首页 > 最新文献

43rd Annual 2009 International Carnahan Conference on Security Technology最新文献

英文 中文
A comparison between two leadership models for security checkpoints 安全检查点的两种领导模型的比较
Pub Date : 2009-11-13 DOI: 10.1109/CCST.2009.5335563
Wetter Olive Emil, Laube René, Hofer Franziska
The impact of leadership structure and behavior on team or crew performance is well known and has been demonstrated in various studies (see e.g. Guzzo & Dickson, 1996; Zaccaro, Rittmann, & Marks, 2001). However, as far as we know, there is no empirical study available on leadership structures and crew performance in the applied setting of airport security control. This study compares the structure and impact of two different leadership models for security control. The first (older) model consists of one supervisor per sector. In the supervisor's sector, there are three to eight crews at work, each consisting of five security officers (SOs). Each crew independently manages and operates one line of the checkpoint. One of the five SOs in a crew is the crew leader (CL), who works together with the crew as a normal crew member but has a few additional tasks to fulfill. The second (newer) model, which focuses more on integrated crew resource management (CRM) criteria, consists of one supervisor, assisted by two CLs per sector. Together, they form a cohesive leading team. The CLs do not work in the crews anymore but manage two to three lines from behind. The crews still consist of five SOs. It is the new CLs' task to quickly isolate and manage problematic cases so that those do not block the line anymore. Like this, the workload of each team member is reduced. Another task is to keep an eye on the working quality and to communicate with the crews in such a way that working quality is enhanced. The impact of this reinforced leadership on indicators of working quality such as compliance with rules and regulations, as well as its impact on passenger flow (throughput) are analyzed using different statistical procedures such as T-tests, U-tests and Chi-square tests. Moreover, the job models of the new leadership structure are presented in detail and SOs' ratings of their acceptance and liking of both systems are presented. In sum, this study offers another, different approach to the human factors perspective in airport security focusing on leadership structures, crew resource management, and their effects.
领导结构和行为对团队或机组人员绩效的影响是众所周知的,并已在各种研究中得到证明(例如Guzzo & Dickson, 1996;Zaccaro, Rittmann, & Marks, 2001)。然而,据我们所知,在机场安全管制的应用设置中,还没有关于领导结构和机组绩效的实证研究。本研究比较了两种不同的安全控制领导模型的结构和影响。第一种(较旧的)模式由每个部门一名监管者组成。在主管部门,有三到八个工作小组,每个小组由五名保安人员组成。每个机组独立管理和操作检查站的一条线。艇长(CL)是艇员中的五个so之一,他作为一名普通艇员与艇员一起工作,但有一些额外的任务要完成。第二种(较新的)模式,更侧重于综合乘员资源管理(CRM)标准,由一名主管组成,每个航段由两个CLs辅助。他们一起组成了一个有凝聚力的领导团队。CLs不再在机组中工作,而是从后面管理两到三条线。机组人员仍然由5名so组成。新的CLs的任务是快速隔离和管理有问题的案例,以便这些案例不再阻塞线路。这样,每个团队成员的工作量都减少了。另一项任务是监督工作质量,并与工作人员进行沟通,以提高工作质量。通过t检验、u检验和卡方检验等不同的统计程序,分析了这种加强的领导对工作质量指标(如遵守规章制度)的影响,以及对客流(吞吐量)的影响。此外,还详细介绍了新领导结构的工作模式,并给出了SOs对两种制度的接受度和喜欢度的评分。总而言之,本研究提供了另一种不同的方法来看待机场安全中的人为因素视角,重点关注领导结构、机组资源管理及其影响。
{"title":"A comparison between two leadership models for security checkpoints","authors":"Wetter Olive Emil, Laube René, Hofer Franziska","doi":"10.1109/CCST.2009.5335563","DOIUrl":"https://doi.org/10.1109/CCST.2009.5335563","url":null,"abstract":"The impact of leadership structure and behavior on team or crew performance is well known and has been demonstrated in various studies (see e.g. Guzzo & Dickson, 1996; Zaccaro, Rittmann, & Marks, 2001). However, as far as we know, there is no empirical study available on leadership structures and crew performance in the applied setting of airport security control. This study compares the structure and impact of two different leadership models for security control. The first (older) model