首页 > 最新文献

2021 International Carnahan Conference on Security Technology (ICCST)最新文献

英文 中文
Emotional analysis of safeness and risk perception of drones during the COVID-19 pandemic in Italy 意大利新冠肺炎疫情期间无人机安全性与风险感知的情感分析
Pub Date : 2021-10-11 DOI: 10.1109/ICCST49569.2021.9717398
F. Garzia, F. Borghini, A. Castagnolo, M. Lombardi, S. Ramalingam
The estimation of perceived safeness and risk by individuals is very significant for security and safety managing. Every person is based on the judgments of other persons to do a choosing and the Internet personifies the location where these judgments are mostly tracked, obtained, and assessed. From this point of view, social networks have a significant influence. For this reason, Opinion Mining and Sentiment Analysis have found remarkable utilizes in a multiplicity of circumstances and one of the most notable is represented by public safety and security. The purpose of the present work is to investigate the perception of safeness and risk of drones during COVID-19 pandemic in Italy. It was considered the period from Aprile 15 to December 10, 2020, properly divided into 4 significant phases, highlighting the emotional components using the semantic analysis of the textual contents present in Twitter.
个体感知安全与风险的评估对安全与安全管理具有重要意义。每个人都是根据他人的判断来做选择,而互联网使这些判断主要被跟踪、获取和评估的场所人格化。从这个角度来看,社交网络有很大的影响。出于这个原因,意见挖掘和情感分析在多种情况下都有显著的应用,其中最显著的是公共安全和安全。本研究的目的是调查意大利在COVID-19大流行期间对无人机安全性和风险的看法。这段时间从2020年4月15日到12月10日,适当地分为4个重要阶段,通过对Twitter文本内容的语义分析来突出情感成分。
{"title":"Emotional analysis of safeness and risk perception of drones during the COVID-19 pandemic in Italy","authors":"F. Garzia, F. Borghini, A. Castagnolo, M. Lombardi, S. Ramalingam","doi":"10.1109/ICCST49569.2021.9717398","DOIUrl":"https://doi.org/10.1109/ICCST49569.2021.9717398","url":null,"abstract":"The estimation of perceived safeness and risk by individuals is very significant for security and safety managing. Every person is based on the judgments of other persons to do a choosing and the Internet personifies the location where these judgments are mostly tracked, obtained, and assessed. From this point of view, social networks have a significant influence. For this reason, Opinion Mining and Sentiment Analysis have found remarkable utilizes in a multiplicity of circumstances and one of the most notable is represented by public safety and security. The purpose of the present work is to investigate the perception of safeness and risk of drones during COVID-19 pandemic in Italy. It was considered the period from Aprile 15 to December 10, 2020, properly divided into 4 significant phases, highlighting the emotional components using the semantic analysis of the textual contents present in Twitter.","PeriodicalId":101539,"journal":{"name":"2021 International Carnahan Conference on Security Technology (ICCST)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130455816","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Underwater Mine Detection Using Histogram of oriented gradients and Canny Edge Detector 基于定向梯度直方图和Canny边缘检测器的水下水雷探测
Pub Date : 2021-10-11 DOI: 10.1109/ICCST49569.2021.9717404
S. Manonmani, L. Akshita, L. AnnetteShajan, L. AneeshSidharth, S. Rangaswamy
For the naval defense forces, underwater mines pose a serious threat to safety and security to their lives and property. Studies conducted in this field which used side scan sonar imagery have not yielded sufficient accuracy for the detection of underwater mines and hence can lead to false alarms. In this paper feature extraction methods-Histogram of oriented gradients and edge-based feature extraction are used. These methods were chosen as they have shown very high accuracy in other studies which used different datasets. The data undergoes preprocessing-resizing and converting to grayscale images-after which the feature extraction method is applied. To classify whether the image contains a mine or not, template matching and classification methods feature vectors are used. It was found that this method yields high accuracy for the detection of mines. This same study can be extended for other object detection methods. The method followed here can help the naval defense in more accurate detection hence minimizing the damage which can be incurred in case of contact with a mine.
