首页 > 最新文献

2010 IEEE International Conference on Technologies for Homeland Security (HST)最新文献

英文 中文
Modeling most likely pathways for smuggling radioactive and special nuclear materials on a worldwide multimodal transportation network 模拟在全球多式联运网络上走私放射性和特殊核材料的最可能途径
Pub Date : 2010-12-03 DOI: 10.1109/THS.2010.5654959
K. Saeger, L. Cuéllar
Nuclear weapons proliferation is an existing and growing worldwide problem. To help with devising strategies and supporting decisions to interdict the transport of nuclear material, we developed the Pathway Analysis, Threat Response and Interdiction Options Tool (PATRIOT) that provides an analytical approach for evaluating the probability that an adversary smuggling radioactive or special nuclear material will be detected during transit. We incorporate a global, multi-modal transportation network, explicit representation of designed and serendipitous detection opportunities, and multiple threat devices, material types, and shielding levels. This paper presents the general structure of PATRIOT, and focuses on the theoretical framework used to model the reliabilities of all network components that are used to predict the most likely pathways to the target.
核武器扩散是一个既存且日益严重的世界性问题。为协助制定战略和支持决策,以拦截核材料的运输,我们开发了途径分析、威胁应对和拦截选项工具(PATRIOT),提供了一种分析方法,以评估敌方走私放射性或特殊核材料在运输过程中被发现的可能性。我们整合了一个全球性的多式联运网络,明确表示设计和偶然的检测机会,以及多种威胁设备,材料类型和屏蔽级别。本文介绍了爱国者的总体结构,并重点介绍了用于对所有网络组件的可靠性进行建模的理论框架,这些组件用于预测最可能到达目标的路径。
{"title":"Modeling most likely pathways for smuggling radioactive and special nuclear materials on a worldwide multimodal transportation network","authors":"K. Saeger, L. Cuéllar","doi":"10.1109/THS.2010.5654959","DOIUrl":"https://doi.org/10.1109/THS.2010.5654959","url":null,"abstract":"Nuclear weapons proliferation is an existing and growing worldwide problem. To help with devising strategies and supporting decisions to interdict the transport of nuclear material, we developed the Pathway Analysis, Threat Response and Interdiction Options Tool (PATRIOT) that provides an analytical approach for evaluating the probability that an adversary smuggling radioactive or special nuclear material will be detected during transit. We incorporate a global, multi-modal transportation network, explicit representation of designed and serendipitous detection opportunities, and multiple threat devices, material types, and shielding levels. This paper presents the general structure of PATRIOT, and focuses on the theoretical framework used to model the reliabilities of all network components that are used to predict the most likely pathways to the target.","PeriodicalId":106557,"journal":{"name":"2010 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132022586","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Sensor fusion and feature-based human/animal classification for Unattended Ground Sensors 无人值守地面传感器的传感器融合和基于特征的人/动物分类
Pub Date : 2010-12-03 DOI: 10.1109/THS.2010.5655025
R. Narayanaswami, Avinash Gandhe, A. Tyurina, R. Mehra
In this paper we examine novel signal processing algorithms that utilize wavelet statistics, spectral statistics and power spectral density in addition to cadence and kurtosis for robust discrimination of humans and animals in an Unattended Ground Sensor (UGS) field. The wavelet statistics are based on the average, variance and energy of the third scale residue. The spectral statistics are based on amplitude and shape features. A learning classifier approach is used for discrimination. Training data consists of scripted events with humans walking/running along known paths; as well as riders on horses and moving vehicles on a two node sensor network. Natural events are recorded when animals, such as cows, coyotes, rabbits and kangaroo rats are in the vicinity of the sensor nodes. Each node has a three axis accelerometer and a three axis geophone and one node has a low frequency geophone in addition. In our work we use the C4.5 classifier which is a tree-based classifier and is capable of modeling complex decision surfaces while simultaneously limiting the complexity of the trees through pruning schemes. The classifier is tested on test data and the performance results are very promising — results indicate that UGS-only systems are indeed feasible for border security. The development of a successful signal processing solution to better discriminate between humans and animals would be very valuable to the Department of Homeland Security and our paper will summarize these new results.
