首页 > 最新文献

2010 IEEE International Conference on Technologies for Homeland Security (HST)最新文献

英文 中文
Initial field measurements with the Multisensor Airborne Radiation Survey (MARS) high purity germanium (HPGe) detector array 使用多传感器机载辐射测量(MARS)高纯锗(HPGe)探测器阵列进行初步现场测量
Pub Date : 2010-12-03 DOI: 10.1109/THS.2010.5654937
J. Fast, C. Bonebrake, K. Dorow, B. D. Glasgow, J. Jensen, S. Morris, J. Orrell, W. Pitts, J. S. Rohrer, L. Todd
The Multi-sensor Airborne Radiation Survey (MARS) project has developed a new single cryostat detector array design for high purity germanium (HPGe) gamma ray spectrometers that achieves the high detection efficiency required for stand-off detection and actionable characterization of radiological threats. This approach is necessary since a high efficiency HPGe detector can only be built as an array due to limitations in growing large germanium crystals. The system is ruggedized and shock mounted for use in a variety of field applications. This paper reports on results from initial field measurements conducted in a truck and on two different boats.
多传感器机载辐射测量(MARS)项目开发了一种用于高纯度锗(HPGe)伽马射线光谱仪的新型单低温恒温器探测器阵列设计,该设计实现了对放射性威胁进行远距离探测和可操作表征所需的高探测效率。这种方法是必要的,因为由于生长大型锗晶体的限制,高效率的HPGe探测器只能作为阵列构建。该系统坚固耐用,并安装了减震装置,可用于各种现场应用。本文报告了在一辆卡车和两艘不同的船上进行的初步现场测量的结果。
{"title":"Initial field measurements with the Multisensor Airborne Radiation Survey (MARS) high purity germanium (HPGe) detector array","authors":"J. Fast, C. Bonebrake, K. Dorow, B. D. Glasgow, J. Jensen, S. Morris, J. Orrell, W. Pitts, J. S. Rohrer, L. Todd","doi":"10.1109/THS.2010.5654937","DOIUrl":"https://doi.org/10.1109/THS.2010.5654937","url":null,"abstract":"The Multi-sensor Airborne Radiation Survey (MARS) project has developed a new single cryostat detector array design for high purity germanium (HPGe) gamma ray spectrometers that achieves the high detection efficiency required for stand-off detection and actionable characterization of radiological threats. This approach is necessary since a high efficiency HPGe detector can only be built as an array due to limitations in growing large germanium crystals. The system is ruggedized and shock mounted for use in a variety of field applications. This paper reports on results from initial field measurements conducted in a truck and on two different boats.","PeriodicalId":106557,"journal":{"name":"2010 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126101781","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Computation of things for human protection and fulfillment 为人类保护和实现而计算的东西
Pub Date : 2010-12-03 DOI: 10.1109/THS.2010.5655070
Justyna Zander, P. Mosterman, J. Kinnebrew, Gautam Biswas
Computer science and computational engineering have enabled great advances in modeling and simulation to analyze various scenarios. Still, facilitating and enhancing situational awareness for a single human is rarely considered. Poor decisions by an individual encountering everyday challenges or public threat situations can have dramatic effects, both for the individual and others. In the presented research, a Computation of Things (CoTh) framework is proposed to provide individual decision support during crises and prevent long-term deviations from safe and secure conditions. The target of CoTh is to enable a profound understanding of the situation from the viewpoint of individual persons in order to permanently reduce their fear, while simultaneously increasing awareness of appropriate responses. CoTh allows for a quick forecasting of action (or non-action) alternatives based on an individual human context, including geographic position (e.g., pollution level and energy usage), activity patterns (e.g., personal nutrition habits, lifestyle, traveling load, family status, circle of friends, social network, and virtual life), and state patterns (e.g., the DNA, current health conditions, and musculature of a human), depending on the considered situation. Insights into CoTh's motivation, requirements, and challenges are provided and the architecture proposal is depicted.