consists of one supervisor per sector. In the supervisor's sector, there are three to eight crews at work, each consisting of five security officers (SOs). Each crew independently manages and operates one line of the checkpoint. One of the five SOs in a crew is the crew leader (CL), who works together with the crew as a normal crew member but has a few additional tasks to fulfill. The second (newer) model, which focuses more on integrated crew resource management (CRM) criteria, consists of one supervisor, assisted by two CLs per sector. Together, they form a cohesive leading team. The CLs do not work in the crews anymore but manage two to three lines from behind. The crews still consist of five SOs. It is the new CLs' task to quickly isolate and manage problematic cases so that those do not block the line anymore. Like this, the workload of each team member is reduced. Another task is to keep an eye on the working quality and to communicate with the crews in such a way that working quality is enhanced. The impact of this reinforced leadership on indicators of working quality such as compliance with rules and regulations, as well as its impact on passenger flow (throughput) are analyzed using different statistical procedures such as T-tests, U-tests and Chi-square tests. Moreover, the job models of the new leadership structure are presented in detail and SOs' ratings of their acceptance and liking of both systems are presented. In sum, this study offers another, different approach to the human factors perspective in airport security focusing on leadership structures, crew resource management, and their effects.","PeriodicalId":117285,"journal":{"name":"43rd Annual 2009 International Carnahan Conference on Security Technology","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128739287","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
What is security culture? Does it differ in content from general organisational culture? 什么是安全文化?它在内容上与一般的组织文化不同吗?
Pub Date : 2009-11-13 DOI: 10.1109/CCST.2009.5335511
J. Malcolmson
There is increasing interest from regulators and government departments concerned with enhancing security in organisational culture, more specifically the notion of security culture.
监管机构和政府部门越来越关注加强组织文化中的安全,更具体地说,是安全文化的概念。
{"title":"What is security culture? Does it differ in content from general organisational culture?","authors":"J. Malcolmson","doi":"10.1109/CCST.2009.5335511","DOIUrl":"https://doi.org/10.1109/CCST.2009.5335511","url":null,"abstract":"There is increasing interest from regulators and government departments concerned with enhancing security in organisational culture, more specifically the notion of security culture.","PeriodicalId":117285,"journal":{"name":"43rd Annual 2009 International Carnahan Conference on Security Technology","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126336458","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 40
Body scanning technology: An Early Human Factors Analysis 人体扫描技术:早期人为因素分析
Pub Date : 2009-11-13 DOI: 10.1109/CCST.2009.5335557
Celine Lilliane, Aurore Jacques
In March 2009, QinetiQ conducted an Early Human Factors Analysis (EHFA) on behalf of the UK Department for Transport (DfT) for the implementation of body scanning technology in the airport security screening context. EHFA is a well-established technique, used extensively as part of UK Ministry of Defence (MoD) acquisition [10]. This was the first time EHFA was used in the security domain. The aim of EHFA is to provide an early indication of where key Human Factors (HF) issues and risks associated with body scanners lie so that mitigation strategies can be developed. EHFA is structured around seven Human Factors Domains ranging from Manpower and Training to System Safety and Human Factors Engineering.