在本文中,我们研究了一种新的信号处理算法,该算法利用小波统计、谱统计和功率谱密度以及节奏和峰度来对无人值机地面传感器(UGS)领域的人类和动物进行鲁棒区分。小波统计基于三尺度残差的均值、方差和能量。光谱统计是基于振幅和形状特征。使用学习分类器方法进行判别。训练数据由人类沿着已知路径行走/奔跑的脚本事件组成;在一个双节点传感器网络上,骑马的人和移动的车辆也可以。当奶牛、土狼、兔子和袋鼠鼠等动物在传感器节点附近时,就会记录下自然事件。每个节点具有一个三轴加速度计和一个三轴检波器,其中一个节点还具有一个低频检波器。在我们的工作中,我们使用C4.5分类器,这是一个基于树的分类器,能够建模复杂的决策面,同时通过修剪方案限制树的复杂性。该分类器在测试数据上进行了测试,性能结果非常有希望-结果表明仅ugs系统对于边境安全确实是可行的。开发一种成功的信号处理解决方案来更好地区分人和动物对国土安全部来说非常有价值,我们的论文将总结这些新的结果。
{"title":"Sensor fusion and feature-based human/animal classification for Unattended Ground Sensors","authors":"R. Narayanaswami, Avinash Gandhe, A. Tyurina, R. Mehra","doi":"10.1109/THS.2010.5655025","DOIUrl":"https://doi.org/10.1109/THS.2010.5655025","url":null,"abstract":"In this paper we examine novel signal processing algorithms that utilize wavelet statistics, spectral statistics and power spectral density in addition to cadence and kurtosis for robust discrimination of humans and animals in an Unattended Ground Sensor (UGS) field. The wavelet statistics are based on the average, variance and energy of the third scale residue. The spectral statistics are based on amplitude and shape features. A learning classifier approach is used for discrimination. Training data consists of scripted events with humans walking/running along known paths; as well as riders on horses and moving vehicles on a two node sensor network. Natural events are recorded when animals, such as cows, coyotes, rabbits and kangaroo rats are in the vicinity of the sensor nodes. Each node has a three axis accelerometer and a three axis geophone and one node has a low frequency geophone in addition. In our work we use the C4.5 classifier which is a tree-based classifier and is capable of modeling complex decision surfaces while simultaneously limiting the complexity of the trees through pruning schemes. The classifier is tested on test data and the performance results are very promising — results indicate that UGS-only systems are indeed feasible for border security. The development of a successful signal processing solution to better discriminate between humans and animals would be very valuable to the Department of Homeland Security and our paper will summarize these new results.","PeriodicalId":106557,"journal":{"name":"2010 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123249549","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Visual Analytics Law Enforcement Toolkit 可视化分析执法工具包
Pub Date : 2010-12-03 DOI: 10.1109/THS.2010.5655057
A. Malik, Ross Maciejewski, Timothy F. Collins, D. Ebert
We present VALET, a Visual Analytics Law Enforcement Toolkit for analyzing spatiotemporal law enforcement data. VALET provides users with a suite of analytical tools coupled with an interactive visual interface for data exploration and analysis. This system includes linked views and interactive displays that spatiotemporally model criminal, traffic and civil (CTC) incidents and allows officials to observe patterns and quickly identify regions with higher probabilities of activity. Our toolkit provides analysts with the ability to visualize different types of data sets (census data, daily weather reports, zoning tracts, prominent calendar dates, etc.) that provide an insight into correlations among CTC incidents and spatial demographics. In the spatial domain, we have implemented a kernel density estimation mapping technique that creates a color map of spatially distributed CTC events that allows analysts to quickly find and identify areas with unusually large activity levels. In the temporal domain, reports can be aggregated by day, week, month or year, allowing the analysts to visualize the CTC activities spatially over a period of time. Furthermore, we have incorporated temporal prediction algorithms to forecast future CTC incident levels within a 95% confidence interval. Such predictions aid law enforcement officials in understanding how hotspots may grow in the future in order to judiciously allocate resources and take preventive measures. Our system has been developed using actual law enforcement data and is currently being evaluated and refined by a consortium of law enforcement agencies.