计算机科学和计算工程在建模和模拟分析各种场景方面取得了巨大的进步。然而,促进和增强单个人的态势感知很少被考虑。个人在遇到日常挑战或公共威胁情况时做出的错误决定可能会对个人和他人产生巨大影响。在本研究中,提出了一个物的计算(CoTh)框架,在危机期间提供个人决策支持,并防止长期偏离安全和有保障的条件。CoTh的目标是使人们能够从个人的角度深刻地了解局势,以便永久地减少他们的恐惧,同时提高对适当反应的认识。CoTh允许基于个人环境快速预测行动(或不行动)替代方案,包括地理位置(例如,污染水平和能源使用),活动模式(例如,个人营养习惯,生活方式,旅行负荷,家庭状况,朋友圈,社交网络和虚拟生活)和状态模式(例如,DNA,当前健康状况和人类的肌肉组织),这取决于所考虑的情况。提供了对CoTh的动机、需求和挑战的洞察,并描述了体系结构建议。
{"title":"Computation of things for human protection and fulfillment","authors":"Justyna Zander, P. Mosterman, J. Kinnebrew, Gautam Biswas","doi":"10.1109/THS.2010.5655070","DOIUrl":"https://doi.org/10.1109/THS.2010.5655070","url":null,"abstract":"Computer science and computational engineering have enabled great advances in modeling and simulation to analyze various scenarios. Still, facilitating and enhancing situational awareness for a single human is rarely considered. Poor decisions by an individual encountering everyday challenges or public threat situations can have dramatic effects, both for the individual and others. In the presented research, a Computation of Things (CoTh) framework is proposed to provide individual decision support during crises and prevent long-term deviations from safe and secure conditions. The target of CoTh is to enable a profound understanding of the situation from the viewpoint of individual persons in order to permanently reduce their fear, while simultaneously increasing awareness of appropriate responses. CoTh allows for a quick forecasting of action (or non-action) alternatives based on an individual human context, including geographic position (e.g., pollution level and energy usage), activity patterns (e.g., personal nutrition habits, lifestyle, traveling load, family status, circle of friends, social network, and virtual life), and state patterns (e.g., the DNA, current health conditions, and musculature of a human), depending on the considered situation. Insights into CoTh's motivation, requirements, and challenges are provided and the architecture proposal is depicted.","PeriodicalId":106557,"journal":{"name":"2010 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122356634","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Automatic contact detection in side-scan sonar data 侧扫声纳数据中的自动接触检测
Pub Date : 2010-12-03 DOI: 10.1109/THS.2010.5655043
R. Quintal, J. Kiernan, J. Shannon, P. Dysart
Side-scan sonar is a proven tool for detection of underwater objects, particularly those objects that project above the seafloor. Rapid assessment of side-scan imagery for object detection is critical for port security needs. However, current side-scan data processing techniques are largely manual, highly time-consuming, and prone to operator error. Availability of well-trained analysts is also a challenge. This article describes a research and development effort at Science Applications International Corporation to automate side-scan sonar contact detection for safety of navigation surveys. Included in the development effort are innovative image processing and machine learning techniques designed to reduce the number of false alarms. These automated techniques are directly applicable to port security operations.
侧扫声纳是一种经过验证的水下物体探测工具,特别是那些突出在海底上方的物体。快速评估用于目标检测的侧扫图像对港口安全需求至关重要。然而,目前的侧扫数据处理技术主要是手动的,非常耗时,并且容易出现操作错误。能否找到训练有素的分析师也是一个挑战。本文描述了科学应用国际公司的一项研究和开发工作,用于自动侧扫声纳接触检测,以确保导航调查的安全。开发工作包括创新的图像处理和机器学习技术,旨在减少误报的数量。这些自动化技术直接适用于港口保安操作。
{"title":"Automatic contact detection in side-scan sonar data","authors":"R. Quintal, J. Kiernan, J. Shannon, P. Dysart","doi":"10.1109/THS.2010.5655043","DOIUrl":"https://doi.org/10.1109/THS.2010.5655043","url":null,"abstract":"Side-scan sonar is a proven tool for detection of underwater objects, particularly those objects that project above the seafloor. Rapid assessment of side-scan imagery for object detection is critical for port security needs. However, current side-scan data processing techniques are largely manual, highly time-consuming, and prone to operator error. Availability of well-trained analysts is also a challenge. This article describes a research and development effort at Science Applications International Corporation to automate side-scan sonar contact detection for safety of navigation surveys. Included in the development effort are innovative image processing and machine learning techniques designed to reduce the number of false alarms. These automated techniques are directly applicable to port security operations.","PeriodicalId":106557,"journal":{"name":"2010 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129175706","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Transformational nuclear sensors — Real-time monitoring of WMDs, risk assessment & response 转型核传感器-大规模杀伤性武器的实时监测,风险评估和应对
Pub Date : 2010-12-03 DOI: 10.1109/THS.2010.5654950
