首页 > 最新文献

2010 IEEE International Conference on Technologies for Homeland Security (HST)最新文献

英文 中文
Wireless systems of threats monitoring 无线威胁监测系统
Pub Date : 2011-10-19 DOI: 10.1007/978-3-642-24660-9_1
S. Ambroziak, R. Katulski, J. Sadowski, J. Stefanski
{"title":"Wireless systems of threats monitoring","authors":"S. Ambroziak, R. Katulski, J. Sadowski, J. Stefanski","doi":"10.1007/978-3-642-24660-9_1","DOIUrl":"https://doi.org/10.1007/978-3-642-24660-9_1","url":null,"abstract":"","PeriodicalId":106557,"journal":{"name":"2010 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125308604","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Cyber security concerns of Supervisory Control and Data Acquisition (SCADA) systems 监控和数据采集(SCADA)系统的网络安全问题
Pub Date : 2010-12-03 DOI: 10.1109/THS.2010.5654964
D. Dumont
IEEE HST 2010 Conference Monitoring the distribution of our nation's critical infrastructure services is very complicated. Transportation, chemical, water, natural gas, petroleum, electricity, and energy sectors rely heavily on the ability of Supervisory Control and Data Acquisition (SCADA) systems to monitor and respond to changes and fluctuations within the system (NIPP, 2009). Changes can be reflected by natural elements such as the weather or based on customer demand. SCADA refers to the computer controlled and interfaced systems that run an industry's operations. SCADA systems at one time were not connected to the outside world and industrial operations were computer controlled within the property boundary that defined the facility. However, with maturity, technology and increased competition comes the advent of monitoring of customer usage. This also increases risk of cyber threat. In this paper, we will discuss SCADA usage and cyber vulnerability.
监测我国关键基础设施服务的分布是非常复杂的。运输、化工、水、天然气、石油、电力和能源部门严重依赖监控和数据采集(SCADA)系统监测和响应系统内的变化和波动的能力(NIPP, 2009年)。变化可以通过天气等自然因素或基于客户需求来反映。SCADA指的是运行工业操作的计算机控制和接口系统。SCADA系统一度没有连接到外部世界,工业操作是在定义设施的财产边界内由计算机控制的。然而,随着技术的成熟和竞争的加剧,出现了对客户使用情况的监控。这也增加了网络威胁的风险。在本文中,我们将讨论SCADA的使用和网络漏洞。
{"title":"Cyber security concerns of Supervisory Control and Data Acquisition (SCADA) systems","authors":"D. Dumont","doi":"10.1109/THS.2010.5654964","DOIUrl":"https://doi.org/10.1109/THS.2010.5654964","url":null,"abstract":"IEEE HST 2010 Conference Monitoring the distribution of our nation's critical infrastructure services is very complicated. Transportation, chemical, water, natural gas, petroleum, electricity, and energy sectors rely heavily on the ability of Supervisory Control and Data Acquisition (SCADA) systems to monitor and respond to changes and fluctuations within the system (NIPP, 2009). Changes can be reflected by natural elements such as the weather or based on customer demand. SCADA refers to the computer controlled and interfaced systems that run an industry's operations. SCADA systems at one time were not connected to the outside world and industrial operations were computer controlled within the property boundary that defined the facility. However, with maturity, technology and increased competition comes the advent of monitoring of customer usage. This also increases risk of cyber threat. In this paper, we will discuss SCADA usage and cyber vulnerability.","PeriodicalId":106557,"journal":{"name":"2010 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129146831","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Image fusion using the Parameterized Logarithmic Dual Tree Complex Wavelet Transform 基于参数化对数对偶树复小波变换的图像融合
Pub Date : 2010-12-03 DOI: 10.1109/THS.2010.5655039
S. Nercessian, K. Panetta, S. Agaian
Image fusion combines multiple images into a single image containing the relevant information from each of the original source images. This paper introduces a new Parameterized Logarithmic Dual Tree Complex Wavelet Transform (PL-DT-CWT) and its application for image fusion. The new transform combines the Dual Tree Complex Wavelet Transform (DT-CWT) with the Parameterized Logarithmic Image Processing (PLIP) model, a nonlinear image processing framework for processing images. Experimental results via computer simulations illustrate the improved performance of the proposed algorithms by both qualitative and quantitative means.