对于海军防务部队来说,水雷对其生命财产安全构成严重威胁。在这一领域进行的研究使用了侧扫声纳图像,没有获得足够的精度来探测水下水雷,因此可能导致假警报。本文采用了定向梯度直方图和基于边缘的特征提取方法。选择这些方法是因为它们在使用不同数据集的其他研究中显示出非常高的准确性。数据经过预处理——调整大小并转换为灰度图像——然后应用特征提取方法。为了对图像是否含有地雷进行分类,使用了模板匹配和特征向量分类方法。结果表明,该方法具有较高的地雷探测精度。同样的研究可以扩展到其他目标检测方法。这里采用的方法可以帮助海军防御更准确地探测,从而最大限度地减少与水雷接触时可能造成的损害。
{"title":"Underwater Mine Detection Using Histogram of oriented gradients and Canny Edge Detector","authors":"S. Manonmani, L. Akshita, L. AnnetteShajan, L. AneeshSidharth, S. Rangaswamy","doi":"10.1109/ICCST49569.2021.9717404","DOIUrl":"https://doi.org/10.1109/ICCST49569.2021.9717404","url":null,"abstract":"For the naval defense forces, underwater mines pose a serious threat to safety and security to their lives and property. Studies conducted in this field which used side scan sonar imagery have not yielded sufficient accuracy for the detection of underwater mines and hence can lead to false alarms. In this paper feature extraction methods-Histogram of oriented gradients and edge-based feature extraction are used. These methods were chosen as they have shown very high accuracy in other studies which used different datasets. The data undergoes preprocessing-resizing and converting to grayscale images-after which the feature extraction method is applied. To classify whether the image contains a mine or not, template matching and classification methods feature vectors are used. It was found that this method yields high accuracy for the detection of mines. This same study can be extended for other object detection methods. The method followed here can help the naval defense in more accurate detection hence minimizing the damage which can be incurred in case of contact with a mine.","PeriodicalId":101539,"journal":{"name":"2021 International Carnahan Conference on Security Technology (ICCST)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123855292","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
IoT Security with QoS: Game changer for Industry and STEM Education 具有QoS的物联网安全:工业和STEM教育的游戏规则改变者
Pub Date : 2021-10-11 DOI: 10.1109/ICCST49569.2021.9717385
M. Jamro
Security aspects of Internet of Things (IoT) focusing on quality of service (QoS) and quality of experience (QoE) are critically appraised. The paper highlights various useful features of viable IoT protocols and ranked these accordingly for qualitative assessments to develop a consensus towards a unified IoT standard. The IoT challenges to industry and academic institutions are addressed with recommendations to adopt a holistic approach developing and engaging graduates with more QoS/QoE related IoT mini-projects for STEM education.
以服务质量(QoS)和体验质量(QoE)为重点的物联网(IoT)安全方面得到了严格的评估。本文强调了可行的物联网协议的各种有用特性,并对这些特性进行了相应的定性评估,以达成统一物联网标准的共识。针对工业和学术机构面临的物联网挑战,建议采用整体方法开发和吸引毕业生参与更多与QoS/QoE相关的STEM教育物联网小项目。
{"title":"IoT Security with QoS: Game changer for Industry and STEM Education","authors":"M. Jamro","doi":"10.1109/ICCST49569.2021.9717385","DOIUrl":"https://doi.org/10.1109/ICCST49569.2021.9717385","url":null,"abstract":"Security aspects of Internet of Things (IoT) focusing on quality of service (QoS) and quality of experience (QoE) are critically appraised. The paper highlights various useful features of viable IoT protocols and ranked these accordingly for qualitative assessments to develop a consensus towards a unified IoT standard. The IoT challenges to industry and academic institutions are addressed with recommendations to adopt a holistic approach developing and engaging graduates with more QoS/QoE related IoT mini-projects for STEM education.","PeriodicalId":101539,"journal":{"name":"2021 International Carnahan Conference on Security Technology (ICCST)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116915272","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Assessment of Foreign Trailer Number Plates on UK Roads, Implications for ANPR 评估英国道路上的外国拖车号牌,对ANPR的影响
Pub Date : 2021-10-11 DOI: 10.1109/ICCST49569.2021.9717391
Robert Gurney, Mike Rhead, W. E. Martin
This paper considers the implications of displaying two rear registration plates on trailers following the UK's ratification of the Vienna Convention of Road Traffic. The UK's application of the Vienna Convention is at variance with that of the EU.