2009年3月,QinetiQ代表英国运输部(DfT)进行了一项早期人为因素分析(EHFA),用于在机场安全检查环境中实施人体扫描技术。EHFA是一项成熟的技术,作为英国国防部(MoD)采购的一部分广泛使用[10]。这是EHFA首次用于安全领域。EHFA的目的是提供与人体扫描仪相关的关键人为因素(HF)问题和风险的早期指示,以便制定缓解策略。EHFA围绕七个人为因素领域构建,从人力和培训到系统安全和人为因素工程。
{"title":"Body scanning technology: An Early Human Factors Analysis","authors":"Celine Lilliane, Aurore Jacques","doi":"10.1109/CCST.2009.5335557","DOIUrl":"https://doi.org/10.1109/CCST.2009.5335557","url":null,"abstract":"In March 2009, QinetiQ conducted an Early Human Factors Analysis (EHFA) on behalf of the UK Department for Transport (DfT) for the implementation of body scanning technology in the airport security screening context. EHFA is a well-established technique, used extensively as part of UK Ministry of Defence (MoD) acquisition [10]. This was the first time EHFA was used in the security domain. The aim of EHFA is to provide an early indication of where key Human Factors (HF) issues and risks associated with body scanners lie so that mitigation strategies can be developed. EHFA is structured around seven Human Factors Domains ranging from Manpower and Training to System Safety and Human Factors Engineering.","PeriodicalId":117285,"journal":{"name":"43rd Annual 2009 International Carnahan Conference on Security Technology","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130916206","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Evaluation methodology for analyzing usability factors in biometrics 生物计量学中可用性因素分析的评价方法
Pub Date : 2009-11-13 DOI: 10.1109/CCST.2009.5335513
B. Fernandez-Saavedra, R. Alonso-Moreno, Jaime Uriarte-Antonio, R. Sánchez-Reillo
In recent years, biometrics is more and more used in many security applications. This fact has led suppliers and researches to analyze biometric algorithms power and vulnerabilities, as to improve the feasibility of this technology. Nevertheless, as many authors claim, biometric performance does also depend on other factors such as usability and/or user acceptance, which can influence significantly their performance. Only a few of these factors have already been studied, using specific approaches and only for certain biometric modalities, such us fingerprint and face. However, there is not a general and independent methodology implemented to assess how these factors affect biometric system performance and to produce intercomparable results. Based on previous works and following procedures and requirements addressed in the International Standard ISO/IEC 19795–2 for scenario evaluations [1], authors have developed a general methodology to analyze end-to-end system performance when some usability factors are modified. Such factors cover different ways of presenting biometric characteristics to the sensor and also the biometric characteristic variability caused by illness or climatic changes. A generic and controlled scenario has been modelled to carry on all sets of trials. Then, the methodology has been particularized defining specific protocols, methods and considerations for each parameter to assess. Furthermore, details for analysing these parameters through different modalities have been defined. In addition, this methodology has been checked for one modality considering different usability aspects in order to obtain the feedback that is necessary to test its validity and viability and to detect points of interest for improvement. Results, main conclusions and suggestions for test operators will be presented.
近年来,生物识别技术越来越多地应用于安防领域。这一事实促使供应商和研究人员分析生物识别算法的能力和漏洞,以提高该技术的可行性。然而,正如许多作者声称的那样,生物识别性能也依赖于其他因素,如可用性和/或用户接受度,这些因素会显著影响它们的性能。只有少数这些因素已经被研究,使用特定的方法,只针对某些生物识别模式,如指纹和面部。然而,目前还没有一个通用和独立的方法来评估这些因素如何影响生物识别系统的性能,并产生可比较的结果。基于之前的工作,以及国际标准ISO/IEC 19795-2中针对场景评估的后续程序和要求[1],作者开发了一种通用方法,用于在某些可用性因素被修改时分析端到端系统性能。这些因素包括向传感器呈现生物特征的不同方式,以及由疾病或气候变化引起的生物特征变化。已经模拟了一个通用的和受控的场景来进行所有的试验。然后,对方法进行了细化,定义了每个参数评估的具体协议、方法和考虑因素。此外,还定义了通过不同方式分析这些参数的细节。此外,为了获得测试其有效性和可行性所必需的反馈,并发现需要改进的兴趣点,该方法已经检查了考虑不同可用性方面的一种模式。结果,主要结论和对试验操作者的建议。
{"title":"Evaluation methodology for analyzing usability factors in biometrics","authors":"B. Fernandez-Saavedra, R. Alonso-Moreno, Jaime Uriarte-Antonio, R. Sánchez-Reillo","doi":"10.1109/CCST.2009.5335513","DOIUrl":"https://doi.org/10.1109/CCST.2009.5335513","url":null,"abstract":"In recent years, biometrics is more and more used in many security applications. This fact has led suppliers and researches to analyze biometric algorithms power and vulnerabilities, as to improve the feasibility of this technology. Nevertheless, as many authors claim, biometric performance does also depend on other factors such as usability and/or user acceptance, which can influence significantly their performance. Only a few of these factors have already been studied, using specific approaches and only for certain biometric modalities, such us fingerprint and face. However, there is not a general and independent methodology implemented to assess how these factors affect