首页 > 最新文献

2011 IEEE International Conference on Technologies for Homeland Security (HST)最新文献

英文 中文
Data intensive architecture for scalable cyber analytics 用于可扩展网络分析的数据密集型架构
Pub Date : 2011-12-19 DOI: 10.1109/THS.2011.6107901
Bryan K. Olsen, John R. Johnson, T. Critchlow
Cyber analysts are tasked with the identification and mitigation of network exploits and threats. These compromises are difficult to identify due to the characteristics of cyber communication, the volume of traffic, and the duration of possible attack. In this paper, we describe a prototype implementation designed to provide cyber analysts an environment where they can interactively explore a month's worth of cyber security data. This prototype utilized On-Line Analytical Processing (OLAP) techniques to present a data cube to the analysts. The cube provides a summary of the data, allowing trends to be easily identified as well as the ability to easily pull up the original records comprising an event of interest. The cube was built using SQL Server Analysis Services (SSAS), with the interface to the cube provided by Tableau. This software infrastructure was supported by a novel hardware architecture comprising a Netezza TwinFin for the underlying data warehouse and a cube server with a FusionIO drive hosting the data cube. We evaluated this environment on a month's worth of artificial, but realistic, data using multiple queries provided by our cyber analysts. As our results indicate, OLAP technology has progressed to the point where it is in a unique position to provide novel insights to cyber analysts, as long as it is supported by an appropriate data intensive architecture.
网络分析师的任务是识别和减轻网络漏洞和威胁。由于网络通信的特点、流量和可能的攻击持续时间,这些妥协很难识别。在本文中,我们描述了一个原型实现,旨在为网络分析师提供一个环境,在这个环境中,他们可以交互式地探索一个月的网络安全数据。该原型利用在线分析处理(OLAP)技术向分析人员呈现数据立方体。多维数据集提供数据摘要,允许轻松地识别趋势,并能够轻松地调出包含感兴趣事件的原始记录。该多维数据集是使用SQL Server分析服务(SSAS)构建的,与该多维数据集的接口由Tableau提供。该软件基础设施由一种新颖的硬件架构提供支持,该架构包括用于底层数据仓库的Netezza TwinFin和带有承载数据多维数据集的FusionIO驱动器的多维数据集服务器。我们使用网络分析师提供的多个查询,对一个月的人工但真实的数据进行了评估。正如我们的结果所表明的那样,OLAP技术已经发展到一个独特的位置,只要它得到适当的数据密集型体系结构的支持,就可以为网络分析师提供新颖的见解。
{"title":"Data intensive architecture for scalable cyber analytics","authors":"Bryan K. Olsen, John R. Johnson, T. Critchlow","doi":"10.1109/THS.2011.6107901","DOIUrl":"https://doi.org/10.1109/THS.2011.6107901","url":null,"abstract":"Cyber analysts are tasked with the identification and mitigation of network exploits and threats. These compromises are difficult to identify due to the characteristics of cyber communication, the volume of traffic, and the duration of possible attack. In this paper, we describe a prototype implementation designed to provide cyber analysts an environment where they can interactively explore a month's worth of cyber security data. This prototype utilized On-Line Analytical Processing (OLAP) techniques to present a data cube to the analysts. The cube provides a summary of the data, allowing trends to be easily identified as well as the ability to easily pull up the original records comprising an event of interest. The cube was built using SQL Server Analysis Services (SSAS), with the interface to the cube provided by Tableau. This software infrastructure was supported by a novel hardware architecture comprising a Netezza TwinFin for the underlying data warehouse and a cube server with a FusionIO drive hosting the data cube. We evaluated this environment on a month's worth of artificial, but realistic, data using multiple queries provided by our cyber analysts. As our results indicate, OLAP technology has progressed to the point where it is in a unique position to provide novel insights to cyber analysts, as long as it is supported by an appropriate data intensive architecture.","PeriodicalId":228322,"journal":{"name":"2011 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"99 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116651382","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cyber resilience for mission assurance 任务保障的网络弹性
Pub Date : 2011-12-19 DOI: 10.1109/THS.2011.6107877
Harriet Goldman, R. McQuaid, J. Picciotto
Our national security and critical infrastructure sectors have become increasingly dependent on commercial information systems and technologies whose pedigree is uncertain given the globalization of the supply chain. Furthermore, these system architectures are brittle and fail or are compromised when subjected to ever-increasingly advanced and adaptive cyber attacks, resulting in failed, disrupted or compromised mission operations. While we must continue to raise the bar to protect mission critical systems from these threats by implementing best security practices, the current philosophy of trying to keep the adversaries out, or the assumption that they will be detected if they get through the first line of defense, is no longer valid. Given the sophistication, adaptiveness, and persistence of cyber threats, we can no longer assume that we can completely defend against intruders and must change our mindset to assume some degree of adversary success and be prepared to “fight through” cyber attacks to ensure mission success even in a degraded or contested environment. This paper will focus on actionable architectural and operational recommendations to address the advanced cyber threat and to enable mission assurance for critical operations. These recommendations can create transformational improvements by helping to reverse adversary advantage, minimize exploit impact to essential operations, increase adversary cost and uncertainty, and act as a deterrent. These approaches go well beyond traditional information assurance, disaster recovery and survivability techniques. The approaches and strategies to be discussed include creative applications of trust technologies and advanced detection capabilities in conjunction with combination of techniques using diversity, redundancy, isolation and containment, least privilege, moving target defense, randomization and unpredictability, deception, and adaptive management and response.
