Pub Date : 2011-12-19DOI: 10.1109/THS.2011.6107897
G. Drukier, E. Rubenstein, P. R. Solomon, M. Wójtowicz, M. Serio
The recent nuclear crisis at Fukushima, Japan is a stark reminder that radiation emergencies can and do happen. In addition to accidents, the potential use of radioactive materials by terrorists has raised serious concerns. While the primary concern has been with preventing these materials from entering the United States, thousands of dangerous radiological sources are already here within our borders, located in vulnerable locations in hospitals, food processing plants, and industrial sites. These sources pose a risk for use in two terrorist threats described by the Department of Health and Human Services (DHHS): the Dirty Bomb and the Silent Source. In a Dirty Bomb attack, radioactive material is dispersed using a conventional explosive. In a Silent Source attack, radioactive material is hidden in locations where people congregate (restaurants, airports, subway stations, shopping malls, etc.). Both scenarios can injure or kill people and cause significant political, social and economic disruption. This paper will describe the GammaPixTM technology, which has the potential to provide low cost, pervasive detection of, and warning against, radiation threats. The GammaPix technology is based on software analysis of the images produced by a surveillance or smartphone camera to measure the local gamma-ray radiation exposure at the device. The technology employs the inherent gamma-ray sensitivity of CCD and CMOS chips used in the digital image sensors of these devices. This paper describes the use of the technology in calibration and testing scenarios using installed video cameras and smartphone cameras.
{"title":"Low cost, pervasive detection of radiation threats","authors":"G. Drukier, E. Rubenstein, P. R. Solomon, M. Wójtowicz, M. Serio","doi":"10.1109/THS.2011.6107897","DOIUrl":"https://doi.org/10.1109/THS.2011.6107897","url":null,"abstract":"The recent nuclear crisis at Fukushima, Japan is a stark reminder that radiation emergencies can and do happen. In addition to accidents, the potential use of radioactive materials by terrorists has raised serious concerns. While the primary concern has been with preventing these materials from entering the United States, thousands of dangerous radiological sources are already here within our borders, located in vulnerable locations in hospitals, food processing plants, and industrial sites. These sources pose a risk for use in two terrorist threats described by the Department of Health and Human Services (DHHS): the Dirty Bomb and the Silent Source. In a Dirty Bomb attack, radioactive material is dispersed using a conventional explosive. In a Silent Source attack, radioactive material is hidden in locations where people congregate (restaurants, airports, subway stations, shopping malls, etc.). Both scenarios can injure or kill people and cause significant political, social and economic disruption. This paper will describe the GammaPixTM technology, which has the potential to provide low cost, pervasive detection of, and warning against, radiation threats. The GammaPix technology is based on software analysis of the images produced by a surveillance or smartphone camera to measure the local gamma-ray radiation exposure at the device. The technology employs the inherent gamma-ray sensitivity of CCD and CMOS chips used in the digital image sensors of these devices. This paper describes the use of the technology in calibration and testing scenarios using installed video cameras and smartphone cameras.","PeriodicalId":228322,"journal":{"name":"2011 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115211167","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-12-19DOI: 10.1109/THS.2011.6107895
Qixing Wang, L. Fiondella, N. Lownes, J. Ivan, R. Ammar, S. Rajasekaran, S. Tolba
In transportation networks, the vulnerable links will be those which play a critical role and are therefore the most likely to be attacked. High-volume edges with few alternative paths represent obvious system vulnerabilities. Conflict between a terrorist organization and a transportation management agency can be characterized as two opponents who compete with each other to win a game. In this paper a mixed-strategy, stochastic game theoretic approach is presented to mathematically capture each player's strategy and predict the possible result. A game considering all possible origin-destination pairs is constructed between a router, which seeks to maximally ensure safety and efficiency for all travelers, and the tester, which seeks to maximally disrupt network performance by disabling links within the network. The User-equilibrium assignment is utilized for routing probabilities computing, while the Method of Successive Averages (MSA) is employed to update the link cost during the game play. The method is demonstrated on a small sample network and then applied to the Sioux Fall network and large scale city network of Anaheim, California.