图像融合将多个图像合并为单个图像,其中包含来自每个原始源图像的相关信息。介绍了一种新的参数化对数对偶树复小波变换(PL-DT-CWT)及其在图像融合中的应用。该变换将对偶树复小波变换(DT-CWT)与参数化对数图像处理(PLIP)模型(一种用于处理图像的非线性图像处理框架)相结合。计算机仿真实验结果表明,本文提出的算法在定性和定量方面都取得了较好的效果。
{"title":"Image fusion using the Parameterized Logarithmic Dual Tree Complex Wavelet Transform","authors":"S. Nercessian, K. Panetta, S. Agaian","doi":"10.1109/THS.2010.5655039","DOIUrl":"https://doi.org/10.1109/THS.2010.5655039","url":null,"abstract":"Image fusion combines multiple images into a single image containing the relevant information from each of the original source images. This paper introduces a new Parameterized Logarithmic Dual Tree Complex Wavelet Transform (PL-DT-CWT) and its application for image fusion. The new transform combines the Dual Tree Complex Wavelet Transform (DT-CWT) with the Parameterized Logarithmic Image Processing (PLIP) model, a nonlinear image processing framework for processing images. Experimental results via computer simulations illustrate the improved performance of the proposed algorithms by both qualitative and quantitative means.","PeriodicalId":106557,"journal":{"name":"2010 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"122 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128022189","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Image enhancement based on transform coefficient histogram shifting and shaping 基于变换系数直方图移位和整形的图像增强
Pub Date : 2010-12-03 DOI: 10.1109/THS.2010.5654968
Junjun Xia, K. Panetta, S. Agaian
This paper proposes two image enhancement algorithms that are based on utilizing histogram data gathered from wavelet transform domain coefficients. Computer simulations demonstrate that combining the spatial method of histogram equalization with the wavelet transform domain coefficient histograms achieves a much more balanced enhancement, which outperforms classical histogram equalization algorithms.
本文提出了两种基于小波变换域系数直方图数据的图像增强算法。计算机仿真结果表明,将空间直方图均衡化方法与小波变换域系数直方图相结合,可以获得比传统直方图均衡化算法更加均衡的增强效果。
{"title":"Image enhancement based on transform coefficient histogram shifting and shaping","authors":"Junjun Xia, K. Panetta, S. Agaian","doi":"10.1109/THS.2010.5654968","DOIUrl":"https://doi.org/10.1109/THS.2010.5654968","url":null,"abstract":"This paper proposes two image enhancement algorithms that are based on utilizing histogram data gathered from wavelet transform domain coefficients. Computer simulations demonstrate that combining the spatial method of histogram equalization with the wavelet transform domain coefficient histograms achieves a much more balanced enhancement, which outperforms classical histogram equalization algorithms.","PeriodicalId":106557,"journal":{"name":"2010 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125641529","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
X-ray Phase Contrast Imaging with coded apertures for next generation baggage scanning systems 用于下一代行李扫描系统的带编码孔径的x射线相衬成像
Pub Date : 2010-12-03 DOI: 10.1109/THS.2010.5655037
K. Ignatyev, P. Munro, R. Speller, A. Olivo
X-ray Phase Contrast Imaging (XPCi) is a novel method which was proven to enhance the visibility of all details compared to conventional, absorption-based x-ray imaging. Here we propose the application of such a methodology to baggage scanners, a field in which XPCi had not been tested before, and we demonstrate improved detail visibility on a range of samples representing difficult cases in security inspections. A working prototype system has been built, and the results obtained by imaging several test objects mimicking possible components of threat objects. Test objects were also imaged with additional absorbing layers, to show that the method can be used with cluttered environment of baggage in realistic conditions. In all cases, all details were clearly detected with high contrast and high signal-to-noise ratio. Our laboratory-based system uses a conventional X-ray source and a commercially available X-ray detector for data generation. The system can be scaled up by using larger coded apertures.
