic. The UK's application of the Vienna Convention is at variance with that of the EU.","PeriodicalId":101539,"journal":{"name":"2021 International Carnahan Conference on Security Technology (ICCST)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115072560","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-10-11DOI: 10.1109/ICCST49569.2021.9717381
Moisés Díaz, J. B. Alonso, M. A. Ferrer-Ballester, Cristina Carmona
Verifying the authorship of a questioned signature is a common task for forensic handwriting examiners. While the automatic systems are typically orientated to improve performance, their practical utility for forensics is not always guaranteed. In this paper, we propose an offline automatic signature verifier oriented to forensic handwriting examiners. Our design is based on likelihood ratios which translate the signature verification results into objective and understandable evidence for a jury in a courtroom. The likelihood ratios depend on a universal background model build with signatures from other users and distance measures between signature handcrafted features. These features can be more interpretable for forensics, even though others can be included in our verifier, like deep learning ones. In our experiments, a single signature was used as reference. Two universal background models have been developed - the first is based on the GPDS database, and the second on synthetic signatures. The scheme is tried and tested with signatures from MCYT75 and BiosecureID databases with promising results. The outcome of this work is an offline signature verifier for forensic handwriting examiner practice.
{"title":"One vs. One Offline Signature Verification: A Forensic Handwriting Examiners Perspective","authors":"Moisés Díaz, J. B. Alonso, M. A. Ferrer-Ballester, Cristina Carmona","doi":"10.1109/ICCST49569.2021.9717381","DOIUrl":"https://doi.org/10.1109/ICCST49569.2021.9717381","url":null,"abstract":"Verifying the authorship of a questioned signature is a common task for forensic handwriting examiners. While the automatic systems are typically orientated to improve performance, their practical utility for forensics is not always guaranteed. In this paper, we propose an offline automatic signature verifier oriented to forensic handwriting examiners. Our design is based on likelihood ratios which translate the signature verification results into objective and understandable evidence for a jury in a courtroom. The likelihood ratios depend on a universal background model build with signatures from other users and distance measures between signature handcrafted features. These features can be more interpretable for forensics, even though others can be included in our verifier, like deep learning ones. In our experiments, a single signature was used as reference. Two universal background models have been developed - the first is based on the GPDS database, and the second on synthetic signatures. The scheme is tried and tested with signatures from MCYT75 and BiosecureID databases with promising results. The outcome of this work is an offline signature verifier for forensic handwriting examiner practice.","PeriodicalId":101539,"journal":{"name":"2021 International Carnahan Conference on Security Technology (ICCST)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129392094","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-10-11DOI: 10.1109/ICCST49569.2021.9717400
V. Chundi, Jnaneswar Bammidi, Abhijith Pegallapati, Yogesh Parnandi, Aswini Reddithala, Suresh Kumar Moru
In the past decades, there has been tremendous growth in security-related issues throughout the world. With such a multifold increase in demand for security, video surveillance has become a critical research area. In the most recent studies, there were many attempts to integrate image processing algorithms. It was also possible to achieve artificial intelligence capabilities using computer vision. Intelligent video surveillance systems can be described as a technique to assist security personnel by providing reliable real-time alerts, thus supporting the investigations with efficient video analysis. This paper discusses a comprehensive and systematic overview of the existing video surveillance techniques and possible enhancements.
{"title":"Intelligent Video Surveillance Systems","authors":"V. Chundi, Jnaneswar Bammidi, Abhijith Pegallapati, Yogesh Parnandi, Aswini Reddithala, Suresh Kumar Moru","doi":"10.1109/ICCST49569.2021.9717400","DOIUrl":"https://doi.org/10.1109/ICCST49569.2021.9717400","url":null,"abstract":"In the past decades, there has been tremendous growth in security-related issues throughout the world. With such a multifold increase in demand for security, video surveillance has become a critical research area. In the most recent studies, there were many attempts to integrate image processing algorithms. It was also possible to achieve artificial intelligence capabilities using computer vision. Intelligent video surveillance systems can be described as a technique to assist security personnel by providing reliable real-time alerts, thus supporting the investigations with efficient video analysis. This paper discusses a comprehensive and systematic overview of the existing video surveillance techniques and possible enhancements.","PeriodicalId":101539,"journal":{"name":"2021 International Carnahan Conference on Security Technology (ICCST)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127286328","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-10-11DOI: 10.1109/ICCST49569.2021.9717399
Krystyna Ljubymenko, Dora Kotkova, Tereza Sternova
The article aims to describe and explain the basic principles of using the detection of suspicious behavior in ensuring security in transport and especially in public services, where the targets can be passengers, their companions or employees themselves. The paper also aims to explain the reason for the attacks and describe the basic behaviors that can precede the attack.