{"title":"Integrating equilibrium assignment in game-theoretic approach to measure many-to-many transportation network vulnerability","authors":"Qixing Wang, L. Fiondella, N. Lownes, J. Ivan, R. Ammar, S. Rajasekaran, S. Tolba","doi":"10.1109/THS.2011.6107895","DOIUrl":"https://doi.org/10.1109/THS.2011.6107895","url":null,"abstract":"In transportation networks, the vulnerable links will be those which play a critical role and are therefore the most likely to be attacked. High-volume edges with few alternative paths represent obvious system vulnerabilities. Conflict between a terrorist organization and a transportation management agency can be characterized as two opponents who compete with each other to win a game. In this paper a mixed-strategy, stochastic game theoretic approach is presented to mathematically capture each player's strategy and predict the possible result. A game considering all possible origin-destination pairs is constructed between a router, which seeks to maximally ensure safety and efficiency for all travelers, and the tester, which seeks to maximally disrupt network performance by disabling links within the network. The User-equilibrium assignment is utilized for routing probabilities computing, while the Method of Successive Averages (MSA) is employed to update the link cost during the game play. The method is demonstrated on a small sample network and then applied to the Sioux Fall network and large scale city network of Anaheim, California.","PeriodicalId":228322,"journal":{"name":"2011 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125278114","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-12-19DOI: 10.1109/THS.2011.6107859
Jay Wilhelm, M. Gautam, S. Ronen
An aerial high resolution wide angle camera system capable of 3D mapping was developed with a possible application in assisting DHS border security and military reconnaissance. The goals of this system were to survey vast areas with a wide angle camera system and provide precise coordinate information. This system was designed with an UAV in mind as the flight vehicle, taking the risk away from pilots with a reduction to the cost of operation. Currently, existing aerial camera systems cannot provide wide angle and high resolution imagery from a UAV. Utilizing proven, state-of-the-art imaging methods and off-the-shelf components, a versatile and reliable camera system was developed by VisionMap Ltd. The camera, MIST, is a lightweight, high resolution, digital vertically and oblique-looking, photogrammetric-certified payload for tactical unmanned aircraft systems (T-UAS). Evaluation of the MIST was carried out by collaboration between West Virginia University researchers and VisionMap of Israel. An experiment was performed to collect high resolution 3D imagery, determine the accuracy of coordinates using known ground points, and to test the function of the camera using the MIST over Morgantown, WV, home of West Virginia University. Results were a set of very high 3D resolution images and high accuracy mapping points. This paper will discuss the current state-of-the-art-camera systems capable of UAV operation, the uniqueness and functionality of MIST, and the experiment performed at WVU using MIST.
{"title":"MIST: An operational ground surveillance camera","authors":"Jay Wilhelm, M. Gautam, S. Ronen","doi":"10.1109/THS.2011.6107859","DOIUrl":"https://doi.org/10.1109/THS.2011.6107859","url":null,"abstract":"An aerial high resolution wide angle camera system capable of 3D mapping was developed with a possible application in assisting DHS border security and military reconnaissance. The goals of this system were to survey vast areas with a wide angle camera system and provide precise coordinate information. This system was designed with an UAV in mind as the flight vehicle, taking the risk away from pilots with a reduction to the cost of operation. Currently, existing aerial camera systems cannot provide wide angle and high resolution imagery from a UAV. Utilizing proven, state-of-the-art imaging methods and off-the-shelf components, a versatile and reliable camera system was developed by VisionMap Ltd. The camera, MIST, is a lightweight, high resolution, digital vertically and oblique-looking, photogrammetric-certified payload for tactical unmanned aircraft systems (T-UAS). Evaluation of the MIST was carried out by collaboration between West Virginia University researchers and VisionMap of Israel. An experiment was performed to collect high resolution 3D imagery, determine the accuracy of coordinates using known ground points, and to test the function of the camera using the MIST over Morgantown, WV, home of West Virginia University. Results were a set of very high 3D resolution images and high accuracy mapping points. This paper will discuss the current state-of-the-art-camera systems capable of UAV operation, the uniqueness and functionality of MIST, and the experiment performed at WVU using MIST.","PeriodicalId":228322,"journal":{"name":"2011 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126938990","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-12-19DOI: 10.1109/THS.2011.6107881
A. Crawford, A. Percival, V. Crowe
Defence Research and Development Canada has recently wrapped up a 4-year project to demonstrate an integrated system for force protection in harbours, the Canadian Underwater Protection System (CUwPS). The intention of the Maritime Force Protection Technology Demonstration Project was to provide advice to the Canadian Navy on countering underwater threats to ships (divers, swimmers, AUVs) in harbours and anchorages. The project program was designed around a series of trials, which included a major international trial in Sydney, Australia, in February 2009, an evaluation for potential use in security measures for the 2010 Winter Olympics and participation in exercises prior to and during the International Fleet Review and Royal visit in July 2010. The CUwPS itself is comprised of COTS equipment with modest integration. A critical aspect of the CUwPS concept of operations is the requirement to positively identify threats that have been flagged by a wide-area-coverage diver detection sonar system. This is accomplished by tasking a response boat outfitted with a high resolution imaging sonar to investigate contacts or areas and if appropriate, to issue loud-hailer warnings. During the trials conducted through the course of the MFP TDP, several different small imaging sonars were tested for this identification role, with varying degrees of success. Assessment of the performance of the imaging sonars has been undertaken with the goal of obtaining an objective measure of the suitability of any one sonar for the identification task. The results of this assessment exercise will be presented along with some lessons learned.