biometric system performance and to produce intercomparable results. Based on previous works and following procedures and requirements addressed in the International Standard ISO/IEC 19795–2 for scenario evaluations [1], authors have developed a general methodology to analyze end-to-end system performance when some usability factors are modified. Such factors cover different ways of presenting biometric characteristics to the sensor and also the biometric characteristic variability caused by illness or climatic changes. A generic and controlled scenario has been modelled to carry on all sets of trials. Then, the methodology has been particularized defining specific protocols, methods and considerations for each parameter to assess. Furthermore, details for analysing these parameters through different modalities have been defined. In addition, this methodology has been checked for one modality considering different usability aspects in order to obtain the feedback that is necessary to test its validity and viability and to detect points of interest for improvement. Results, main conclusions and suggestions for test operators will be presented.","PeriodicalId":117285,"journal":{"name":"43rd Annual 2009 International Carnahan Conference on Security Technology","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115033949","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Using speed measures to predict performance in x-ray luggage screening tasks 使用速度测量来预测x光行李检查任务的表现
Pub Date : 2009-11-13 DOI: 10.1109/CCST.2009.5335536
A. Wales, Tobias Halbherr, A. Schwaninger
The visual inspection of x-ray images of luggage items at airports is a challenging task, where detection rates suffer when threat item complexity increases [1].The relationship between threat-item types, aspects of image difficulty, and decision time are explored using a combination of Drury's Two-Component Model [2] and Signal Detection Theory [3]. 67 professional screeners completed a 2048-image battery that manipulated various image-based difficulty factors. A strong linear relationship between hit rate and decision time was found (r2 = 0.64), with the hardest images showing a marked increase in decision time and decrease in hit-rate. The search time was found to be relatively stable across the threat categories, but decision time increased in proportion to detection rate decreases. Decision time is shown to closely reflect changes in detection sensitivity caused by different threat and image difficulties.
机场行李物品x射线图像的目视检查是一项具有挑战性的任务,当威胁物品复杂性增加时,检出率会受到影响[1]。结合Drury的双成分模型[2]和信号检测理论[3],探讨了威胁项目类型、图像难度方面和决策时间之间的关系。67名专业筛选人员完成了一组2048张图像,这些图像可以操纵各种基于图像的难度因素。命中率和决策时间之间存在很强的线性关系(r2 = 0.64),最难的图像显示出决策时间的显著增加和命中率的显著降低。各威胁类别的搜索时间相对稳定,但决策时间随检测率的降低成比例增加。决策时间密切反映了不同威胁和图像难度对检测灵敏度的影响。
{"title":"Using speed measures to predict performance in x-ray luggage screening tasks","authors":"A. Wales, Tobias Halbherr, A. Schwaninger","doi":"10.1109/CCST.2009.5335536","DOIUrl":"https://doi.org/10.1109/CCST.2009.5335536","url":null,"abstract":"The visual inspection of x-ray images of luggage items at airports is a challenging task, where detection rates suffer when threat item complexity increases [1].The relationship between threat-item types, aspects of image difficulty, and decision time are explored using a combination of Drury's Two-Component Model [2] and Signal Detection Theory [3]. 67 professional screeners completed a 2048-image battery that manipulated various image-based difficulty factors. A strong linear relationship between hit rate and decision time was found (r2 = 0.64), with the hardest images showing a marked increase in decision time and decrease in hit-rate. The search time was found to be relatively stable across the threat categories, but decision time increased in proportion to detection rate decreases. Decision time is shown to closely reflect changes in detection sensitivity caused by different threat and image difficulties.","PeriodicalId":117285,"journal":{"name":"43rd Annual 2009 International Carnahan Conference on Security Technology","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122102827","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Secure key management scheme for hierarchical access control based on ECC 基于ECC分层访问控制的安全密钥管理方案
Pub Date : 2009-11-13 DOI: 10.1109/CCST.2009.5335515
Yu-Li Lina, Chien-Lung Hsu, Tzong-Chen Wu, So-Lin Yen, C. Tseng
In a key management scheme for hierarchical access control, each higher security class can derive the cryptographic keys of his lower security classes. In 2006, Jang and Wang proposed an efficient key management scheme based on elliptic curve cryptosystems. This paper, however, will demonstrate a compromising attack on Jang-Wang scheme to show that the secret keys of some security classes will be compromised. This paper further proposed an improvement to eliminate the pointed out security leak.