本文考虑了在英国批准《维也纳道路交通公约》后,在拖车上显示两个后方车牌的影响。英国对《维也纳公约》的适用与欧盟不一致。
{"title":"Assessment of Foreign Trailer Number Plates on UK Roads, Implications for ANPR","authors":"Robert Gurney, Mike Rhead, W. E. Martin","doi":"10.1109/ICCST49569.2021.9717391","DOIUrl":"https://doi.org/10.1109/ICCST49569.2021.9717391","url":null,"abstract":"This paper considers the implications of displaying two rear registration plates on trailers following the UK's ratification of the Vienna Convention of Road Traffic. The UK's application of the Vienna Convention is at variance with that of the EU.","PeriodicalId":101539,"journal":{"name":"2021 International Carnahan Conference on Security Technology (ICCST)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115072560","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
One vs. One Offline Signature Verification: A Forensic Handwriting Examiners Perspective 一对一离线签名验证:法医笔迹鉴定人的视角
Pub Date : 2021-10-11 DOI: 10.1109/ICCST49569.2021.9717381
Moisés Díaz, J. B. Alonso, M. A. Ferrer-Ballester, Cristina Carmona
Verifying the authorship of a questioned signature is a common task for forensic handwriting examiners. While the automatic systems are typically orientated to improve performance, their practical utility for forensics is not always guaranteed. In this paper, we propose an offline automatic signature verifier oriented to forensic handwriting examiners. Our design is based on likelihood ratios which translate the signature verification results into objective and understandable evidence for a jury in a courtroom. The likelihood ratios depend on a universal background model build with signatures from other users and distance measures between signature handcrafted features. These features can be more interpretable for forensics, even though others can be included in our verifier, like deep learning ones. In our experiments, a single signature was used as reference. Two universal background models have been developed - the first is based on the GPDS database, and the second on synthetic signatures. The scheme is tried and tested with signatures from MCYT75 and BiosecureID databases with promising results. The outcome of this work is an offline signature verifier for forensic handwriting examiner practice.
验证可疑签名的作者身份是法医笔迹审查员的一项常见任务。虽然自动系统通常以提高性能为导向,但它们在取证方面的实际效用并不总是得到保证。本文提出了一种面向法医笔迹鉴定者的离线自动签名验证器。我们的设计基于似然比,它将签名验证结果转化为法庭上陪审团的客观和可理解的证据。可能性比依赖于由其他用户签名和签名手工特征之间的距离度量构建的通用背景模型。这些特征对于取证来说更容易解释,尽管其他特征也可以包含在我们的验证器中,比如深度学习。在我们的实验中,我们使用单个签名作为参考。已经开发了两个通用背景模型——第一个基于GPDS数据库,第二个基于合成特征。该方案通过MCYT75和biosecurid数据库的签名进行了试验和测试,结果令人鼓舞。这项工作的结果是一个离线签名验证法医笔迹审查员的做法。
{"title":"One vs. One Offline Signature Verification: A Forensic Handwriting Examiners Perspective","authors":"Moisés Díaz, J. B. Alonso, M. A. Ferrer-Ballester, Cristina Carmona","doi":"10.1109/ICCST49569.2021.9717381","DOIUrl":"https://doi.org/10.1109/ICCST49569.2021.9717381","url":null,"abstract":"Verifying the authorship of a questioned signature is a common task for forensic handwriting examiners. While the automatic systems are typically orientated to improve performance, their practical utility for forensics is not always guaranteed. In this paper, we propose an offline automatic signature verifier oriented to forensic handwriting examiners. Our design is based on likelihood ratios which translate the signature verification results into objective and understandable evidence for a jury in a courtroom. The likelihood ratios depend on a universal background model build with signatures from other users and distance measures between signature handcrafted features. These features can be more interpretable for forensics, even though others can be included in our verifier, like deep learning ones. In our experiments, a single signature was used as reference. Two universal background models have been developed - the first is based on the GPDS database, and the second on synthetic signatures. The scheme is tried and tested with signatures from MCYT75 and BiosecureID databases with promising results. The outcome of this work is an offline signature verifier for forensic handwriting examiner practice.","PeriodicalId":101539,"journal":{"name":"2021 International Carnahan Conference on Security Technology (ICCST)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129392094","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Intelligent Video Surveillance Systems 智能视频监控系统
Pub Date : 2021-10-11 DOI: 10.1109/ICCST49569.2021.9717400
V. Chundi, Jnaneswar Bammidi, Abhijith Pegallapati, Yogesh Parnandi, Aswini Reddithala, Suresh Kumar Moru
In the past decades, there has been tremendous growth in security-related issues throughout the world. With such a multifold increase in demand for security, video surveillance has become a critical research area. In the most recent studies, there were many attempts to integrate image processing algorithms. It was also possible to achieve artificial intelligence capabilities using computer vision. Intelligent video surveillance systems can be described as a technique to assist security personnel by providing reliable real-time alerts, thus supporting the investigations with efficient video analysis. This paper discusses a comprehensive and systematic overview of the existing video surveillance techniques and possible enhancements.