我们提出VALET,一个可视化分析执法工具包,用于分析时空执法数据。VALET为用户提供了一套分析工具,以及用于数据探索和分析的交互式可视化界面。该系统包括链接视图和交互式显示,在时空上模拟犯罪、交通和民事(CTC)事件,并允许官员观察模式并快速识别活动概率较高的区域。我们的工具包使分析人员能够可视化不同类型的数据集(人口普查数据、每日天气报告、分区、突出日历日期等),从而深入了解CTC事件与空间人口统计数据之间的相关性。在空间领域,我们实现了核密度估计映射技术,该技术创建了空间分布的CTC事件的彩色地图,使分析人员能够快速找到并识别具有异常大活动水平的区域。在时间域中,报告可以按天、周、月或年进行聚合,从而允许分析人员在一段时间内可视化CTC的空间活动。此外,我们还结合了时间预测算法,在95%的置信区间内预测未来的CTC事件水平。这样的预测有助于执法人员了解热点在未来可能如何发展,以便明智地分配资源并采取预防措施。我们的系统是根据实际执法数据开发的,目前正在由一个执法机构联盟进行评估和完善。
{"title":"Visual Analytics Law Enforcement Toolkit","authors":"A. Malik, Ross Maciejewski, Timothy F. Collins, D. Ebert","doi":"10.1109/THS.2010.5655057","DOIUrl":"https://doi.org/10.1109/THS.2010.5655057","url":null,"abstract":"We present VALET, a Visual Analytics Law Enforcement Toolkit for analyzing spatiotemporal law enforcement data. VALET provides users with a suite of analytical tools coupled with an interactive visual interface for data exploration and analysis. This system includes linked views and interactive displays that spatiotemporally model criminal, traffic and civil (CTC) incidents and allows officials to observe patterns and quickly identify regions with higher probabilities of activity. Our toolkit provides analysts with the ability to visualize different types of data sets (census data, daily weather reports, zoning tracts, prominent calendar dates, etc.) that provide an insight into correlations among CTC incidents and spatial demographics. In the spatial domain, we have implemented a kernel density estimation mapping technique that creates a color map of spatially distributed CTC events that allows analysts to quickly find and identify areas with unusually large activity levels. In the temporal domain, reports can be aggregated by day, week, month or year, allowing the analysts to visualize the CTC activities spatially over a period of time. Furthermore, we have incorporated temporal prediction algorithms to forecast future CTC incident levels within a 95% confidence interval. Such predictions aid law enforcement officials in understanding how hotspots may grow in the future in order to judiciously allocate resources and take preventive measures. Our system has been developed using actual law enforcement data and is currently being evaluated and refined by a consortium of law enforcement agencies.","PeriodicalId":106557,"journal":{"name":"2010 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121307970","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 33
Challenges of remote border monitoring 远程边境监测的挑战
Pub Date : 2010-12-03 DOI: 10.1109/THS.2010.5655034
P. Pratap, Jarrod M. Kallberg, Lauren A. Thomas
Monitoring long lengths of remote borders with ground surveillance methods, presents many challenges. This paper will discuss three in particular that must be addressed in order to build an effective remote ground surveillance system. The three issues are: (1) providing reliable and efficient power, (2) providing adequate and timely maintenance to minimize downtime, and (3) networking systems for effective data transmission. A well planned remote ground surveillance system that overcomes each of these three challenges will provide a cost-effective solution requiring minimal support infrastructure solution to meet border monitoring and protection needs.
用地面监视方法监测长距离的远程边界,提出了许多挑战。本文将特别讨论三个必须解决的问题,以便建立一个有效的远程地面监视系统。这三个问题是:(1)提供可靠和高效的电源;(2)提供充分和及时的维护以最大限度地减少停机时间;(3)建立有效数据传输的网络系统。一个规划良好的远程地面监视系统,克服这三个挑战,将提供一个具有成本效益的解决方案,需要最少的支持基础设施解决方案,以满足边境监测和保护需求。
{"title":"Challenges of remote border monitoring","authors":"P. Pratap, Jarrod M. Kallberg, Lauren A. Thomas","doi":"10.1109/THS.2010.5655034","DOIUrl":"https://doi.org/10.1109/THS.2010.5655034","url":null,"abstract":"Monitoring long lengths of remote borders with ground surveillance methods, presents many challenges. This paper will discuss three in particular that must be addressed in order to build an effective remote ground surveillance system. The three issues are: (1) providing reliable and efficient power, (2) providing adequate and timely maintenance to minimize downtime, and (3) networking systems for effective data transmission. A well planned remote ground surveillance system that overcomes each of these three challenges will provide a cost-effective solution requiring minimal support infrastructure solution to meet border monitoring and protection needs.","PeriodicalId":106557,"journal":{"name":"2010 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125236446","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
IC.NET — Incident Command “Net”: A system using EDXL-DE for intelligent message routing 事件命令“Net”:一个使用edxml - de进行智能消息路由的系统
Pub Date : 2010-12-03 DOI: 10.1109/THS.2010.5655063
D. McGarry, C. Y. Chen
Traditionally, during a disaster response, primary reliance is on voice over radio communication along with pen and paper notes for situational awareness. This paper explores our research regarding emergency data interoperability, seeks to connect decision makers, operators/responders, and additional stakeholders through the development and application of standardized data messaging formats. In addition, we have investigated ways to route and expose emergency message data in ways that are complimentary to the current business processes of emergency response. This paper will discuss the use and implementation of data interoperability standards in this system, focused primarily on the use of a single top-level loose coupler used for dynamic routing and exposure of operational level Emergency Services / First Responder. Our IC.NET prototype implements payloads that include data specific to Emergency Medical Services such as incident representation, unit tasking, and triage, treatment, and transport tracking of emergency patients.