我们的国家安全和关键基础设施部门越来越依赖于商业信息系统和技术,由于供应链的全球化,这些系统和技术的来源是不确定的。此外,当受到日益先进和自适应的网络攻击时,这些系统架构很脆弱,会出现故障或受损,导致任务操作失败、中断或受损。虽然我们必须继续提高标准,通过实施最佳安全实践来保护关键任务系统免受这些威胁,但目前试图将对手挡在外面的理念,或者假设如果他们通过第一道防线就会被检测到,已经不再有效。考虑到网络威胁的复杂性、适应性和持久性,我们不能再假设我们可以完全防御入侵者,必须改变我们的思维方式,假设对手在一定程度上取得了成功,并准备好“战胜”网络攻击,以确保即使在退化或有争议的环境中也能成功完成任务。本文将侧重于可操作的架构和操作建议,以解决先进的网络威胁,并为关键操作提供任务保证。这些建议可以通过帮助扭转对手的优势,最大限度地减少对基本操作的影响,增加对手的成本和不确定性,并起到威慑作用,从而创造变革性的改进。这些方法远远超出了传统的信息保障、灾难恢复和生存能力技术。将讨论的方法和策略包括信任技术和先进检测能力的创造性应用,以及使用多样性、冗余、隔离和遏制、最小特权、移动目标防御、随机化和不可预测性、欺骗以及自适应管理和响应的技术组合。
{"title":"Cyber resilience for mission assurance","authors":"Harriet Goldman, R. McQuaid, J. Picciotto","doi":"10.1109/THS.2011.6107877","DOIUrl":"https://doi.org/10.1109/THS.2011.6107877","url":null,"abstract":"Our national security and critical infrastructure sectors have become increasingly dependent on commercial information systems and technologies whose pedigree is uncertain given the globalization of the supply chain. Furthermore, these system architectures are brittle and fail or are compromised when subjected to ever-increasingly advanced and adaptive cyber attacks, resulting in failed, disrupted or compromised mission operations. While we must continue to raise the bar to protect mission critical systems from these threats by implementing best security practices, the current philosophy of trying to keep the adversaries out, or the assumption that they will be detected if they get through the first line of defense, is no longer valid. Given the sophistication, adaptiveness, and persistence of cyber threats, we can no longer assume that we can completely defend against intruders and must change our mindset to assume some degree of adversary success and be prepared to “fight through” cyber attacks to ensure mission success even in a degraded or contested environment. This paper will focus on actionable architectural and operational recommendations to address the advanced cyber threat and to enable mission assurance for critical operations. These recommendations can create transformational improvements by helping to reverse adversary advantage, minimize exploit impact to essential operations, increase adversary cost and uncertainty, and act as a deterrent. These approaches go well beyond traditional information assurance, disaster recovery and survivability techniques. The approaches and strategies to be discussed include creative applications of trust technologies and advanced detection capabilities in conjunction with combination of techniques using diversity, redundancy, isolation and containment, least privilege, moving target defense, randomization and unpredictability, deception, and adaptive management and response.","PeriodicalId":228322,"journal":{"name":"2011 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121352105","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 32
Development of the adaptable, GIS-based, multi-threat detection system 基于gis的适应性多威胁检测系统的开发
Pub Date : 2011-12-19 DOI: 10.1109/THS.2011.6107920
J. McClintock, M. Saxon, J. Forsythe, James Rascoe, J. Risser
Battelle developed the Adaptable, Geographic Information System (GIS) based, Multi-threat, Detection System (AGMDS) to provide a portable, exterior, full threat spectrum detection system for special events, operations that require a quickly deployable area surveillance system, and mobile applications such as convoys, patrols, or covert operations. The AGMDS increases the user's situational awareness by detecting potential threats and attacks and communicating wirelessly through a mesh network with a central control station that consolidates the data on a unified map display. Development of the AGMDS was part of Project Ancile that Battelle performed for the Defense Threat Reduction Agency (DTRA). The goal of the project was to develop cost-effective, integrated solutions for protection against the full range of terrorist threats — i.e. physical; cyber; and chemical biological, radiological, nuclear, and explosive (CBRNE) threats. This document describes the AGMDS development process, beginning with the technology gap assessment which identified the need for the system development; continuing through requirements analysis, system design and trade studies, integration and test; and culminating in a demonstration at the U.S. Naval Academy. The first phase of Project Ancile was to define technology gaps in active military facilities. Battelle visited three active installations and assessed their current security systems against the full threat spectrum. The gaps identified during the assessment were documented as needs for a potential system. Battelle developed conceptual systems to fill these needs and performed a trade study to determine which system should be developed and demonstrated. The AGMDS was selected as it addresses the majority of the technology gaps identified and had the lowest relative cost and risk associated with development. The AGMDS is modular and portable, consisting of five subsystems: detector subsystem, vehicle subsystem, personnel subsystem, relay subsystem, and a control subsystem. The current configuration includes: • High resolution video surveillance with 180° field of view • Personnel physiology monitoring of heart and breathing rates and position • Concealed object detection using thermal imaging • Chemical detection, biological detection and identification and radiation detection. The detector and vehicle subsystems house the CBRE sensors as well as video and communications equipment. The personnel subsystem provides blue force tracking and physiological monitoring, and the relay subsystems allow expanded network coverage. Together, the subsystems create a network of networks. Each detector and vehicle station houses a local network of sensors. The stations communicate with the control station via an ad-hoc, self-organizing, wireless mesh network; enabling display of sensor locations and alarms on a site map; as well as monitoring of video surveillance data.