B. Archambault, J. Webster, J. Lapinskas, T. Grimes, R. Taleyarkhan, A. Eghlima
Transformational nuclear particle sensor systems have been developed for detecting a variety of radiation types via interactions with ordinary fluids such as water and acetone placed under metastable states of tensioned (yes, sub-zero or below-vacuum) liquid pressures at room temperature. Advancements have resulted in the development of lab-scale prototypes which provide real-time directionality information to within 10 degrees of a neutron emitting weapons of mass destruction (WMD) source, with over 90% intrinsic efficiency, with ability to decipher multiplicity and to detect WMD-shielded neutrons in the 0.01 eV range, to unshielded neutrons in the 1–10 MeV range, and with the ability to detect alpha emitting special nuclear material (SNM) signatures to within 1–5 keV in energy resolution, and detection sensitivities to ultratrace levels (i.e., to femto-grams per cc of SNMs such as Pu, and Am). The tension metastable fluid detector (TMFD) systems are robust, and are built in the laboratory with costs in the ∼$100+ range — with inherent gamma blindness capability. A multi-physics design framework (including nuclear particle transport, acoustics, structural dynamics, fluid-heat transfer, and electro-magnetics), has also been developed, and validated.
转换核粒子传感器系统已经被开发出来,用于检测各种辐射类型,通过与普通流体(如水和丙酮)的相互作用,在室温下处于拉伸(是的,低于零或低于真空)液体压力的亚稳态。实验室规模原型的发展取得了进展,这些原型可以提供实时方向性信息,范围在10度以内的中子发射大规模杀伤性武器(WMD)源,具有90%以上的内在效率,能够破译多样性并探测0.01 eV范围内的大规模杀伤性武器屏蔽中子,以及1-10 MeV范围内的非屏蔽中子。并具有探测α发射特殊核材料(SNM)特征的能力,能量分辨率在1-5 keV以内,以及对超痕量水平的探测灵敏度(即每立方厘米的SNM,如Pu和Am)。张力亚稳流体探测器(TMFD)系统非常强大,并且在实验室中构建,成本在100美元以上-具有固有的伽马盲性能力。多物理场设计框架(包括核粒子输运、声学、结构动力学、流体传热和电磁学)也得到了开发和验证。
{"title":"Transformational nuclear sensors — Real-time monitoring of WMDs, risk assessment & response","authors":"B. Archambault, J. Webster, J. Lapinskas, T. Grimes, R. Taleyarkhan, A. Eghlima","doi":"10.1109/THS.2010.5654950","DOIUrl":"https://doi.org/10.1109/THS.2010.5654950","url":null,"abstract":"Transformational nuclear particle sensor systems have been developed for detecting a variety of radiation types via interactions with ordinary fluids such as water and acetone placed under metastable states of tensioned (yes, sub-zero or below-vacuum) liquid pressures at room temperature. Advancements have resulted in the development of lab-scale prototypes which provide real-time directionality information to within 10 degrees of a neutron emitting weapons of mass destruction (WMD) source, with over 90% intrinsic efficiency, with ability to decipher multiplicity and to detect WMD-shielded neutrons in the 0.01 eV range, to unshielded neutrons in the 1–10 MeV range, and with the ability to detect alpha emitting special nuclear material (SNM) signatures to within 1–5 keV in energy resolution, and detection sensitivities to ultratrace levels (i.e., to femto-grams per cc of SNMs such as Pu, and Am). The tension metastable fluid detector (TMFD) systems are robust, and are built in the laboratory with costs in the ∼$100+ range — with inherent gamma blindness capability. A multi-physics design framework (including nuclear particle transport, acoustics, structural dynamics, fluid-heat transfer, and electro-magnetics), has also been developed, and validated.","PeriodicalId":106557,"journal":{"name":"2010 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"704 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122965338","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
High-performance orthogonal sensing system and data analysis algorithm for trace explosives detection 痕量爆炸物检测的高性能正交传感系统及数据分析算法
Pub Date : 2010-12-03 DOI: 10.1109/THS.2010.5654953
S. Guharay, Wansheng Su
A hybrid sensor system is developed for trace explosives detection. The system incorporates orthogonal operational principles of its subcomponents: Surface Enhanced Raman Spectroscopy (SERS) provides high sensitivity as well as high selectivity, i.e., ultra-low detection limits simultaneously with very low false alarm rates while an ionization-based method, such as Ion Mobility Spectrometry (IMS), is used as a pre-filter to SERS, for this approach. This solution offers a significantly improved detection technology when both modes are evaluated concurrently, especially making a significant enhancement of the capability of SERS for open environment applications. This concept of operation provides a clean and controlled environment, and it enhances the operational reliability of SERS which forms the critical unit for this new detection system. The combined system outperforms the individual IMS or SERS components taken individually. This hybrid, orthogonal sensing method can be applied to other types of threat detection as well, namely, chemical and biological threats.