{"title":"Use of small imaging sonars for diver identification","authors":"A. Crawford, A. Percival, V. Crowe","doi":"10.1109/THS.2011.6107881","DOIUrl":"https://doi.org/10.1109/THS.2011.6107881","url":null,"abstract":"Defence Research and Development Canada has recently wrapped up a 4-year project to demonstrate an integrated system for force protection in harbours, the Canadian Underwater Protection System (CUwPS). The intention of the Maritime Force Protection Technology Demonstration Project was to provide advice to the Canadian Navy on countering underwater threats to ships (divers, swimmers, AUVs) in harbours and anchorages. The project program was designed around a series of trials, which included a major international trial in Sydney, Australia, in February 2009, an evaluation for potential use in security measures for the 2010 Winter Olympics and participation in exercises prior to and during the International Fleet Review and Royal visit in July 2010. The CUwPS itself is comprised of COTS equipment with modest integration. A critical aspect of the CUwPS concept of operations is the requirement to positively identify threats that have been flagged by a wide-area-coverage diver detection sonar system. This is accomplished by tasking a response boat outfitted with a high resolution imaging sonar to investigate contacts or areas and if appropriate, to issue loud-hailer warnings. During the trials conducted through the course of the MFP TDP, several different small imaging sonars were tested for this identification role, with varying degrees of success. Assessment of the performance of the imaging sonars has been undertaken with the goal of obtaining an objective measure of the suitability of any one sonar for the identification task. The results of this assessment exercise will be presented along with some lessons learned.","PeriodicalId":228322,"journal":{"name":"2011 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"123 8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126127021","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-12-19DOI: 10.1109/THS.2011.6107899
Ron Bentley
Results from comprehensive testing of two prototype dual-energy (6 and 9 MeV) cargo inspection systems provide large databases of signature information of various high atomic number objects (active interrogation benchmarks) hidden in representative cargos. Test objects were fabricated from lead, tungsten and uranium ranging in size from 75 to 430,000 cm3. ISO containers were filled with eighteen selected cargos that varied in density and complexity. These databases, collected by the Domestic Nuclear Detection Office Cargo Advanced Automated Radiography System (CAARS) Program, provide a rich source of signature information that can be used to develop automated and user-assist detection algorithms.