Battelle公司开发了适应性强的、基于地理信息系统(GIS)的多威胁探测系统(AGMDS),为特殊事件、需要快速部署区域监视系统的行动和移动应用(如车队、巡逻或隐蔽行动)提供便携式、外部、全威胁光谱探测系统。AGMDS通过检测潜在威胁和攻击,并通过网状网络与中央控制站进行无线通信,从而提高用户的态势感知能力,中央控制站将数据整合到统一的地图显示上。AGMDS的发展是巴特尔为国防威胁减少局(DTRA)执行的安吉尔项目的一部分。该项目的目标是制定具有成本效益的综合解决办法,防止各种恐怖主义威胁- -即物质威胁;网络;化学、生物、放射性、核爆炸(CBRNE)威胁。本文件描述了AGMDS的开发过程,从确定系统开发需求的技术差距评估开始;继续进行需求分析、系统设计和贸易研究、集成和测试;并在美国海军学院的一次演示中达到高潮。安吉尔计划的第一阶段是确定现役军事设施的技术差距。巴特尔访问了三个正在使用的设施,并评估了它们当前的安全系统对所有威胁的防范能力。在评估期间确定的差距被记录为潜在系统的需求。巴特尔开发了概念系统来满足这些需求,并进行了一项贸易研究,以确定应该开发和演示哪种系统。选择AGMDS是因为它解决了已确定的大多数技术差距,并且具有与开发相关的最低相对成本和风险。AGMDS是模块化和便携式的,由五个子系统组成:探测器子系统、车辆子系统、人员子系统、继电器子系统和控制子系统。目前的配置包括:•具有180°视场的高分辨率视频监控•人员生理监测心脏和呼吸频率和位置•使用热成像进行隐藏物体检测•化学检测,生物检测和识别以及辐射检测。探测器和车辆子系统装有CBRE传感器以及视频和通信设备。人员子系统提供蓝军跟踪和生理监测,中继子系统允许扩大网络覆盖范围。这些子系统一起创建了一个网络的网络。每个探测器和车辆站都有一个本地传感器网络。所述站通过自组织无线网状网络与所述控制站通信;在站点地图上显示传感器位置和警报;以及视频监控数据的监控。
{"title":"Development of the adaptable, GIS-based, multi-threat detection system","authors":"J. McClintock, M. Saxon, J. Forsythe, James Rascoe, J. Risser","doi":"10.1109/THS.2011.6107920","DOIUrl":"https://doi.org/10.1109/THS.2011.6107920","url":null,"abstract":"Battelle developed the Adaptable, Geographic Information System (GIS) based, Multi-threat, Detection System (AGMDS) to provide a portable, exterior, full threat spectrum detection system for special events, operations that require a quickly deployable area surveillance system, and mobile applications such as convoys, patrols, or covert operations. The AGMDS increases the user's situational awareness by detecting potential threats and attacks and communicating wirelessly through a mesh network with a central control station that consolidates the data on a unified map display. Development of the AGMDS was part of Project Ancile that Battelle performed for the Defense Threat Reduction Agency (DTRA). The goal of the project was to develop cost-effective, integrated solutions for protection against the full range of terrorist threats — i.e. physical; cyber; and chemical biological, radiological, nuclear, and explosive (CBRNE) threats. This document describes the AGMDS development process, beginning with the technology gap assessment which identified the need for the system development; continuing through requirements analysis, system design and trade studies, integration and test; and culminating in a demonstration at the U.S. Naval Academy. The first phase of Project Ancile was to define technology gaps in active military facilities. Battelle visited three active installations and assessed their current security systems against the full threat spectrum. The gaps identified during the assessment were documented as needs for a potential system. Battelle developed conceptual systems to fill these needs and performed a trade study to determine which system should be developed and demonstrated. The AGMDS was selected as it addresses the majority of the technology gaps identified and had the lowest relative cost and risk associated with development. The AGMDS is modular and portable, consisting of five subsystems: detector subsystem, vehicle subsystem, personnel subsystem, relay subsystem, and a control subsystem. The current configuration includes: • High resolution video surveillance with 180° field of view • Personnel physiology monitoring of heart and breathing rates and position • Concealed object detection using thermal imaging • Chemical detection, biological detection and identification and radiation detection. The detector and vehicle subsystems house the CBRE sensors as well as video and communications equipment. The personnel subsystem provides blue force tracking and physiological monitoring, and the relay subsystems allow expanded network coverage. Together, the subsystems create a network of networks. Each detector and vehicle station houses a local network of sensors. The stations communicate with the control station via an ad-hoc, self-organizing, wireless mesh network; enabling display of sensor locations and alarms on a site map; as well as monitoring of video surveillance data.","PeriodicalId":228322,"journal":{"name":"2011 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"344 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133210601","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Local reconfiguration for simultaneous coverage and tracking in a large scale camera network 大规模摄像机网络中同时覆盖和跟踪的局部重构