{"title":"Use of detection of suspicious behavior in ensuring the security of persons in transport","authors":"Krystyna Ljubymenko, Dora Kotkova, Tereza Sternova","doi":"10.1109/ICCST49569.2021.9717399","DOIUrl":"https://doi.org/10.1109/ICCST49569.2021.9717399","url":null,"abstract":"The article aims to describe and explain the basic principles of using the detection of suspicious behavior in ensuring security in transport and especially in public services, where the targets can be passengers, their companions or employees themselves. The paper also aims to explain the reason for the attacks and describe the basic behaviors that can precede the attack.","PeriodicalId":101539,"journal":{"name":"2021 International Carnahan Conference on Security Technology (ICCST)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125991955","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-10-11DOI: 10.1109/iccst49569.2021.9717389
{"title":"[Title page]","authors":"","doi":"10.1109/iccst49569.2021.9717389","DOIUrl":"https://doi.org/10.1109/iccst49569.2021.9717389","url":null,"abstract":"","PeriodicalId":101539,"journal":{"name":"2021 International Carnahan Conference on Security Technology (ICCST)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128420668","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-10-11DOI: 10.1109/ICCST49569.2021.9717376
C. Kumar, Sanket Mohanty
With many of the functionalities of Drones being controlled by highly sophisticated Computers through wired and wireless networks, Cyber security is playing a vital role in ensuring the safety and security of these. There are many incidents being reported about the breach of Cyber Security involving Drones thus bringing to focus existing vulnerabilities and threats. The attackers may be remotely launching the attacks. The successful attacks can have a high impact leading to serious incidents. In this paper, several case studies are discussed illustrating the Cyber related incidents in Drones. The latest developments in Cyber Security are presented applicable to the Drone industry. The Cyber Security best practices, countermeasures, attack detection and mitigations techniques are presented which are specific to UAVs.
{"title":"Current Trends in Cyber Security for Drones","authors":"C. Kumar, Sanket Mohanty","doi":"10.1109/ICCST49569.2021.9717376","DOIUrl":"https://doi.org/10.1109/ICCST49569.2021.9717376","url":null,"abstract":"With many of the functionalities of Drones being controlled by highly sophisticated Computers through wired and wireless networks, Cyber security is playing a vital role in ensuring the safety and security of these. There are many incidents being reported about the breach of Cyber Security involving Drones thus bringing to focus existing vulnerabilities and threats. The attackers may be remotely launching the attacks. The successful attacks can have a high impact leading to serious incidents. In this paper, several case studies are discussed illustrating the Cyber related incidents in Drones. The latest developments in Cyber Security are presented applicable to the Drone industry. The Cyber Security best practices, countermeasures, attack detection and mitigations techniques are presented which are specific to UAVs.","PeriodicalId":101539,"journal":{"name":"2021 International Carnahan Conference on Security Technology (ICCST)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121443715","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-10-11DOI: 10.1109/ICCST49569.2021.9717375
Dora Kotkova, M. Hromada, Martina Malanikova, Stanislav Kovar
The article discusses theoretical problems of identification and determination of soft targets described by legislative documents. Currently, the definition of soft targets is not clear, so a methodology has been developed that eliminates this problem. To ensure the user-friendliness of the methodology, a software tool will be designed to assist users in distinguishing between soft, hard targets and critical infrastructure elements. This is a complicated task; therefore, the problem will be simplified only to the transport sector where could be covered almost all options. The article will describe the concept of the software tool, including user requirements and criteria.
{"title":"The Concept of a Software Tool with an Interactive Map for Identification and Determination of Soft Targets of Transport Infrastructure","authors":"Dora Kotkova, M. Hromada, Martina Malanikova, Stanislav Kovar","doi":"10.1109/ICCST49569.2021.9717375","DOIUrl":"https://doi.org/10.1109/ICCST49569.2021.9717375","url":null,"abstract":"The article discusses theoretical problems of identification and determination of soft targets described by legislative documents. Currently, the definition of soft targets is not clear, so a methodology has been developed that eliminates this problem. To ensure the user-friendliness of the methodology, a software tool will be designed to assist users in distinguishing between soft, hard targets and critical infrastructure elements. This is a complicated task; therefore, the problem will be simplified only to the transport sector where could be covered almost all options. The article will describe the concept of the software tool, including user requirements and criteria.","PeriodicalId":101539,"journal":{"name":"2021 International Carnahan Conference on Security Technology (ICCST)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132469191","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}