x射线相衬成像(XPCi)是一种新方法,与传统的基于吸收的x射线成像相比,它被证明可以增强所有细节的可见性。在这里,我们建议将这种方法应用于行李扫描仪,这是XPCi以前从未测试过的领域,我们展示了在安全检查中代表困难案例的一系列样品上改进的细节可见性。建立了一个工作原型系统,并通过对多个测试对象进行成像来模拟威胁目标的可能组成部分,从而获得了测试结果。测试对象还附加了吸收层成像,以表明该方法可以在现实条件下用于杂乱的行李环境。在所有病例中,所有细节都被清晰地检测出来,具有高对比度和高信噪比。我们基于实验室的系统使用传统的x射线源和商用x射线探测器进行数据生成。该系统可以通过使用更大的编码孔径来扩大规模。
{"title":"X-ray Phase Contrast Imaging with coded apertures for next generation baggage scanning systems","authors":"K. Ignatyev, P. Munro, R. Speller, A. Olivo","doi":"10.1109/THS.2010.5655037","DOIUrl":"https://doi.org/10.1109/THS.2010.5655037","url":null,"abstract":"X-ray Phase Contrast Imaging (XPCi) is a novel method which was proven to enhance the visibility of all details compared to conventional, absorption-based x-ray imaging. Here we propose the application of such a methodology to baggage scanners, a field in which XPCi had not been tested before, and we demonstrate improved detail visibility on a range of samples representing difficult cases in security inspections. A working prototype system has been built, and the results obtained by imaging several test objects mimicking possible components of threat objects. Test objects were also imaged with additional absorbing layers, to show that the method can be used with cluttered environment of baggage in realistic conditions. In all cases, all details were clearly detected with high contrast and high signal-to-noise ratio. Our laboratory-based system uses a conventional X-ray source and a commercially available X-ray detector for data generation. The system can be scaled up by using larger coded apertures.","PeriodicalId":106557,"journal":{"name":"2010 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125717262","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Articulation of social and organizational considerations in states' emergency management information sharing 国家应急管理信息共享中的社会和组织考虑
Pub Date : 2010-12-03 DOI: 10.1109/THS.2010.5655058
J. Brooks, D. Bodeau, J. Fedorowicz
The Emergency Preparedness and Response (EP&R) community has embraced a wide array of information and communications technologies (ICTs) to support information sharing and communication among participating agencies. Yet many existing and proposed technological solutions remain inadequate to support the unpredictable and frequently changing information sharing needs that arise during emergencies. Participants turn away from emergency ICTs when social and organizational concerns supersede available technological support. This paper highlights the articulation process through which emergency managers attempt to reconcile intersecting organizational, social and technological concerns during emergency incidents. Illustrative examples from observations of operational exercises and interviews with emergency response personnel in several U.S. states inform our discussion of the resulting system design challenges. We conclude the paper by presenting three design principles for information sharing systems which support adaptive social and organizational aspects of emergency management.
应急准备和响应(EP&R)界已广泛采用各种信息和通信技术,以支持参与机构之间的信息共享和通信。然而,许多现有和拟议的技术解决办法仍然不足以支持紧急情况期间出现的不可预测和经常变化的信息共享需求。当社会和组织方面的关切取代了现有的技术支持时,参与者就不再使用应急信通技术。本文重点介绍了应急管理人员在应急事件中试图协调交叉的组织、社会和技术问题的衔接过程。从操作演习的观察和对美国几个州的应急响应人员的采访中得出的例子说明了我们对由此产生的系统设计挑战的讨论。我们通过提出支持应急管理的适应性社会和组织方面的信息共享系统的三个设计原则来总结本文。
{"title":"Articulation of social and organizational considerations in states' emergency management information sharing","authors":"J. Brooks, D. Bodeau, J. Fedorowicz","doi":"10.1109/THS.2010.5655058","DOIUrl":"https://doi.org/10.1109/THS.2010.5655058","url":null,"abstract":"The Emergency Preparedness and Response (EP&R) community has embraced a wide array of information and communications technologies (ICTs) to support information sharing and communication among participating agencies. Yet many existing and proposed technological solutions remain inadequate to support the unpredictable and frequently changing information sharing needs that arise during emergencies. Participants turn away from emergency ICTs when social and organizational concerns supersede available technological support. This paper highlights the articulation process through which emergency managers attempt to reconcile intersecting organizational, social and technological concerns during emergency incidents. Illustrative examples from observations of operational exercises and interviews with emergency response personnel in several U.S. states inform our discussion of the resulting system design challenges. We conclude the paper by presenting three design principles for information sharing systems which support adaptive social and organizational aspects of emergency management.","PeriodicalId":106557,"journal":{"name":"2010 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115691254","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Computer-assisted validation and verification of cybersecurity requirements 网络安全要求的计算机辅助验证和验证
Pub Date : 2010-12-03 DOI: 10.1109/THS.2010.5655087
D. Drusinsky, J. Michael, Thomas W. Otani, M. Shing, D. Wijesekera
Errors in requirements are often a contributing cause of the failure of critical infrastructure and their underlying information systems to adequately guard against cyber intrusions and withstand cyber attacks. However, detecting errors in the cybersecurity requirements, and for requirements in general, is a challenging task. In this paper we describe how computer-aided formal verification and validation can be leveraged to address the challenge of correctly capturing natural language cybersecurity requirements, converting the natural language statements into formal requirements specifications, and then checking the formal specifications to ensure that they match the original intent of the stakeholders. Our approach centers on creating a one-to-one mapping between natural language requirements and UML statechart assertions. Statechart assertions are Boolean statements about the expected behavior of the system, expressed as UML statecharts. The set of assertions created by the security or software engineer is a formal model of the system's requirements. We demonstrate our approach using examples of formally specifying and validating requirements for correct cyber system behaviors and the detection of illegal business schemes in choreographed web services.