Pub Date : 2011-12-19 DOI: 10.1109/THS.2011.6107857
Bryan Lemon, V. Kulathumani
We present a distributed camera control algorithm that can be used for the monitoring of large regions using a network of PTZ (pan/tilt/zoom) cameras. The proposed strategy would allow for continuous target tracking at a high resolution, while still maintaining coverage over the entire monitored region at the highest possible resolution. Our algorithm requires only a local exchange of information, is quick to converge and ensures longer periods of stability between successive reconfiguration steps. We evaluate the performance of our algorithm in simulation and demonstrate that local reconfiguration is sufficient for maintaining an acceptable coverage of target and non-target points.
我们提出了一种分布式摄像机控制算法,可用于使用PTZ(平移/倾斜/变焦)摄像机网络监控大区域。拟议的战略将允许以高分辨率连续跟踪目标,同时仍以尽可能高的分辨率保持对整个监测区域的覆盖。我们的算法只需要局部的信息交换,收敛速度快,并且保证了连续重构步骤之间较长的稳定周期。我们在仿真中评估了算法的性能,并证明局部重构足以维持可接受的目标点和非目标点的覆盖范围。
{"title":"Local reconfiguration for simultaneous coverage and tracking in a large scale camera network","authors":"Bryan Lemon, V. Kulathumani","doi":"10.1109/THS.2011.6107857","DOIUrl":"https://doi.org/10.1109/THS.2011.6107857","url":null,"abstract":"We present a distributed camera control algorithm that can be used for the monitoring of large regions using a network of PTZ (pan/tilt/zoom) cameras. The proposed strategy would allow for continuous target tracking at a high resolution, while still maintaining coverage over the entire monitored region at the highest possible resolution. Our algorithm requires only a local exchange of information, is quick to converge and ensures longer periods of stability between successive reconfiguration steps. We evaluate the performance of our algorithm in simulation and demonstrate that local reconfiguration is sufficient for maintaining an acceptable coverage of target and non-target points.","PeriodicalId":228322,"journal":{"name":"2011 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115861653","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Integrated PMR-broadband-IP network for secure realtime multimedia information sharing 集成pmr -宽带- ip网络,实现安全的实时多媒体信息共享
Pub Date : 2011-12-19 DOI: 10.1109/THS.2011.6107842
S. Subik, C. Wietfeld
In this paper, the authors present a novel solution for the integration of TETRA-based PMR and IP based wireless broadband networks through a novel inter-system interface. This solution enables secure group communications based on PMR standards using heterogeneous devices ranging from a traditional PMR device to smart phones such as the iPhone. Thereby a Smart-phone user will be enabled to leverage on one hand the multimedia data capabilities of 3G and 4G wireless networks (UMTS, LTE) while at the same time be part of a PMR group communication. In other words, any authorized Smart-phone can become part of a PMR communication group by simply downloading the appropriate, dedicated Application. As a key benefit, homeland security personnel can be included in the disaster response actions instantaneously, without necessarily carrying around a PMR device and without the need for PMR coverage. In contrast to existing solutions, the proposed interface solution prevents the reduction of the voice quality when bridging system boundaries by tandem encoding with a TETRA-over-IP (ToIP) interconnection. The presented solutions include different interconnection setups including Trunked Mode (TMO) and Direct Mode (DMO) capabilities. To enable the group communications services as known in PMR systems, a dedicated protocol, the Push-to-X protocol developed by CNI, is leveraged. The results of performance evaluations show that the speech quality is still acceptable even under harsh conditions. The proposed system therefore paves the way towards a future, high performance PMR based on LTE, while preserving backwards compatibility with existing PMR systems.