在过去的几十年里,世界各地的安全问题急剧增加。随着人们对安防需求的成倍增长,视频监控已成为一个重要的研究领域。在最近的研究中,有许多尝试整合图像处理算法。使用计算机视觉也可以实现人工智能功能。智能视频监控系统可以被描述为通过提供可靠的实时警报来协助安全人员,从而通过有效的视频分析来支持调查的技术。本文讨论了现有的视频监控技术和可能的改进的全面和系统的概述。
{"title":"Intelligent Video Surveillance Systems","authors":"V. Chundi, Jnaneswar Bammidi, Abhijith Pegallapati, Yogesh Parnandi, Aswini Reddithala, Suresh Kumar Moru","doi":"10.1109/ICCST49569.2021.9717400","DOIUrl":"https://doi.org/10.1109/ICCST49569.2021.9717400","url":null,"abstract":"In the past decades, there has been tremendous growth in security-related issues throughout the world. With such a multifold increase in demand for security, video surveillance has become a critical research area. In the most recent studies, there were many attempts to integrate image processing algorithms. It was also possible to achieve artificial intelligence capabilities using computer vision. Intelligent video surveillance systems can be described as a technique to assist security personnel by providing reliable real-time alerts, thus supporting the investigations with efficient video analysis. This paper discusses a comprehensive and systematic overview of the existing video surveillance techniques and possible enhancements.","PeriodicalId":101539,"journal":{"name":"2021 International Carnahan Conference on Security Technology (ICCST)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127286328","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Use of detection of suspicious behavior in ensuring the security of persons in transport 利用侦测可疑行为来确保运输中人员的安全
Pub Date : 2021-10-11 DOI: 10.1109/ICCST49569.2021.9717399
Krystyna Ljubymenko, Dora Kotkova, Tereza Sternova
The article aims to describe and explain the basic principles of using the detection of suspicious behavior in ensuring security in transport and especially in public services, where the targets can be passengers, their companions or employees themselves. The paper also aims to explain the reason for the attacks and describe the basic behaviors that can precede the attack.
本文旨在描述和解释使用可疑行为检测来确保运输安全的基本原则,特别是在公共服务中,目标可以是乘客,他们的同伴或员工自己。本文还旨在解释攻击的原因,并描述攻击前的基本行为。
{"title":"Use of detection of suspicious behavior in ensuring the security of persons in transport","authors":"Krystyna Ljubymenko, Dora Kotkova, Tereza Sternova","doi":"10.1109/ICCST49569.2021.9717399","DOIUrl":"https://doi.org/10.1109/ICCST49569.2021.9717399","url":null,"abstract":"The article aims to describe and explain the basic principles of using the detection of suspicious behavior in ensuring security in transport and especially in public services, where the targets can be passengers, their companions or employees themselves. The paper also aims to explain the reason for the attacks and describe the basic behaviors that can precede the attack.","PeriodicalId":101539,"journal":{"name":"2021 International Carnahan Conference on Security Technology (ICCST)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125991955","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
[Title page] (标题页)
Pub Date : 2021-10-11 DOI: 10.1109/iccst49569.2021.9717389
{"title":"[Title page]","authors":"","doi":"10.1109/iccst49569.2021.9717389","DOIUrl":"https://doi.org/10.1109/iccst49569.2021.9717389","url":null,"abstract":"","PeriodicalId":101539,"journal":{"name":"2021 International Carnahan Conference on Security Technology (ICCST)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128420668","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Current Trends in Cyber Security for Drones 无人机网络安全的当前趋势
Pub Date : 2021-10-11 DOI: 10.1109/ICCST49569.2021.9717376
C. Kumar, Sanket Mohanty
With many of the functionalities of Drones being controlled by highly sophisticated Computers through wired and wireless networks, Cyber security is playing a vital role in ensuring the safety and security of these. There are many incidents being reported about the breach of Cyber Security involving Drones thus bringing to focus existing vulnerabilities and threats. The attackers may be remotely launching the attacks. The successful attacks can have a high impact leading to serious incidents. In this paper, several case studies are discussed illustrating the Cyber related incidents in Drones. The latest developments in Cyber Security are presented applicable to the Drone industry. The Cyber Security best practices, countermeasures, attack detection and mitigations techniques are presented which are specific to UAVs.