需求中的错误通常是导致关键基础设施及其底层信息系统无法充分防范网络入侵和抵御网络攻击的原因之一。然而,检测网络安全需求中的错误,以及一般的需求,是一项具有挑战性的任务。在本文中,我们描述了如何利用计算机辅助的形式化验证和确认来解决正确捕获自然语言网络安全需求的挑战,将自然语言语句转换为形式化需求规范,然后检查形式化规范以确保它们符合涉众的原始意图。我们的方法集中于在自然语言需求和UML状态图断言之间创建一对一的映射。状态图断言是关于系统预期行为的布尔语句,表示为UML状态图。由安全工程师或软件工程师创建的断言集是系统需求的正式模型。我们使用正式指定和验证正确网络系统行为的需求以及在编排的web服务中检测非法业务方案的示例来演示我们的方法。
{"title":"Computer-assisted validation and verification of cybersecurity requirements","authors":"D. Drusinsky, J. Michael, Thomas W. Otani, M. Shing, D. Wijesekera","doi":"10.1109/THS.2010.5655087","DOIUrl":"https://doi.org/10.1109/THS.2010.5655087","url":null,"abstract":"Errors in requirements are often a contributing cause of the failure of critical infrastructure and their underlying information systems to adequately guard against cyber intrusions and withstand cyber attacks. However, detecting errors in the cybersecurity requirements, and for requirements in general, is a challenging task. In this paper we describe how computer-aided formal verification and validation can be leveraged to address the challenge of correctly capturing natural language cybersecurity requirements, converting the natural language statements into formal requirements specifications, and then checking the formal specifications to ensure that they match the original intent of the stakeholders. Our approach centers on creating a one-to-one mapping between natural language requirements and UML statechart assertions. Statechart assertions are Boolean statements about the expected behavior of the system, expressed as UML statecharts. The set of assertions created by the security or software engineer is a formal model of the system's requirements. We demonstrate our approach using examples of formally specifying and validating requirements for correct cyber system behaviors and the detection of illegal business schemes in choreographed web services.","PeriodicalId":106557,"journal":{"name":"2010 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124152026","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Score level fusion of hand based biometrics using t-norms 基于t规范的手部生物特征评分融合
Pub Date : 2010-12-03 DOI: 10.1109/THS.2010.5655093
M. Hanmandlu, J. Grover, V. Madasu, Shantaram Vasirkala
A multimodal biometric system amalgamates the information from multiple biometric sources to alleviate the limitations in performance of each individual biometric system. In this paper a multimodal biometric system employing hand based biometrics (i.e. palmprint, hand veins, and hand geometry) is developed. A general combination approach is proposed for the score level fusion which combines the matching scores from these hand based modalities using t-norms due to Hamacher, Yager, Weber, Schweizer and Sklar. This study aims at exploring the potential usefulness of t-norms for multimodal biometrics. These norms deal with the real challenge of uncertainty and imperfection pervading the different sources of knowledge (scores from different modalities). We construct the membership functions of fuzzy sets formed from the genuine and imposter scores of each of the modalities considered. The fused genuine score and imposter scores are obtained by integrating the fuzzified genuine scores and imposter scores respectively from each of the modalities. These norms are relatively very simple to apply unlike the other methods (example SVM, decision trees, discriminant analysis) as no training or any learning is required here. The proposed approach renders very good performance as it is quite computationally fast and outperforms the score level fusion using the conventional rules (min, max, sum, median) The experimental evaluation on a database of 100 users confirms the effectiveness of score level fusion. The preliminary results are encouraging in terms of decision accuracy and computing efficiency.