研制了一种用于痕量爆炸物探测的混合传感器系统。该系统结合了其子组件的正交操作原理:表面增强拉曼光谱(SERS)提供高灵敏度和高选择性,即超低检测限同时具有非常低的误报率,而基于电离的方法,如离子迁移谱法(IMS),用于该方法的SERS预过滤器。当同时评估两种模式时,该解决方案提供了显著改进的检测技术,特别是显著增强了开放环境应用程序的SERS功能。这种操作概念提供了一个清洁和受控的环境,并提高了SERS的操作可靠性,SERS是这种新检测系统的关键单元。组合系统的性能优于单独使用的IMS或SERS组件。这种混合正交传感方法也可以应用于其他类型的威胁检测,即化学和生物威胁。
{"title":"High-performance orthogonal sensing system and data analysis algorithm for trace explosives detection","authors":"S. Guharay, Wansheng Su","doi":"10.1109/THS.2010.5654953","DOIUrl":"https://doi.org/10.1109/THS.2010.5654953","url":null,"abstract":"A hybrid sensor system is developed for trace explosives detection. The system incorporates orthogonal operational principles of its subcomponents: Surface Enhanced Raman Spectroscopy (SERS) provides high sensitivity as well as high selectivity, i.e., ultra-low detection limits simultaneously with very low false alarm rates while an ionization-based method, such as Ion Mobility Spectrometry (IMS), is used as a pre-filter to SERS, for this approach. This solution offers a significantly improved detection technology when both modes are evaluated concurrently, especially making a significant enhancement of the capability of SERS for open environment applications. This concept of operation provides a clean and controlled environment, and it enhances the operational reliability of SERS which forms the critical unit for this new detection system. The combined system outperforms the individual IMS or SERS components taken individually. This hybrid, orthogonal sensing method can be applied to other types of threat detection as well, namely, chemical and biological threats.","PeriodicalId":106557,"journal":{"name":"2010 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"166 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122838353","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Mining social media in extreme events : Lessons learned from the DARPA network challenge 在极端事件中挖掘社交媒体:从DARPA网络挑战中吸取的教训
Pub Date : 2010-12-03 DOI: 10.1109/THS.2010.5655067
N. Giacobe, Hyun-Woo Kim, Avner Faraz
The DARPA Network Challenge was a nationwide exercise in the use of social media in extreme events. Teams competed to locate ten red weather balloons that DARPA tethered over public locations across the continental United States for seven to ten hours on Saturday, December 5, 2009. The MIT team won the event, finding all ten locations using monetary incentive and a multi-level marketing payout scheme. This paper outlines the methods used by the 10th place iSchools Caucus team, which used a combination approach of recruiting observers and the use of Open Source Intelligence (OSINT) to find six of the ten locations. Twitter feeds and publicly available content on competing team websites were captured. Data from these mechanisms were evaluated for content validity using a combination of secondary observers, evaluation of the reputation of reported observers and confirmation of the true identities and locations of reporting individuals by mining additional data from several social networking sites. These methods may have application in law enforcement, homeland security and extreme events when there is a desire to use humans as soft sensors, but where it is impossible to directly recruit observers or motivate them with financial incentives.