无人机的许多功能是由高度复杂的计算机通过有线和无线网络控制的,网络安全在确保无人机的安全和保障方面发挥着至关重要的作用。有许多关于无人机违反网络安全的事件被报道,从而使人们关注现有的漏洞和威胁。攻击者可能远程发起攻击。成功的攻击会产生很大的影响,导致严重的事件。本文讨论了几个案例研究,说明了无人机中的网络相关事件。介绍了适用于无人机行业的网络安全的最新发展。介绍了针对无人机的网络安全最佳实践、对策、攻击检测和缓解技术。
{"title":"Current Trends in Cyber Security for Drones","authors":"C. Kumar, Sanket Mohanty","doi":"10.1109/ICCST49569.2021.9717376","DOIUrl":"https://doi.org/10.1109/ICCST49569.2021.9717376","url":null,"abstract":"With many of the functionalities of Drones being controlled by highly sophisticated Computers through wired and wireless networks, Cyber security is playing a vital role in ensuring the safety and security of these. There are many incidents being reported about the breach of Cyber Security involving Drones thus bringing to focus existing vulnerabilities and threats. The attackers may be remotely launching the attacks. The successful attacks can have a high impact leading to serious incidents. In this paper, several case studies are discussed illustrating the Cyber related incidents in Drones. The latest developments in Cyber Security are presented applicable to the Drone industry. The Cyber Security best practices, countermeasures, attack detection and mitigations techniques are presented which are specific to UAVs.","PeriodicalId":101539,"journal":{"name":"2021 International Carnahan Conference on Security Technology (ICCST)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121443715","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
The Concept of a Software Tool with an Interactive Map for Identification and Determination of Soft Targets of Transport Infrastructure 交通基础设施软目标识别和确定的交互式地图软件工具的概念
Pub Date : 2021-10-11 DOI: 10.1109/ICCST49569.2021.9717375
Dora Kotkova, M. Hromada, Martina Malanikova, Stanislav Kovar
The article discusses theoretical problems of identification and determination of soft targets described by legislative documents. Currently, the definition of soft targets is not clear, so a methodology has been developed that eliminates this problem. To ensure the user-friendliness of the methodology, a software tool will be designed to assist users in distinguishing between soft, hard targets and critical infrastructure elements. This is a complicated task; therefore, the problem will be simplified only to the transport sector where could be covered almost all options. The article will describe the concept of the software tool, including user requirements and criteria.
本文论述了立法文件中描述的软目标认定的理论问题。目前,软目标的定义并不明确,因此开发了一种方法来消除这一问题。为确保该方法便于用户使用,将设计一个软件工具,协助用户区分软目标、硬目标和关键基础设施要素。这是一项复杂的任务;因此,问题将简化为运输部门,在这个部门几乎可以涵盖所有选择。本文将描述软件工具的概念,包括用户需求和标准。
{"title":"The Concept of a Software Tool with an Interactive Map for Identification and Determination of Soft Targets of Transport Infrastructure","authors":"Dora Kotkova, M. Hromada, Martina Malanikova, Stanislav Kovar","doi":"10.1109/ICCST49569.2021.9717375","DOIUrl":"https://doi.org/10.1109/ICCST49569.2021.9717375","url":null,"abstract":"The article discusses theoretical problems of identification and determination of soft targets described by legislative documents. Currently, the definition of soft targets is not clear, so a methodology has been developed that eliminates this problem. To ensure the user-friendliness of the methodology, a software tool will be designed to assist users in distinguishing between soft, hard targets and critical infrastructure elements. This is a complicated task; therefore, the problem will be simplified only to the transport sector where could be covered almost all options. The article will describe the concept of the software tool, including user requirements and criteria.","PeriodicalId":101539,"journal":{"name":"2021 International Carnahan Conference on Security Technology (ICCST)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132469191","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
2021 International Carnahan Conference on Security Technology (ICCST)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1