多模态生物识别系统将来自多个生物识别来源的信息合并在一起,以减轻每个生物识别系统在性能上的局限性。本文开发了一种基于手的生物识别技术(即掌纹、手静脉和手几何)的多模态生物识别系统。提出了一种用于分数水平融合的一般组合方法,该方法使用基于Hamacher, Yager, Weber, Schweizer和Sklar的t规范将这些基于手的模式的匹配分数结合起来。本研究旨在探索t规范对多模态生物识别的潜在用途。这些规范处理遍及不同知识来源(来自不同模式的分数)的不确定性和不完全性的真正挑战。我们构造了由所考虑的每个模态的真实分数和冒名顶替分数形成的模糊集的隶属函数。将模糊化后的真品分数和冒名顶替者分数分别进行积分,得到融合的真品分数和冒名顶替者分数。与其他方法(例如SVM,决策树,判别分析)不同,这些规范的应用相对非常简单,因为这里不需要训练或任何学习。该方法计算速度快,优于传统的分数融合规则(min、max、sum、median)。在100个用户的数据库上进行的实验评估证实了分数融合的有效性。初步结果在决策精度和计算效率方面令人鼓舞。
{"title":"Score level fusion of hand based biometrics using t-norms","authors":"M. Hanmandlu, J. Grover, V. Madasu, Shantaram Vasirkala","doi":"10.1109/THS.2010.5655093","DOIUrl":"https://doi.org/10.1109/THS.2010.5655093","url":null,"abstract":"A multimodal biometric system amalgamates the information from multiple biometric sources to alleviate the limitations in performance of each individual biometric system. In this paper a multimodal biometric system employing hand based biometrics (i.e. palmprint, hand veins, and hand geometry) is developed. A general combination approach is proposed for the score level fusion which combines the matching scores from these hand based modalities using t-norms due to Hamacher, Yager, Weber, Schweizer and Sklar. This study aims at exploring the potential usefulness of t-norms for multimodal biometrics. These norms deal with the real challenge of uncertainty and imperfection pervading the different sources of knowledge (scores from different modalities). We construct the membership functions of fuzzy sets formed from the genuine and imposter scores of each of the modalities considered. The fused genuine score and imposter scores are obtained by integrating the fuzzified genuine scores and imposter scores respectively from each of the modalities. These norms are relatively very simple to apply unlike the other methods (example SVM, decision trees, discriminant analysis) as no training or any learning is required here. The proposed approach renders very good performance as it is quite computationally fast and outperforms the score level fusion using the conventional rules (min, max, sum, median) The experimental evaluation on a database of 100 users confirms the effectiveness of score level fusion. The preliminary results are encouraging in terms of decision accuracy and computing efficiency.","PeriodicalId":106557,"journal":{"name":"2010 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124457080","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 35
Information systems management (ISM): Repertoires of collaboration for community warning (CW) and emergency incident response (EIR) 信息系统管理(ISM):社区预警(CW)和紧急事件响应(EIR)的协作库
Pub Date : 2010-12-03 DOI: 10.1109/THS.2010.5655055
D. Bunker
Due to the nature of disasters as emergent scenarios involving diverse stakeholders, it is suggested that ESA should consider supplementing their traditional command and control ISM responses with varying repertoires of collaborative action. Collaborative management and integration of information and processes around the organizations, people, systems and ICT infrastructure that support CW & EIR represents a paradigmatic shift in our thinking. This paper firstly defines the areas of focus for ISM in CW & EIR and then examines data collected by the Victorian Bushfires Royal Commission to highlight ISM issues and problems in this scenario that impacted effective collaborative action. This analysis is summarized to focus on lessons learned and make preliminary recommendations in the development of a set of high-level scenario dependent, information and process management improvement guidelines. These recommendations are expressed through the combination of “command and control” structures with suggested “repertoires of collaboration” as well as ISM structural and management improvements and metrics.