DARPA网络挑战赛是一项在极端事件中使用社交媒体的全国性演习。2009年12月5日(星期六),各队竞相定位10个红色气象气球,DARPA将这些气球系在美国大陆各地的公共场所上空,历时7到10个小时。麻省理工学院的团队赢得了这次活动,他们利用金钱激励和多层次营销支付计划找到了全部10个地点。本文概述了排名第十的isschools核心小组使用的方法,该小组使用了招募观察员和使用开源情报(OSINT)的结合方法来找到十个地点中的六个。Twitter feed和竞争团队网站上的公开内容被捕获。来自这些机制的数据被评估为内容有效性,使用二级观察员的组合,评估报告观察员的声誉,并通过挖掘来自多个社交网站的额外数据来确认报告个人的真实身份和位置。这些方法可能适用于执法、国土安全和极端事件,当有使用人类作为软传感器的愿望时,但不可能直接招募观察员或用财政激励来激励他们。
{"title":"Mining social media in extreme events : Lessons learned from the DARPA network challenge","authors":"N. Giacobe, Hyun-Woo Kim, Avner Faraz","doi":"10.1109/THS.2010.5655067","DOIUrl":"https://doi.org/10.1109/THS.2010.5655067","url":null,"abstract":"The DARPA Network Challenge was a nationwide exercise in the use of social media in extreme events. Teams competed to locate ten red weather balloons that DARPA tethered over public locations across the continental United States for seven to ten hours on Saturday, December 5, 2009. The MIT team won the event, finding all ten locations using monetary incentive and a multi-level marketing payout scheme. This paper outlines the methods used by the 10th place iSchools Caucus team, which used a combination approach of recruiting observers and the use of Open Source Intelligence (OSINT) to find six of the ten locations. Twitter feeds and publicly available content on competing team websites were captured. Data from these mechanisms were evaluated for content validity using a combination of secondary observers, evaluation of the reputation of reported observers and confirmation of the true identities and locations of reporting individuals by mining additional data from several social networking sites. These methods may have application in law enforcement, homeland security and extreme events when there is a desire to use humans as soft sensors, but where it is impossible to directly recruit observers or motivate them with financial incentives.","PeriodicalId":106557,"journal":{"name":"2010 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125347552","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Cyber security for emergency management 网络安全应急管理
Pub Date : 2010-12-03 DOI: 10.1109/THS.2010.5654965
J. Walker, B. J. Williams, G. Skelton
Cyber security continues to be an increasingly important topic when considering Homeland Security issues. This area however is often overlooked during a disaster or emergency situation. Emergency management within the US as it currently stands lacks any real cyber situational awareness with respect to the core activities of emergency management such as mitigation, preparedness, response and recovery. As a result critical cyberinfrastructure resources that emergency management personnel rely on is left on the sideline when planning, handling, and recovering from emergencies or natural disasters. As emergency management evolves within the US to handle dynamic man-made, and natural disasters such as terrorist attacks, hurricanes, and floods, these issues must be addressed to mitigate risks. This paper takes the first step in examining the issue of cyber situational awareness within emergency management and identifies several concerns for the emergency management community.
在考虑国土安全问题时,网络安全仍然是一个越来越重要的话题。然而,在灾难或紧急情况下,这一领域往往被忽视。目前,美国的应急管理在应急管理的核心活动(如缓解、准备、响应和恢复)方面缺乏任何真正的网络态势感知。因此,应急管理人员在规划、处理和从紧急情况或自然灾害中恢复时所依赖的关键网络基础设施资源被搁置一边。随着应急管理在美国的发展,以应对动态的人为和自然灾害,如恐怖袭击、飓风和洪水,这些问题必须得到解决,以降低风险。本文在研究应急管理中的网络态势感知问题方面迈出了第一步,并确定了应急管理界需要关注的几个问题。
{"title":"Cyber security for emergency management","authors":"J. Walker, B. J. Williams, G. Skelton","doi":"10.1109/THS.2010.5654965","DOIUrl":"https://doi.org/10.1109/THS.2010.5654965","url":null,"abstract":"Cyber security continues to be an increasingly important topic when considering Homeland Security issues. This area however is often overlooked during a disaster or emergency situation. Emergency management within the US as it currently stands lacks any real cyber situational awareness with respect to the core activities of emergency management such as mitigation, preparedness, response and recovery. As a result critical cyberinfrastructure resources that emergency management personnel rely on is left on the sideline when planning, handling, and recovering from emergencies or natural disasters. As emergency management evolves within the US to handle dynamic man-made, and natural disasters such as terrorist attacks, hurricanes, and floods, these issues must be addressed to mitigate risks. This paper takes the first step in examining the issue of cyber situational awareness within emergency management and identifies several concerns for the emergency management community.","PeriodicalId":106557,"journal":{"name":"2010 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121907404","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Fab forensics: Increasing trust in IC fabrication 晶圆厂取证:增加对IC制造的信任
Pub Date : 2010-12-03 DOI: 10.1109/THS.2010.5655082
Gedare Bloom, B. Narahari, R. Simha
Fabrication and design are now performed by different companies as semiconductor fabrication facilities (fabs or foundries) seek to reduce costs by serving multiple clients and consolidating resources. However, lack of immediate control and observation reduces the trust which IC designers have in some fabs. To help fabs increase trust in their processes, we propose an approach for logging forensic information of the fab process and printing the information on chips so that examination of the chip reveals provable deviations from the design. Fab owners can benefit by catching rogue employees and by demonstrating high security standards to their customers. Our proposed solution uses a light runtime system that interacts with a trusted platform module (TPM).