传统上,在灾难响应期间,主要依靠无线电通信的语音以及笔和纸笔记来进行态势感知。本文探讨了我们关于应急数据互操作性的研究,寻求通过开发和应用标准化数据消息传递格式来连接决策者、运营商/响应者和其他利益相关者。此外,我们还研究了以与当前应急响应业务流程互补的方式路由和公开紧急消息数据的方法。本文将讨论该系统中数据互操作性标准的使用和实现,主要关注用于动态路由和操作级应急服务/第一响应者暴露的单个顶级松散耦合器的使用。我们的IC.NET原型实现的有效负载包括特定于紧急医疗服务的数据,例如事件表示、单元任务、以及急救患者的分类、治疗和运输跟踪。
{"title":"IC.NET — Incident Command “Net”: A system using EDXL-DE for intelligent message routing","authors":"D. McGarry, C. Y. Chen","doi":"10.1109/THS.2010.5655063","DOIUrl":"https://doi.org/10.1109/THS.2010.5655063","url":null,"abstract":"Traditionally, during a disaster response, primary reliance is on voice over radio communication along with pen and paper notes for situational awareness. This paper explores our research regarding emergency data interoperability, seeks to connect decision makers, operators/responders, and additional stakeholders through the development and application of standardized data messaging formats. In addition, we have investigated ways to route and expose emergency message data in ways that are complimentary to the current business processes of emergency response. This paper will discuss the use and implementation of data interoperability standards in this system, focused primarily on the use of a single top-level loose coupler used for dynamic routing and exposure of operational level Emergency Services / First Responder. Our IC.NET prototype implements payloads that include data specific to Emergency Medical Services such as incident representation, unit tasking, and triage, treatment, and transport tracking of emergency patients.","PeriodicalId":106557,"journal":{"name":"2010 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122419200","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Goal-based assessment for the cybersecurity of critical infrastructure 关键基础设施网络安全目标评估
Pub Date : 2010-12-03 DOI: 10.1109/THS.2010.5655090
Samuel A. Merrell, A. Moore, James F. Stevens
Undertaking a comprehensive cybersecurity risk assessment of the networks and systems of a single infrastructure, or even a single organization of moderate size, requires significant resources. Efforts to simplify the assessment instrument usually obscure the ultimate goal of the assessment and the motivations for the assessment questions. This can make it difficult for assessors to justify the questions and can undermine the credibility of the assessment in the eyes of the organizations assessed. This paper describes the use of assurance cases to help address these problems. Viewing an assessment approach in terms of an assurance case clarifies the underlying motivation for the assessment and supports more rigorous analysis. The paper also shows how the assurance case method has been used to guide the development of an assessment approach called the Cyber Resilience Review (CRR), developed for the U.S. Department of Homeland Security.