在本文中,作者提出了一种新的解决方案,通过一种新的系统间接口,将基于tetra的PMR和基于IP的无线宽带网络集成在一起。该解决方案使用从传统PMR设备到智能手机(如iPhone)的异构设备,实现基于PMR标准的安全组通信。因此,智能手机用户将能够一方面利用3G和4G无线网络(UMTS、LTE)的多媒体数据能力,同时成为PMR组通信的一部分。换句话说,只要下载适当的专用应用程序,任何授权的智能手机都可以成为PMR通信组的一部分。作为一个关键的好处,国土安全人员可以立即参与灾难响应行动,而不必随身携带PMR设备,也不需要PMR覆盖。与现有的解决方案相比,所提出的接口解决方案防止了通过使用TETRA-over-IP (ToIP)互连的串联编码桥接系统边界时语音质量的降低。提出的解决方案包括不同的互连设置,包括集群模式(TMO)和直接模式(DMO)功能。为了启用PMR系统中已知的组通信服务,利用了CNI开发的专用协议Push-to-X协议。性能评估结果表明,即使在恶劣条件下,语音质量仍然可以接受。因此,该系统为未来基于LTE的高性能PMR铺平了道路,同时保持了与现有PMR系统的向后兼容性。
{"title":"Integrated PMR-broadband-IP network for secure realtime multimedia information sharing","authors":"S. Subik, C. Wietfeld","doi":"10.1109/THS.2011.6107842","DOIUrl":"https://doi.org/10.1109/THS.2011.6107842","url":null,"abstract":"In this paper, the authors present a novel solution for the integration of TETRA-based PMR and IP based wireless broadband networks through a novel inter-system interface. This solution enables secure group communications based on PMR standards using heterogeneous devices ranging from a traditional PMR device to smart phones such as the iPhone. Thereby a Smart-phone user will be enabled to leverage on one hand the multimedia data capabilities of 3G and 4G wireless networks (UMTS, LTE) while at the same time be part of a PMR group communication. In other words, any authorized Smart-phone can become part of a PMR communication group by simply downloading the appropriate, dedicated Application. As a key benefit, homeland security personnel can be included in the disaster response actions instantaneously, without necessarily carrying around a PMR device and without the need for PMR coverage. In contrast to existing solutions, the proposed interface solution prevents the reduction of the voice quality when bridging system boundaries by tandem encoding with a TETRA-over-IP (ToIP) interconnection. The presented solutions include different interconnection setups including Trunked Mode (TMO) and Direct Mode (DMO) capabilities. To enable the group communications services as known in PMR systems, a dedicated protocol, the Push-to-X protocol developed by CNI, is leveraged. The results of performance evaluations show that the speech quality is still acceptable even under harsh conditions. The proposed system therefore paves the way towards a future, high performance PMR based on LTE, while preserving backwards compatibility with existing PMR systems.","PeriodicalId":228322,"journal":{"name":"2011 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116280645","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
A calibration free hybrid RF and video surveillance system for reliable tracking and identification 一种无需校准的混合射频和视频监控系统,用于可靠的跟踪和识别
Pub Date : 2011-12-19 DOI: 10.1109/THS.2011.6107878
Xunyi Yu, A. Ganz
We introduce a calibration free hybrid RF and video surveillance system for reliable tracking, identification in Mass Casualty Incidents (MCI). The system fuses RF measurements along with information harvested from the video such as target temporal, kinematic, and appearance information. Our hybrid RF and video surveillance system can be deployed rapidly without manual calibration of either the camera or the RF devices, and can work in complex RF environments. This is made possible by the simultaneous identification and mapping algorithm that iteratively refines the mapping of the radio beacon signal strength signature to target positions in video frames. The system is the basis of identity aware video surveillance, i.e. enabling unique identification of targets in the video and applying identity specific analytics roles to individual targets.
我们介绍了一种无需校准的混合射频和视频监控系统,用于可靠地跟踪和识别大规模伤亡事件。该系统融合了射频测量以及从视频中获取的信息,如目标时间、运动和外观信息。我们的混合射频和视频监控系统可以快速部署,无需手动校准摄像机或射频设备,并且可以在复杂的射频环境中工作。这是通过同时识别和映射算法实现的,该算法迭代地将无线电信标信号强度签名映射到视频帧中的目标位置。该系统是身份感知视频监控的基础,即实现视频中目标的唯一识别,并对单个目标应用身份特定分析角色。
{"title":"A calibration free hybrid RF and video surveillance system for reliable tracking and identification","authors":"Xunyi Yu, A. Ganz","doi":"10.1109/THS.2011.6107878","DOIUrl":"https://doi.org/10.1109/THS.2011.6107878","url":null,"abstract":"We introduce a calibration free hybrid RF and video surveillance system for reliable tracking, identification in Mass Casualty Incidents (MCI). The system fuses RF measurements along with information harvested from the video such as target temporal, kinematic, and appearance information. Our hybrid RF and video surveillance system can be deployed rapidly without manual calibration of either the camera or the RF devices, and can work in complex RF environments. This is made possible by the simultaneous identification and mapping algorithm that iteratively refines the mapping of the radio beacon signal strength signature to target positions in video frames. The system is the basis of identity aware video surveillance, i.e. enabling unique identification of targets in the video and applying identity specific analytics roles to individual targets.","PeriodicalId":228322,"journal":{"name":"2011 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115140119","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Asynchronous and self-organizing radiolocation system — AEGIR 异步和自组织无线电定位系统
Pub Date : 2011-12-19 DOI: 10.1109/THS.2011.6107906
S. Ambroziak, R. Katulski, J. Sadowski, W. Siwicki, J. Stefanski