制造和设计现在由不同的公司执行,因为半导体制造设施(晶圆厂或代工厂)寻求通过服务多个客户和整合资源来降低成本。然而,缺乏即时控制和观察降低了IC设计师对某些晶圆厂的信任。为了帮助晶圆厂增加对其工艺的信任,我们提出了一种记录晶圆厂工艺的取证信息并将信息打印在芯片上的方法,以便对芯片进行检查,发现可证明的与设计的偏差。工厂所有者可以通过抓住流氓员工和向客户展示高安全标准而受益。我们提出的解决方案使用与可信平台模块(TPM)交互的轻量级运行时系统。
{"title":"Fab forensics: Increasing trust in IC fabrication","authors":"Gedare Bloom, B. Narahari, R. Simha","doi":"10.1109/THS.2010.5655082","DOIUrl":"https://doi.org/10.1109/THS.2010.5655082","url":null,"abstract":"Fabrication and design are now performed by different companies as semiconductor fabrication facilities (fabs or foundries) seek to reduce costs by serving multiple clients and consolidating resources. However, lack of immediate control and observation reduces the trust which IC designers have in some fabs. To help fabs increase trust in their processes, we propose an approach for logging forensic information of the fab process and printing the information on chips so that examination of the chip reveals provable deviations from the design. Fab owners can benefit by catching rogue employees and by demonstrating high security standards to their customers. Our proposed solution uses a light runtime system that interacts with a trusted platform module (TPM).","PeriodicalId":106557,"journal":{"name":"2010 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129475047","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Wide-Angle Nuclear Detection Array (WANDA) 广角核探测阵列(WANDA)
Pub Date : 2010-12-03 DOI: 10.1109/THS.2010.5654935
T. Doyle, R. Devito
The Wide-Angle Nuclear Detection Array (WANDA) is a data analysis system that uses an array of detectors to act as a coincidence detection system, utilizes a database of possible radioisotopes, and searches this database using a physics-based analysis to identify the source type and location that best accounts for the measured Compton scattering data. This method has the ability to utilize partial-energy events and works with smaller and lower cost detectors that do not require full-energy absorption. WANDA maintains a full 4π field of view, and provides simultaneous recognition of the source location and identification of source material. Test scenarios exploring comparison of WANDA and conventional detection and identification technologies are presented.