{"title":"Database of high-Z signatures in cargo","authors":"Ron Bentley","doi":"10.1109/THS.2011.6107899","DOIUrl":"https://doi.org/10.1109/THS.2011.6107899","url":null,"abstract":"Results from comprehensive testing of two prototype dual-energy (6 and 9 MeV) cargo inspection systems provide large databases of signature information of various high atomic number objects (active interrogation benchmarks) hidden in representative cargos. Test objects were fabricated from lead, tungsten and uranium ranging in size from 75 to 430,000 cm3. ISO containers were filled with eighteen selected cargos that varied in density and complexity. These databases, collected by the Domestic Nuclear Detection Office Cargo Advanced Automated Radiography System (CAARS) Program, provide a rich source of signature information that can be used to develop automated and user-assist detection algorithms.","PeriodicalId":228322,"journal":{"name":"2011 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129914906","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-12-19DOI: 10.1109/THS.2011.6107902
Jeffrey Gennari, David French
Determining whether arbitrary files are related to known malicious files is often useful in network and host-based defense. Doing so can give network defenders sufficient exemplars of a particular threat to develop comprehensive signatures and heuristics for identifying the threat, leading to decreased response time and improved prevention of a cyber attack. Identifying these malicious families is a complex process involving the categorization of potentially malicious code into sets that share similar features, while being distinguishable from unrelated threats or non-malicious code. Current methods for automatically or manually describing malware families are typically unable to distinguish between indicators derived from the structure of the malware and indicators derived from the behavior of the malware. Further, attempts to cluster potentially related files by mapping them into alternate domains, including histograms, fuzzy hashes, Bloom filters, and so on often produces clusters of files solely derived from structural information. These similarity measurements are often very effective on crudely similar files, yet they fail to identify files that have similar or identical behavior and semantics. We propose an analytic method, driven largely by human experience and based on objective criteria, for assigning arbitrary files membership in a malicious code family. We describe a process for iteratively refining the criteria used to select a malicious code family, until such criteria described are both necessary and sufficient to distinguish a particular malicious code family. We contrast this process with similar processes, such as antivirus signature generation and automatic and blind classification methods. We formalize this process to describe a roadmap for practitioners of malicious code analysis and to highlight opportunities for improvement and automation of both the process and the observation of relevant criteria. Finally, we provide experimental results of applying this methodology to real-world malware.
{"title":"Defining malware families based on analyst insights","authors":"Jeffrey Gennari, David French","doi":"10.1109/THS.2011.6107902","DOIUrl":"https://doi.org/10.1109/THS.2011.6107902","url":null,"abstract":"Determining whether arbitrary files are related to known malicious files is often useful in network and host-based defense. Doing so can give network defenders sufficient exemplars of a particular threat to develop comprehensive signatures and heuristics for identifying the threat, leading to decreased response time and improved prevention of a cyber attack. Identifying these malicious families is a complex process involving the categorization of potentially malicious code into sets that share similar features, while being distinguishable from unrelated threats or non-malicious code. Current methods for automatically or manually describing malware families are typically unable to distinguish between indicators derived from the structure of the malware and indicators derived from the behavior of the malware. Further, attempts to cluster potentially related files by mapping them into alternate domains, including histograms, fuzzy hashes, Bloom filters, and so on often produces clusters of files solely derived from structural information. These similarity measurements are often very effective on crudely similar files, yet they fail to identify files that have similar or identical behavior and semantics. We propose an analytic method, driven largely by human experience and based on objective criteria, for assigning arbitrary files membership in a malicious code family. We describe a process for iteratively refining the criteria used to select a malicious code family, until such criteria described are both necessary and sufficient to distinguish a particular malicious code family. We contrast this process with similar processes, such as antivirus signature generation and automatic and blind classification methods. We formalize this process to describe a roadmap for practitioners of malicious code analysis and to highlight opportunities for improvement and automation of both the process and the observation of relevant criteria. Finally, we provide experimental results of applying this methodology to real-world malware.","PeriodicalId":228322,"journal":{"name":"2011 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116206185","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-12-19DOI: 10.1109/THS.2011.6107905
D. Pepyne, David J. McLaughlin, David Westbrook, Eric J. Lyons, Eric J. Knapp, S. Frasier, Michael Zink
The present inability to detect low-flying aircraft over international borders renders governments and citizens vulnerable to problems such as drug trafficking and illegal immigration. This paper describes an approach to comprehensive low-altitude surveillance based on networks of small radars being developed by the NSF Engineering Research Center for Collaborative Adaptive Sensing of the Atmosphere. We examine how low-cost networked radar technology might be applied to the public safety/security problem of detecting weather hazards while simultaneously supporting the border security mission of detecting and intercepting low-flying aircraft.