Since first travels by land or sea, it was necessary to determine position in an unknown environment. At the beginning methods were simple. They were based on the observation of characteristic points, in the case of shipping additional observations of the coastline. Then came a navigation based on astronomical methods (astronavigation). At the beginning of the XX-century a new way of determining the current location was developed. It uses radiowave signals. First came the radio-beacons, which at fixed intervals, transmitted well-defined sequence of radio signals. Then came ground-based systems. Pulse signals are received from at least three stations operating synchronously. Electronically measured the delay of one signal relative to the other, allows to determine the difference in distance separating the object from the localized sources. According to the principles of geometry allows the plot (or find) on the map hyperbole, which is the object. The newest way to determine your position are satellite systems. They are based on the measurement of arrival time of radio signals from satellites to the receiver. Currently, the most popular system is GPS (Global Positioning System). This system is fully controlled by the Department of Defense, and only the U.S. forces and their closest allies have guaranteed accuracy offered by the system. Armies of other countries can only use the civilian version. Due to the popularity of this system and its worldwide range, terrorist can build bombs with simple GPS receivers to detonate in a specific place. To prevent this, deliberate errors to the civilian version of the system can be introduced. Those deliberate errors will also prevent the use of GPS by the secret services or the armies of other countries than the U.S. This situation has spawned the need for an independent radiolocation system. This article describes the construction and operation of such a technology demonstrator that was developed at the Technical University of Gdansk. It was named AEGIR (according to Norse mythology: god of the seas and oceans). The main advantage of the system is to dispense with the chain organization of the reference station, which work with each other asynchronously. This paper presents results and analysis of its effectiveness.
由于第一次旅行是通过陆地或海洋,所以有必要在未知的环境中确定位置。起初,方法很简单。它们是基于对特征点的观察,在航运的情况下,对海岸线的额外观察。然后出现了基于天文学方法的航海(天文学导航)。在二十世纪初,一种确定当前位置的新方法被开发出来。它使用无线电波信号。首先是无线电信标,它以固定的间隔发送明确的无线电信号序列。然后是地面系统。脉冲信号从至少三个同步操作的站接收。通过电子测量一个信号相对于另一个信号的延迟,可以确定物体与局部源之间的距离差异。根据几何原理允许在地图上绘制(或发现)夸张,即物体。最新的定位方法是卫星系统。它们是基于对从卫星到接收机的无线电信号到达时间的测量。目前,最流行的系统是GPS(全球定位系统)。该系统完全由国防部控制,只有美国军队及其最亲密的盟友才能保证该系统提供的准确性。其他国家的军队只能使用民用版本。由于该系统的普及及其全球范围,恐怖分子可以用简单的GPS接收器制造炸弹,并在特定地点引爆。为了防止这种情况发生,可以在民用版本的系统中引入故意的错误。这些故意的错误还将阻止美国以外的其他国家的秘密机构或军队使用GPS。这种情况催生了对独立无线电定位系统的需求。本文描述了格但斯克技术大学开发的这种技术演示器的构造和操作。它被命名为AEGIR(根据挪威神话:海洋之神)。该系统的主要优点是省去了参考站的链式组织,它们之间的工作是异步的。本文给出了结果并对其有效性进行了分析。
{"title":"Asynchronous and self-organizing radiolocation system — AEGIR","authors":"S. Ambroziak, R. Katulski, J. Sadowski, W. Siwicki, J. Stefanski","doi":"10.1109/THS.2011.6107906","DOIUrl":"https://doi.org/10.1109/THS.2011.6107906","url":null,"abstract":"Since first travels by land or sea, it was necessary to determine position in an unknown environment. At the beginning methods were simple. They were based on the observation of characteristic points, in the case of shipping additional observations of the coastline. Then came a navigation based on astronomical methods (astronavigation). At the beginning of the XX-century a new way of determining the current location was developed. It uses radiowave signals. First came the radio-beacons, which at fixed intervals, transmitted well-defined sequence of radio signals. Then came ground-based systems. Pulse signals are received from at least three stations operating synchronously. Electronically measured the delay of one signal relative to the other, allows to determine the difference in distance separating the object from the localized sources. According to the principles of geometry allows the plot (or find) on the map hyperbole, which is the object. The newest way to determine your position are satellite systems. They are based on the measurement of arrival time of radio signals from satellites to the receiver. Currently, the most popular system is GPS (Global Positioning System). This system is fully controlled by the Department of Defense, and only the U.S. forces and their closest allies have guaranteed accuracy offered by the system. Armies of other countries can only use the civilian version. Due to the popularity of this system and its worldwide range, terrorist can build bombs with simple GPS receivers to detonate in a specific place. To prevent this, deliberate errors to the civilian version of the system can be introduced. Those deliberate errors will also prevent the use of GPS by the secret services or the armies of other countries than the U.S. This situation has spawned the need for an independent radiolocation system. This article describes the construction and operation of such a technology demonstrator that was developed at the Technical University of Gdansk. It was named AEGIR (according to Norse mythology: god of the seas and oceans). The main advantage of the system is to dispense with the chain organization of the reference station, which work with each other asynchronously. This paper presents results and analysis of its effectiveness.","PeriodicalId":228322,"journal":{"name":"2011 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"132 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126287710","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Nuclear detection using higher order learning 使用高阶学习的核探测