广角核探测阵列(WANDA)是一个数据分析系统,它使用探测器阵列作为巧合检测系统,利用可能的放射性同位素数据库,并使用基于物理的分析来搜索该数据库,以确定最能解释测量康普顿散射数据的源类型和位置。这种方法能够利用部分能量事件,并与不需要全能量吸收的更小、成本更低的探测器一起工作。万达保持一个完整的4π视场,并提供同时识别源位置和识别源材料。给出了万达与传统检测识别技术对比的测试场景。
{"title":"Wide-Angle Nuclear Detection Array (WANDA)","authors":"T. Doyle, R. Devito","doi":"10.1109/THS.2010.5654935","DOIUrl":"https://doi.org/10.1109/THS.2010.5654935","url":null,"abstract":"The Wide-Angle Nuclear Detection Array (WANDA) is a data analysis system that uses an array of detectors to act as a coincidence detection system, utilizes a database of possible radioisotopes, and searches this database using a physics-based analysis to identify the source type and location that best accounts for the measured Compton scattering data. This method has the ability to utilize partial-energy events and works with smaller and lower cost detectors that do not require full-energy absorption. WANDA maintains a full 4π field of view, and provides simultaneous recognition of the source location and identification of source material. Test scenarios exploring comparison of WANDA and conventional detection and identification technologies are presented.","PeriodicalId":106557,"journal":{"name":"2010 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129078132","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Providing decision support in complex missions such as responding to a metropolitan IED attack 在复杂任务中提供决策支持,如应对大都市IED袭击
Pub Date : 2010-12-03 DOI: 10.1109/THS.2010.5655054
Santosh Dawesar, Daniel Jennings, Piali De, Brian C. Urch, Scott Corwin, Peter T Gaynor
Responding to a terrorist attack is extraordinarily complex due to the unpredictability as well as the resulting devastation, confusion, and apprehension. Further complications arise from the enormity of available data as well as the participation of multiple agencies and organizations, which often hinders the discovery and assimilation of pertinent information in a timely fashion. A solution to these problems must be scalable, maintainable, extensible, and adaptable. Increasingly, decision-makers need an integrated, intelligent system that can seamlessly acquire, fuse, reason about, distribute, and protect information to provide enhanced, individualized decision support and situational understanding as well as foster effective collaboration. To meet this need, Raytheon is developing an intelligent system called Confluence™, which consists of an ontological framework, domain independent knowledge generation, integration, and reasoning agents, a massively scalable knowledge store, as well as various visualization components. Confluence™ can be applied to any mission by creating a mission ontology that extends the common framework, and which explicitly defines a semantic model of the physical, information, cognitive, and social domains for the mission. This paper will describe and demonstrate an application of Confluence™ to the mission of recovering from an IED attack in a crowded metropolitan area, such as Providence RI.
由于不可预测性以及由此造成的破坏、混乱和恐惧,应对恐怖袭击是非常复杂的。由于现有的大量数据以及多个机构和组织的参与,往往会妨碍及时发现和吸收有关资料,从而造成进一步的复杂情况。这些问题的解决方案必须是可伸缩的、可维护的、可扩展的和可适应的。越来越多的决策者需要一个集成的智能系统,该系统可以无缝地获取、融合、推理、分发和保护信息,以提供增强的、个性化的决策支持和情境理解,并促进有效的协作。为了满足这一需求,雷神公司正在开发一种名为Confluence™的智能系统,该系统由本体框架、独立于领域的知识生成、集成和推理代理、大规模可扩展的知识存储以及各种可视化组件组成。Confluence™可以通过创建扩展公共框架的任务本体来应用于任何任务,该本体明确定义了任务的物理、信息、认知和社会领域的语义模型。本文将描述和演示Confluence™在拥挤的大都市地区(如普罗维登斯RI)遭受简易爆炸装置袭击后的恢复任务中的应用。
{"title":"Providing decision support in complex missions such as responding to a metropolitan IED attack","authors":"Santosh Dawesar, Daniel Jennings, Piali De, Brian C. Urch, Scott Corwin, Peter T Gaynor","doi":"10.1109/THS.2010.5655054","DOIUrl":"https://doi.org/10.1109/THS.2010.5655054","url":null,"abstract":"Responding to a terrorist attack is extraordinarily complex due to the unpredictability as well as the resulting devastation, confusion, and apprehension. Further complications arise from the enormity of available data as well as the participation of multiple agencies and organizations, which often hinders the discovery and assimilation of pertinent information in a timely fashion. A solution to these problems must be scalable, maintainable, extensible, and adaptable. Increasingly, decision-makers need an integrated, intelligent system that can seamlessly acquire, fuse, reason about, distribute, and protect information to provide enhanced, individualized decision support and situational understanding as well as foster effective collaboration. To meet this need, Raytheon is developing an intelligent system called Confluence™, which consists of an ontological framework, domain independent knowledge generation, integration, and reasoning agents, a massively scalable knowledge store, as well as various visualization components. Confluence™ can be applied to any mission by creating a mission ontology that extends the common framework, and which explicitly defines a semantic model of the physical, information, cognitive, and social domains for the mission. This paper will describe and demonstrate an application of Confluence™ to the mission of recovering from an IED attack in a crowded metropolitan area, such as Providence RI.","PeriodicalId":106557,"journal":{"name":"2010 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125514245","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
2010 IEEE International Conference on Technologies for Homeland Security (HST)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1