对单一基础设施,甚至中等规模的单个组织的网络和系统进行全面的网络安全风险评估,需要大量资源。简化评估工具的努力通常会模糊评估的最终目标和评估问题的动机。这可能会使评估人员难以证明问题的合理性,并可能破坏评估在被评估组织眼中的可信度。本文描述了保证用例的使用,以帮助解决这些问题。根据保证案例查看评估方法可以澄清评估的潜在动机,并支持更严格的分析。该论文还展示了如何使用保证案例方法来指导为美国国土安全部开发的一种名为“网络弹性评估”(Cyber Resilience Review, CRR)的评估方法的开发。
{"title":"Goal-based assessment for the cybersecurity of critical infrastructure","authors":"Samuel A. Merrell, A. Moore, James F. Stevens","doi":"10.1109/THS.2010.5655090","DOIUrl":"https://doi.org/10.1109/THS.2010.5655090","url":null,"abstract":"Undertaking a comprehensive cybersecurity risk assessment of the networks and systems of a single infrastructure, or even a single organization of moderate size, requires significant resources. Efforts to simplify the assessment instrument usually obscure the ultimate goal of the assessment and the motivations for the assessment questions. This can make it difficult for assessors to justify the questions and can undermine the credibility of the assessment in the eyes of the organizations assessed. This paper describes the use of assurance cases to help address these problems. Viewing an assessment approach in terms of an assurance case clarifies the underlying motivation for the assessment and supports more rigorous analysis. The paper also shows how the assurance case method has been used to guide the development of an assessment approach called the Cyber Resilience Review (CRR), developed for the U.S. Department of Homeland Security.","PeriodicalId":106557,"journal":{"name":"2010 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"125 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114643565","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
An urban environment simulation framework for evaluating novel distributed radiation detection architectures 用于评估新型分布式辐射探测体系结构的城市环境模拟框架
Pub Date : 2010-12-03 DOI: 10.1109/THS.2010.5654958
M. King, B. Harris, Maurice Toolin, Regina M. DuBord, Victor J. Skowronski, Martin Lusoto, R. Estep, S. Brennan, B. R. Cosofret, K. Shokhirev
Protection of large and complex urban areas from radiological threats may be improved by employing a network of distributed radiation detectors. Among the many considerations involved in designing such a system are detector type, concept of operations, methods to collect and extract meaningful information from multiple data sources, and cost. We have developed a realistic simulation environment as an efficient method for accurately evaluating a variety of sensor queuing/routing schemes, distributed system architectures, and data fusion algorithms. This tool enables us to assesses and demonstrate overall system performance as a function of key operational and cost parameters. Early results show that a network of 8 fixed path and 5 random path NaI sensors achieves a Pd ∼ 90% within 10 minutes against a 1 mCi Cs137 source released to 1500 possible random locations within the ∼1.3 km × 1 km area centered around Philadelphia City Hall.
采用分布式辐射探测器网络可以改善对大型和复杂城市地区免受辐射威胁的保护。设计这样一个系统所涉及的许多考虑因素包括探测器类型、操作概念、从多个数据源收集和提取有意义信息的方法以及成本。我们已经开发了一个逼真的仿真环境,作为准确评估各种传感器排队/路由方案,分布式系统架构和数据融合算法的有效方法。该工具使我们能够评估和演示作为关键操作和成本参数的功能的整体系统性能。早期的结果表明,一个由8个固定路径和5个随机路径NaI传感器组成的网络,在1 mCi Cs137源释放到以费城市政厅为中心的1.3 km × 1 km区域内的1500个可能的随机位置上,在10分钟内实现Pd ~ 90%。
{"title":"An urban environment simulation framework for evaluating novel distributed radiation detection architectures","authors":"M. King, B. Harris, Maurice Toolin, Regina M. DuBord, Victor J. Skowronski, Martin Lusoto, R. Estep, S. Brennan, B. R. Cosofret, K. Shokhirev","doi":"10.1109/THS.2010.5654958","DOIUrl":"https://doi.org/10.1109/THS.2010.5654958","url":null,"abstract":"Protection of large and complex urban areas from radiological threats may be improved by employing a network of distributed radiation detectors. Among the many considerations involved in designing such a system are detector type, concept of operations, methods to collect and extract meaningful information from multiple data sources, and cost. We have developed a realistic simulation environment as an efficient method for accurately evaluating a variety of sensor queuing/routing schemes, distributed system architectures, and data fusion algorithms. This tool enables us to assesses and demonstrate overall system performance as a function of key operational and cost parameters. Early results show that a network of 8 fixed path and 5 random path NaI sensors achieves a Pd ∼ 90% within 10 minutes against a 1 mCi Cs137 source released to 1500 possible random locations within the ∼1.3 km × 1 km area centered around Philadelphia City Hall.","PeriodicalId":106557,"journal":{"name":"2010 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117256105","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Integrated sensing and command and control system for disaster response 灾害响应综合传感和指挥控制系统
Pub Date : 2010-12-03 DOI: 10.1109/THS.2010.5655066
A. Vidan, G. Hogan
Emergency responders fighting blazes and flooding, law enforcement securing sites and crowds, and medical teams treating victims are typical scenarios during rapidly-evolving, catastrophic events. The larger the disaster, the more complicated becomes the situation as thousands of responders from hundreds of organizations participate in the response and relief efforts. Organizing, coordinating and commanding these efforts remains a significant technical challenge, as it requires timely collection and distribution of information under harsh environments. With guidance from operational partners in California's emergency response community, we have designed, implemented and demonstrated a prototype integrated sensing and command and control system that enables shared situational awareness and collaboration during response operations. The system architecture is based on net-centric and service-oriented paradigms, and combines sensors, communications, and visualization and collaboration technologies, with all components being linked in (near) real-time. The utility of this prototype system was evaluated through a field exercise that tested the technical performance of the system and assessed the impact of new technologies on current concept of operations. In this paper, we describe the design analysis, system architecture, core enabling technologies, and the field evaluations.