Pub Date : 2011-12-19 DOI: 10.1109/THS.2011.6107890
C. Nelson, W. Pottenger
The detection of potentially threatening nuclear materials is a challenging homeland security problem. This research reports on the application of a novel statistical relational learning algorithm, Higher Order Naïve Bayes (HONB), to improve the detection and identification of nuclear isotopes. When classifying nuclear detection data, distinguishing potentially threatening from harmless radioisotopes is critical. These also must be distinguished from the naturally occurring radioactive background. This research applied Higher Order Learning to nuclear detection data to improve the detection and identification of four isotopes: Ga67, I131, In111, and Tc99m. In the research traditional IID machine learning methods are applied to the area of nuclear detection, and the results compared with the performance of leveraging higher-order dependencies between feature values using HONB. The findings give insight about the performance of higher-order classifiers (described in [2]) on datasets with small numbers of positive instances. In the initial study, Naïve Bayes was compared with its higher-order counterpart, Higher Order Naïve Bayes. HONB was found to perform statistically significantly better for isotope Ga67 when using a preprocessing methodology of discretizing then binarizing the input sensor data. Similar results were seen for different amounts of training data for I131, In111, and Tc99m. HONB was also found to perform statistically significantly better for isotopes I131 and Tc99m when the preprocessing involved normalization, discretization then binarization. This study shows that Higher Order Learning techniques can be very useful in the arena of nuclear detection.
探测潜在威胁的核材料是一个具有挑战性的国土安全问题。本研究报告了一种新的统计关系学习算法,高阶Naïve贝叶斯(HONB)的应用,以提高核同位素的检测和识别。在对核探测数据进行分类时,区分潜在威胁和无害的放射性同位素是至关重要的。这些也必须与自然发生的放射性背景区分开。本研究将高阶学习应用于核检测数据,改进了Ga67、I131、In111和Tc99m四种同位素的检测和鉴定。本研究将传统的IID机器学习方法应用于核检测领域,并将结果与利用特征值之间高阶依赖关系的HONB方法的性能进行了比较。这些发现为高阶分类器(在[2]中描述)在具有少量正实例的数据集上的性能提供了见解。在最初的研究中,Naïve贝叶斯与其高阶对应的高阶Naïve贝叶斯进行了比较。研究发现,采用先离散化后二值化的预处理方法,对Ga67同位素进行HONB处理的性能显著提高。对于I131、In111和Tc99m不同数量的训练数据,可以看到类似的结果。当预处理涉及归一化、离散化和二值化时,对同位素I131和Tc99m的HONB效果也有统计学上的显著提高。这项研究表明,高阶学习技术在核探测领域是非常有用的。
{"title":"Nuclear detection using higher order learning","authors":"C. Nelson, W. Pottenger","doi":"10.1109/THS.2011.6107890","DOIUrl":"https://doi.org/10.1109/THS.2011.6107890","url":null,"abstract":"The detection of potentially threatening nuclear materials is a challenging homeland security problem. This research reports on the application of a novel statistical relational learning algorithm, Higher Order Naïve Bayes (HONB), to improve the detection and identification of nuclear isotopes. When classifying nuclear detection data, distinguishing potentially threatening from harmless radioisotopes is critical. These also must be distinguished from the naturally occurring radioactive background. This research applied Higher Order Learning to nuclear detection data to improve the detection and identification of four isotopes: Ga67, I131, In111, and Tc99m. In the research traditional IID machine learning methods are applied to the area of nuclear detection, and the results compared with the performance of leveraging higher-order dependencies between feature values using HONB. The findings give insight about the performance of higher-order classifiers (described in [2]) on datasets with small numbers of positive instances. In the initial study, Naïve Bayes was compared with its higher-order counterpart, Higher Order Naïve Bayes. HONB was found to perform statistically significantly better for isotope Ga67 when using a preprocessing methodology of discretizing then binarizing the input sensor data. Similar results were seen for different amounts of training data for I131, In111, and Tc99m. HONB was also found to perform statistically significantly better for isotopes I131 and Tc99m when the preprocessing involved normalization, discretization then binarization. This study shows that Higher Order Learning techniques can be very useful in the arena of nuclear detection.","PeriodicalId":228322,"journal":{"name":"2011 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129995478","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Visual analytics for maritime domain awareness 海事领域感知的可视化分析
Pub Date : 2011-12-19 DOI: 10.1109/THS.2011.6107846
V. Lavigne, D. Gouin, Michael Davenport
Maintaining situation awareness in the maritime domain is a challenging mandate. Task analysis activities were conducted to identify where visual analytics science and technology could improve maritime domain awareness and reduce information overload. Three promising opportunities were identified: the visualization of normal maritime behaviour, anomaly detection, and the collaborative analysis of a vessel of interest. In this paper, we describe the result of our user studies along with potential visual analytics solutions and features considered for a maritime analytics prototype.