在分级访问控制的密钥管理方案中,每个较高安全级别的密钥都可以派生其较低安全级别的密钥。2006年,Jang和Wang提出了一种基于椭圆曲线密码体制的高效密钥管理方案。然而,本文将演示对Jang-Wang方案的妥协攻击,以表明一些安全类的秘钥将被泄露。为了消除所指出的安全漏洞,本文进一步提出了改进方案。
{"title":"Secure key management scheme for hierarchical access control based on ECC","authors":"Yu-Li Lina, Chien-Lung Hsu, Tzong-Chen Wu, So-Lin Yen, C. Tseng","doi":"10.1109/CCST.2009.5335515","DOIUrl":"https://doi.org/10.1109/CCST.2009.5335515","url":null,"abstract":"In a key management scheme for hierarchical access control, each higher security class can derive the cryptographic keys of his lower security classes. In 2006, Jang and Wang proposed an efficient key management scheme based on elliptic curve cryptosystems. This paper, however, will demonstrate a compromising attack on Jang-Wang scheme to show that the secret keys of some security classes will be compromised. This paper further proposed an improvement to eliminate the pointed out security leak.","PeriodicalId":117285,"journal":{"name":"43rd Annual 2009 International Carnahan Conference on Security Technology","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129774496","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A signature exchange model for heterogeneous intrusion detection systems 异构入侵检测系统的签名交换模型
Pub Date : 2009-11-13 DOI: 10.1109/CCST.2009.5335528
Dwen-Ren Tsai, Chien-Ning Huang
In this paper, we propose an UML-based generic format set of intrusion signatures for heterogeneous intrusion detecting systems (IDSs) via analyzing signature formats of three popular IDS products. We also propose an attack signature exchange model of heterogeneous IDSs. With this model, an attack signature generated by one IDS could be adopted by different IDSs easily. The proposed XML-based generic signature format set is designed to be extensible, and therefore it should be easy to incorporate new features in the future. When a software vendor releases its software patch packages together with the signatures addressing the potential attacks, the signatures detected can be easily and promptly included into IDSs reported from different vendors using this model.
本文通过分析三种流行的入侵检测产品的签名格式,提出了一种基于uml的通用格式的异构入侵检测系统入侵签名集。提出了一种异构入侵防御系统的攻击签名交换模型。利用该模型,一个入侵防御系统生成的攻击签名可以很容易地被不同的入侵防御系统所采用。建议的基于xml的通用签名格式集被设计为可扩展的,因此将来合并新特性应该很容易。当软件厂商发布其软件补丁包和针对潜在攻击的签名时,可以方便快捷地将检测到的签名包含到使用该模型的不同厂商报告的ids中。
{"title":"A signature exchange model for heterogeneous intrusion detection systems","authors":"Dwen-Ren Tsai, Chien-Ning Huang","doi":"10.1109/CCST.2009.5335528","DOIUrl":"https://doi.org/10.1109/CCST.2009.5335528","url":null,"abstract":"In this paper, we propose an UML-based generic format set of intrusion signatures for heterogeneous intrusion detecting systems (IDSs) via analyzing signature formats of three popular IDS products. We also propose an attack signature exchange model of heterogeneous IDSs. With this model, an attack signature generated by one IDS could be adopted by different IDSs easily. The proposed XML-based generic signature format set is designed to be extensible, and therefore it should be easy to incorporate new features in the future. When a software vendor releases its software patch packages together with the signatures addressing the potential attacks, the signatures detected can be easily and promptly included into IDSs reported from different vendors using this model.","PeriodicalId":117285,"journal":{"name":"43rd Annual 2009 International Carnahan Conference on Security Technology","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133866308","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Assessment of X-ray image interpretation competency of aviation security screeners 航空安检人员x射线图像判读能力评估
Pub Date : 2009-11-13 DOI: 10.1109/CCST.2009.5335569
Saskia M. Steiner-Koller, A. Bolfing, A. Schwaninger
The competency of an aviation security screener to detect prohibited items in X-ray images quickly and reliably is important for any airport security system. This paper details the requirements and principles for reliable, valid, and standardized competency assessment as well as different methods that can be applied for this purpose. First, the concepts of reliability, validity and standardization are explained. Then, threat image projection (TIP) as a means to assess X-ray image interpretation competency is discussed. This is followed by a discussion of computer-based tests, which provide another often more reliable and standardized option for measuring x-ray image interpretation competency. Finally, the application of computerbased tests in an EU funded project (VIA Project, www.viaproject.eu) are presented.