在快速发展的灾难性事件中,紧急救援人员与火灾和洪水搏斗,执法人员保护场地和人群,医疗团队治疗受害者是典型的场景。灾难越大,情况就越复杂,因为来自数百个组织的数千名响应者参与了响应和救援工作。组织、协调和指挥这些工作仍然是一项重大的技术挑战,因为它需要在恶劣的环境下及时收集和分发信息。在加利福尼亚州应急响应社区的业务合作伙伴的指导下,我们设计、实施并演示了一个集成传感和指挥控制系统的原型,该系统可以在响应行动期间实现共享态势感知和协作。系统架构基于以网络为中心和面向服务的范例,并结合了传感器、通信、可视化和协作技术,所有组件都以(近)实时的方式链接在一起。该原型系统的效用通过实地演习进行了评估,该演习测试了系统的技术性能,并评估了新技术对当前作战概念的影响。在本文中,我们描述了设计分析、系统架构、核心使能技术和现场评估。
{"title":"Integrated sensing and command and control system for disaster response","authors":"A. Vidan, G. Hogan","doi":"10.1109/THS.2010.5655066","DOIUrl":"https://doi.org/10.1109/THS.2010.5655066","url":null,"abstract":"Emergency responders fighting blazes and flooding, law enforcement securing sites and crowds, and medical teams treating victims are typical scenarios during rapidly-evolving, catastrophic events. The larger the disaster, the more complicated becomes the situation as thousands of responders from hundreds of organizations participate in the response and relief efforts. Organizing, coordinating and commanding these efforts remains a significant technical challenge, as it requires timely collection and distribution of information under harsh environments. With guidance from operational partners in California's emergency response community, we have designed, implemented and demonstrated a prototype integrated sensing and command and control system that enables shared situational awareness and collaboration during response operations. The system architecture is based on net-centric and service-oriented paradigms, and combines sensors, communications, and visualization and collaboration technologies, with all components being linked in (near) real-time. The utility of this prototype system was evaluated through a field exercise that tested the technical performance of the system and assessed the impact of new technologies on current concept of operations. In this paper, we describe the design analysis, system architecture, core enabling technologies, and the field evaluations.","PeriodicalId":106557,"journal":{"name":"2010 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115791942","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Design, implementation and evaluation of covert channel attacks 隐蔽信道攻击的设计、实现和评估
Pub Date : 2010-12-03 DOI: 10.1109/THS.2010.5654967
Hamed Okhravi, Stanley Bak, Samuel T. King
Covert channel attacks pose a threat to the security of critical infrastructure and key resources (CIKR). To design defenses and countermeasures against this threat, we must understand all classes of covert channel attacks along with their properties. Network-based covert channels have been studied in great detail in previous work, although several other classes of covert channels (hardware-based and operating system-based) are largely unexplored. One of our contributions is investigating these classes by designing, implementing, and experimentally evaluating several specific covert channel attacks. We implement and evaluate hardware-based and operating system-based attacks and show significant differences in their properties and mechanisms. We also present channel capacity differences among the various attacks, which span three orders of magnitude. Furthermore, we present the concept of hybrid covert channel attacks which use two or more communication categories to transport data. Hybrid covert channels can be qualitatively harder to detect and counter than traditional covert channels. Finally, we summarize the lessons learned through covert channel attack design and implementation, which have important implications for critical asset protection and risk analysis. The study also facilitates the development of countermeasures to protect CIKR systems against covert channel attacks.