在海洋领域保持态势感知是一项具有挑战性的任务。进行任务分析活动,以确定可视化分析科学和技术可以提高海事领域意识和减少信息过载的地方。确定了三个有希望的机会:正常海上行为的可视化、异常检测和感兴趣船只的协作分析。在本文中,我们描述了用户研究的结果,以及潜在的可视化分析解决方案和海事分析原型所考虑的功能。
{"title":"Visual analytics for maritime domain awareness","authors":"V. Lavigne, D. Gouin, Michael Davenport","doi":"10.1109/THS.2011.6107846","DOIUrl":"https://doi.org/10.1109/THS.2011.6107846","url":null,"abstract":"Maintaining situation awareness in the maritime domain is a challenging mandate. Task analysis activities were conducted to identify where visual analytics science and technology could improve maritime domain awareness and reduce information overload. Three promising opportunities were identified: the visualization of normal maritime behaviour, anomaly detection, and the collaborative analysis of a vessel of interest. In this paper, we describe the result of our user studies along with potential visual analytics solutions and features considered for a maritime analytics prototype.","PeriodicalId":228322,"journal":{"name":"2011 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131481887","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
The development of an aerodynamic shoe sampling system 气动鞋样系统的研制
Pub Date : 2011-12-19 DOI: 10.1109/THS.2011.6107884
M. Staymates, G. Gillen, J. Grandner, Stefan R Lukow
In collaboration with the Transportation Security Laboratory, the National Institute of Standards and Technology has been developing a prototype shoe sampling system that relies on aerodynamic sampling for liberating, transporting, and collecting explosive contamination. Here, we focus on the measurement science of aerodynamic sampling with the goal of uncovering the underlying physics of the flow fields within these sampling systems. This paper will cover the results of a series of experiments that were used to help with the design of our prototype shoe sampling system. Laser light-sheet flow visualization revealed the bulk fluid motion inside and around the sampling system. Polymer microsphere particle standards were used to quantify the particle release efficiency of the shoe sampling system. Patches containing a known mass of explosives were also used to determine the effectiveness of particle release in the shoe sampler. Results from these experiments indicate that particle removal efficiency at a specific location is strongly influenced by its distance from an air jet and the type of explosive or material on the surface. The successful application of these flow visualization techniques and other metrology tools has helped us construct the sampling portion of a shoe screening prototype. The hope is that these tools will be useful to others who are developing next-generation aerodynamic sampling technologies.
在与运输安全实验室的合作下,美国国家标准与技术研究所一直在开发一种原型鞋采样系统,该系统依靠空气动力学采样来释放、运输和收集爆炸性污染。在这里,我们将重点放在气动采样的测量科学上,目的是揭示这些采样系统中流场的潜在物理特性。本文将介绍一系列实验的结果,这些实验用于帮助设计我们的原型鞋取样系统。激光光片流动可视化显示了取样系统内部和周围的大量流体运动。采用聚合物微球颗粒标准来量化鞋样系统的颗粒释放效率。还使用含有已知质量爆炸物的碎片来确定鞋子取样器中颗粒释放的有效性。实验结果表明,颗粒在特定位置的去除效率受其与气流的距离和表面爆炸物或物质的类型的强烈影响。这些流动可视化技术和其他计量工具的成功应用帮助我们构建了鞋子筛选原型的采样部分。希望这些工具将对开发下一代空气动力学采样技术的其他人有用。
{"title":"The development of an aerodynamic shoe sampling system","authors":"M. Staymates, G. Gillen, J. Grandner, Stefan R Lukow","doi":"10.1109/THS.2011.6107884","DOIUrl":"https://doi.org/10.1109/THS.2011.6107884","url":null,"abstract":"In collaboration with the Transportation Security Laboratory, the National Institute of Standards and Technology has been developing a prototype shoe sampling system that relies on aerodynamic sampling for liberating, transporting, and collecting explosive contamination. Here, we focus on the measurement science of aerodynamic sampling with the goal of uncovering the underlying physics of the flow fields within these sampling systems. This paper will cover the results of a series of experiments that were used to help with the design of our prototype shoe sampling system. Laser light-sheet flow visualization revealed the bulk fluid motion inside and around the sampling system. Polymer microsphere particle standards were used to quantify the particle release efficiency of the shoe sampling system. Patches containing a known mass of explosives were also used to determine the effectiveness of particle release in the shoe sampler. Results from these experiments indicate that particle removal efficiency at a specific location is strongly influenced by its distance from an air jet and the type of explosive or material on the surface. The successful application of these flow visualization techniques and other metrology tools has helped us construct the sampling portion of a shoe screening prototype. The hope is that these tools will be useful to others who are developing next-generation aerodynamic sampling technologies.","PeriodicalId":228322,"journal":{"name":"2011 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"45 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121014864","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
2011 IEEE International Conference on Technologies for Homeland Security (HST)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1