由于灾害是涉及不同利益相关者的紧急情况,因此建议ESA应考虑用不同的协作行动库来补充其传统的指挥和控制ISM响应。围绕组织、人员、系统和ICT基础设施的信息和流程的协作管理和集成代表了我们思维的范式转变。本文首先定义了ISM在CW和EIR中的重点领域,然后检查了维多利亚森林大火皇家委员会收集的数据,以突出ISM在这种情况下影响有效协作行动的问题。总结了这一分析,重点是吸取的经验教训,并在制定一套高水平的依赖于情景的信息和流程管理改进准则方面提出初步建议。这些建议通过“命令和控制”结构与建议的“协作库”以及ISM结构和管理改进和度量的组合来表达。
{"title":"Information systems management (ISM): Repertoires of collaboration for community warning (CW) and emergency incident response (EIR)","authors":"D. Bunker","doi":"10.1109/THS.2010.5655055","DOIUrl":"https://doi.org/10.1109/THS.2010.5655055","url":null,"abstract":"Due to the nature of disasters as emergent scenarios involving diverse stakeholders, it is suggested that ESA should consider supplementing their traditional command and control ISM responses with varying repertoires of collaborative action. Collaborative management and integration of information and processes around the organizations, people, systems and ICT infrastructure that support CW & EIR represents a paradigmatic shift in our thinking. This paper firstly defines the areas of focus for ISM in CW & EIR and then examines data collected by the Victorian Bushfires Royal Commission to highlight ISM issues and problems in this scenario that impacted effective collaborative action. This analysis is summarized to focus on lessons learned and make preliminary recommendations in the development of a set of high-level scenario dependent, information and process management improvement guidelines. These recommendations are expressed through the combination of “command and control” structures with suggested “repertoires of collaboration” as well as ISM structural and management improvements and metrics.","PeriodicalId":106557,"journal":{"name":"2010 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116804334","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
PortSec: A port security risk analysis and resource allocation system PortSec:一个港口安全风险分析和资源分配系统
Pub Date : 2010-12-03 DOI: 10.1109/THS.2010.5655048
M. Orosz, Carl Southwell, A. Barrett, Jennifer Chen, Petros A. Ioannou, A. Abadi, I. Maya
Ports are important nodal points that stimulate the US economy. This is particularly true of the Ports of Los Angeles and Long Beach (POLA/LB). Over 40% of all containers shipped to and out of the US flow through this two-port complex. The POLA/LB along with other port complexes face many challenges — including maximizing operational efficiency while simultaneously minimizing risk from catastrophes, including terrorism and other man-made or natural disaster events and minimizing environmental impacts. Often these challenges are at odds with one another — increasing one often comes at the expense of achieving the other. The DHS-funded Center for Risk and Economic Analysis of Terrorism Events (CREATE) is developing a port security risk management and resource allocation system (PortSec). PortSec will support both tactical day-to-day security decision-making and long-term strategic security planning. An initial PortSec prototype (1.0) that supports tactical day-to-day risk assessment and resource allocation is currently undergoing evaluation at POLA/LB.
港口是刺激美国经济的重要节点。洛杉矶港和长滩港(POLA/LB)尤其如此。进出美国的所有集装箱中,有40%以上都要经过这个两个港口的综合设施。POLA/LB和其他港口综合体面临着许多挑战,包括最大限度地提高运营效率,同时最大限度地降低灾难风险,包括恐怖主义和其他人为或自然灾害事件,以及最大限度地减少对环境的影响。这些挑战往往是相互矛盾的——增加一个挑战往往是以牺牲另一个挑战为代价的。国土安全部资助的恐怖主义事件风险和经济分析中心(CREATE)正在开发一个港口安全风险管理和资源分配系统(PortSec)。PortSec将支持战术日常安全决策和长期战略安全规划。最初的PortSec原型(1.0)支持战术日常风险评估和资源分配,目前正在POLA/LB进行评估。
{"title":"PortSec: A port security risk analysis and resource allocation system","authors":"M. Orosz, Carl Southwell, A. Barrett, Jennifer Chen, Petros A. Ioannou, A. Abadi, I. Maya","doi":"10.1109/THS.2010.5655048","DOIUrl":"https://doi.org/10.1109/THS.2010.5655048","url":null,"abstract":"Ports are important nodal points that stimulate the US economy. This is particularly true of the Ports of Los Angeles and Long Beach (POLA/LB). Over 40% of all containers shipped to and out of the US flow through this two-port complex. The POLA/LB along with other port complexes face many challenges — including maximizing operational efficiency while simultaneously minimizing risk from catastrophes, including terrorism and other man-made or natural disaster events and minimizing environmental impacts. Often these challenges are at odds with one another — increasing one often comes at the expense of achieving the other. The DHS-funded Center for Risk and Economic Analysis of Terrorism Events (CREATE) is developing a port security risk management and resource allocation system (PortSec). PortSec will support both tactical day-to-day security decision-making and long-term strategic security planning. An initial PortSec prototype (1.0) that supports tactical day-to-day risk assessment and resource allocation is currently undergoing evaluation at POLA/LB.","PeriodicalId":106557,"journal":{"name":"2010 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124044047","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
期刊
2010 IEEE International Conference on Technologies for Homeland Security (HST)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1