隐蔽信道攻击对关键基础设施和关键资源(CIKR)的安全构成威胁。为了设计针对这种威胁的防御和对策,我们必须了解所有类型的隐蔽通道攻击及其特性。在以前的工作中,基于网络的隐蔽通道已经进行了非常详细的研究,尽管其他几种隐蔽通道(基于硬件和基于操作系统)在很大程度上尚未被探索。我们的贡献之一是通过设计、实现和实验评估几种特定的隐蔽通道攻击来研究这些类。我们实现和评估基于硬件和基于操作系统的攻击,并显示其属性和机制的显著差异。我们还介绍了各种攻击之间的信道容量差异,这些攻击跨越三个数量级。此外,我们提出了混合隐蔽信道攻击的概念,它使用两种或更多的通信类别来传输数据。混合隐蔽信道在质量上比传统隐蔽信道更难检测和对抗。最后,我们总结了隐蔽通道攻击设计和实现的经验教训,这对关键资产保护和风险分析具有重要意义。该研究还促进了对抗措施的发展,以保护CIKR系统免受隐蔽信道攻击。
{"title":"Design, implementation and evaluation of covert channel attacks","authors":"Hamed Okhravi, Stanley Bak, Samuel T. King","doi":"10.1109/THS.2010.5654967","DOIUrl":"https://doi.org/10.1109/THS.2010.5654967","url":null,"abstract":"Covert channel attacks pose a threat to the security of critical infrastructure and key resources (CIKR). To design defenses and countermeasures against this threat, we must understand all classes of covert channel attacks along with their properties. Network-based covert channels have been studied in great detail in previous work, although several other classes of covert channels (hardware-based and operating system-based) are largely unexplored. One of our contributions is investigating these classes by designing, implementing, and experimentally evaluating several specific covert channel attacks. We implement and evaluate hardware-based and operating system-based attacks and show significant differences in their properties and mechanisms. We also present channel capacity differences among the various attacks, which span three orders of magnitude. Furthermore, we present the concept of hybrid covert channel attacks which use two or more communication categories to transport data. Hybrid covert channels can be qualitatively harder to detect and counter than traditional covert channels. Finally, we summarize the lessons learned through covert channel attack design and implementation, which have important implications for critical asset protection and risk analysis. The study also facilitates the development of countermeasures to protect CIKR systems against covert channel attacks.","PeriodicalId":106557,"journal":{"name":"2010 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124943183","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 43
The DETER project: Advancing the science of cyber security experimentation and test 威慑项目:推进网络安全实验和测试的科学
Pub Date : 2010-12-03 DOI: 10.1109/THS.2010.5655108
J. Mirkovic, Terry V. Benzel, Ted Faber, R. Braden, J. Wroclawski, S. Schwab
Since 2004, the DETER Cybersecurity Testbed Project has worked to create the necessary infrastructure — facilities, tools, and processes-to provide a national resource for experimentation in cyber security. The next generation of DETER envisions several conceptual advances in testbed design and experimental research methodology, targeting improved experimental validity, enhanced usability, and increased size, complexity, and diversity of experiments. This paper outlines the DETER project's status and current R&D directions.
自2004年以来,威慑网络安全试验台项目一直致力于创建必要的基础设施——设施、工具和流程——为网络安全实验提供国家资源。下一代威慑设想在试验台设计和实验研究方法方面的几个概念进步,目标是改进实验有效性,增强可用性,增加实验的规模,复杂性和多样性。本文概述了DETER项目的现状和当前的研发方向。
{"title":"The DETER project: Advancing the science of cyber security experimentation and test","authors":"J. Mirkovic, Terry V. Benzel, Ted Faber, R. Braden, J. Wroclawski, S. Schwab","doi":"10.1109/THS.2010.5655108","DOIUrl":"https://doi.org/10.1109/THS.2010.5655108","url":null,"abstract":"Since 2004, the DETER Cybersecurity Testbed Project has worked to create the necessary infrastructure — facilities, tools, and processes-to provide a national resource for experimentation in cyber security. The next generation of DETER envisions several conceptual advances in testbed design and experimental research methodology, targeting improved experimental validity, enhanced usability, and increased size, complexity, and diversity of experiments. This paper outlines the DETER project's status and current R&D directions.","PeriodicalId":106557,"journal":{"name":"2010 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123019911","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 121
期刊
2010 IEEE International Conference on Technologies for Homeland Security (HST)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1