对于任何机场安保系统来说,航空安检设备快速、可靠地检测x射线图像中的违禁物品的能力都是非常重要的。本文详细介绍了可靠、有效和标准化能力评估的要求和原则,以及可用于此目的的不同方法。首先,阐述了信度、效度和标准化的概念。然后,讨论了威胁图像投影(TIP)作为评估x射线图像解释能力的手段。然后讨论基于计算机的测试,它为测量x射线图像解释能力提供了另一种通常更可靠和标准化的选择。最后,介绍了计算机测试在欧盟资助项目(VIA项目,www.viaproject.eu)中的应用。
{"title":"Assessment of X-ray image interpretation competency of aviation security screeners","authors":"Saskia M. Steiner-Koller, A. Bolfing, A. Schwaninger","doi":"10.1109/CCST.2009.5335569","DOIUrl":"https://doi.org/10.1109/CCST.2009.5335569","url":null,"abstract":"The competency of an aviation security screener to detect prohibited items in X-ray images quickly and reliably is important for any airport security system. This paper details the requirements and principles for reliable, valid, and standardized competency assessment as well as different methods that can be applied for this purpose. First, the concepts of reliability, validity and standardization are explained. Then, threat image projection (TIP) as a means to assess X-ray image interpretation competency is discussed. This is followed by a discussion of computer-based tests, which provide another often more reliable and standardized option for measuring x-ray image interpretation competency. Finally, the application of computerbased tests in an EU funded project (VIA Project, www.viaproject.eu) are presented.","PeriodicalId":117285,"journal":{"name":"43rd Annual 2009 International Carnahan Conference on Security Technology","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134309536","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Why do airport security screeners sometimes fail in covert tests? 为什么机场安检有时会在秘密测试中失败?
Pub Date : 2009-11-13 DOI: 10.1109/CCST.2009.5335568
A. Schwaninger
This paper discusses covert testing data and key human factors. First, different reasons why airport security screeners sometimes fail to detect threats when covert tests are conducted at airports are discussed. Key human factors are identified and analyzed with regard to covert test results. It is explained that pre-employment selection and training are indispensable prerequisites for good operational performance of airport security screeners. However, they alone cannot guarantee that screeners react appropriately when tested with real threat items at a security checkpoint. Humans often fail if something happens that they do not expect. Therefore, it is recommended to conduct covert tests on a regular basis so that screeners become prepared and get trained to react appropriately. A recently conducted study on covert tests provides empirical evidence in favor of this view.
本文讨论了隐蔽测试数据和关键的人为因素。首先,讨论了在机场进行秘密测试时,机场安全检查有时无法检测到威胁的不同原因。对隐蔽试验结果的关键人为因素进行了识别和分析。介绍了机场安检人员入职前的甄选和培训是确保安检人员良好运行的必要条件。然而,仅靠它们并不能保证筛选器在安全检查点对真实的威胁项目进行测试时做出适当的反应。如果发生了意料之外的事情,人类往往会失败。因此,建议定期进行隐蔽测试,以便筛选人员做好准备,并接受适当反应的培训。最近进行的一项关于隐蔽测试的研究提供了支持这一观点的经验证据。
{"title":"Why do airport security screeners sometimes fail in covert tests?","authors":"A. Schwaninger","doi":"10.1109/CCST.2009.5335568","DOIUrl":"https://doi.org/10.1109/CCST.2009.5335568","url":null,"abstract":"This paper discusses covert testing data and key human factors. First, different reasons why airport security screeners sometimes fail to detect threats when covert tests are conducted at airports are discussed. Key human factors are identified and analyzed with regard to covert test results. It is explained that pre-employment selection and training are indispensable prerequisites for good operational performance of airport security screeners. However, they alone cannot guarantee that screeners react appropriately when tested with real threat items at a security checkpoint. Humans often fail if something happens that they do not expect. Therefore, it is recommended to conduct covert tests on a regular basis so that screeners become prepared and get trained to react appropriately. A recently conducted study on covert tests provides empirical evidence in favor of this view.","PeriodicalId":117285,"journal":{"name":"43rd Annual 2009 International Carnahan Conference on Security Technology","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129728273","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Architectural design for large-scale campus-wide captive portal 大型校园专属门户的建筑设计
Pub Date : 2009-11-13 DOI: 10.1109/CCST.2009.5335561
K. Koht-Arsa, A. Phonphoem, S. Sanguanpong
Managing high workload and concurrent accesses are challenging tasks for captive portal. The large number of clients generally creates high workload to the system. Furthermore, some worm or Trojan infected clients create a lot more traffic by spreading themselves through the network via HTTP protocol. Such stateful traffic typically leads to network attack, especially a SYN-Flooding. Additionally, some misbehaved software installed in client machines may periodically and/or automatically download, send updates information through the Internet, or repeatedly reconnect to certain designated servers without the high workload awareness. In this paper, the stateless mini HTTP redirector has been proposed. All traffic will be redirected to stateless robust URL target redirector which will eventually send traffic through raw socket, hence bypassing the operating system's TCP/IP stack. With stateless characteristics, the system can absolutely protect the SYN-flooding attack. Moreover, the system includes the user-gent detection module for minimizing the high workload effects from misbehaved software on client machines.
管理高工作负载和并发访问对于强制门户来说是一项具有挑战性的任务。大量的客户端通常会给系统带来很高的工作负载。此外,一些蠕虫或木马感染的客户端通过HTTP协议在网络中传播,从而产生更多的流量。这种状态流量通常会导致网络攻击,尤其是syn - flood攻击。此外,安装在客户机机器中的一些行为不正常的软件可能会定期和/或自动地通过Internet下载、发送更新信息,或者在没有高工作负载感知的情况下反复重新连接到某些指定的服务器。本文提出了一种无状态的迷你HTTP重定向器。所有流量将被重定向到无状态的健壮URL目标重定向器,最终将通过原始套接字发送流量,从而绕过操作系统的TCP/IP堆栈。该系统具有无状态特性,可以完全防御syn泛洪攻击。此外,该系统还包括用户代理检测模块,用于最大限度地减少客户端机器上行为不端的软件造成的高工作负载影响。
{"title":"Architectural design for large-scale campus-wide captive portal","authors":"K. Koht-Arsa, A. Phonphoem, S. Sanguanpong","doi":"10.1109/CCST.2009.5335561","DOIUrl":"https://doi.org/10.1109/CCST.2009.5335561","url":null,"abstract":"Managing high workload and concurrent accesses are challenging tasks for captive portal. The large number of clients generally creates high workload to the system. Furthermore, some worm or Trojan infected clients create a lot more traffic by spreading themselves through the network via HTTP protocol. Such stateful traffic typically leads to network attack, especially a SYN-Flooding. Additionally, some misbehaved software installed in client machines may periodically and/or automatically download, send updates information through the Internet, or repeatedly reconnect to certain designated servers without the high workload awareness. In this paper, the stateless mini HTTP redirector has been proposed. All traffic will be redirected to stateless robust URL target redirector which will eventually send traffic through raw socket, hence bypassing the operating system's TCP/IP stack. With stateless characteristics, the system can absolutely protect the SYN-flooding attack. Moreover, the system includes the user-gent detection module for minimizing the high workload effects from misbehaved software on client machines.","PeriodicalId":117285,"journal":{"name":"43rd Annual 2009 International Carnahan Conference on Security Technology","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130941023","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
43rd Annual 2009 International Carnahan Conference on Security Technology
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1