{"title":"Dense radar networks for low-flyer surveillance","authors":"D. Pepyne, David J. McLaughlin, David Westbrook, Eric J. Lyons, Eric J. Knapp, S. Frasier, Michael Zink","doi":"10.1109/THS.2011.6107905","DOIUrl":"https://doi.org/10.1109/THS.2011.6107905","url":null,"abstract":"The present inability to detect low-flying aircraft over international borders renders governments and citizens vulnerable to problems such as drug trafficking and illegal immigration. This paper describes an approach to comprehensive low-altitude surveillance based on networks of small radars being developed by the NSF Engineering Research Center for Collaborative Adaptive Sensing of the Atmosphere. We examine how low-cost networked radar technology might be applied to the public safety/security problem of detecting weather hazards while simultaneously supporting the border security mission of detecting and intercepting low-flying aircraft.","PeriodicalId":228322,"journal":{"name":"2011 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128634632","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-12-19DOI: 10.1109/THS.2011.6107907
D. B. Megherbi, D. Xu
In many counterterrorism applications there is a need to protect Critical Key Infrastructures and Resources (CKIR) such as transportation systems, aviation, highway, maritime transportation, to name a few. In many of these applications, there is a need to secure hundreds of thousands to millions of miles of roadways and/or airways. To achieve the monitoring of such large CKIR systems there is a need to develop intelligent geographically and computationally distributed multi-agent based monitoring systems. The main focus of this paper is on issues related to agent scheduling in such a large multi-agent distributed system. We propose an architecture for the distributed dynamic agent communication based on the Message Passing Interface (MPI) and a dynamic scheduling algorithm. The goal of the proposed dynamic multi-agent multi-node data-aware scheduling algorithm is to minimize the system total execution time of the agents by dynamically balancing the computational load among different distributed nodes while scheduling the agents to run as much as possible on the computational nodes where data information, that the agents need to perform/finish their tasks, reside. The desired aim is to reduce data transfer overhead and latency, and therefore increase the overall system computational performance.
{"title":"Multi-agent distributed dynamic scheduling for large distributed Critical Key Infrastructures and Resources (CKIR) surveillance and monitoring","authors":"D. B. Megherbi, D. Xu","doi":"10.1109/THS.2011.6107907","DOIUrl":"https://doi.org/10.1109/THS.2011.6107907","url":null,"abstract":"In many counterterrorism applications there is a need to protect Critical Key Infrastructures and Resources (CKIR) such as transportation systems, aviation, highway, maritime transportation, to name a few. In many of these applications, there is a need to secure hundreds of thousands to millions of miles of roadways and/or airways. To achieve the monitoring of such large CKIR systems there is a need to develop intelligent geographically and computationally distributed multi-agent based monitoring systems. The main focus of this paper is on issues related to agent scheduling in such a large multi-agent distributed system. We propose an architecture for the distributed dynamic agent communication based on the Message Passing Interface (MPI) and a dynamic scheduling algorithm. The goal of the proposed dynamic multi-agent multi-node data-aware scheduling algorithm is to minimize the system total execution time of the agents by dynamically balancing the computational load among different distributed nodes while scheduling the agents to run as much as possible on the computational nodes where data information, that the agents need to perform/finish their tasks, reside. The desired aim is to reduce data transfer overhead and latency, and therefore increase the overall system computational performance.","PeriodicalId":228322,"journal":{"name":"2011 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128018798","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-12-19DOI: 10.1109/THS.2011.6107845
N. Carson
Those responsible for the Maritime Security of North America face a daunting task. The breadth of activities in the maritime domain makes it very difficult to achieve an acceptable level of understanding and control. This leaves decision makers to deal with a multi-national challenge that is very much connected to the aerospace, land and cyberspace domains. In order for the decision makers responsible for the Maritime Security and Defense of North America to effectively execute their missions, they require both an understanding of their current capabilities and gaps, and a means to determine the capability requirements to close any identified gaps. This paper presents the Maritime Timeline Analysis and Requirements Toolset (M-TART) as a modeling and simulation solution to address this problem. The M-TART is a deterministic, scenario-based model that accounts for the various states of the maritime event timeline and provides decision makers with statistical and graphical information regarding current capabilities and gaps.
{"title":"Modeling and simulation in support of understanding maritime security and defense capabilities and requirements (The maritime timeline and analysis requirements toolset (M-TART))","authors":"N. Carson","doi":"10.1109/THS.2011.6107845","DOIUrl":"https://doi.org/10.1109/THS.2011.6107845","url":null,"abstract":"Those responsible for the Maritime Security of North America face a daunting task. The breadth of activities in the maritime domain makes it very difficult to achieve an acceptable level of understanding and control. This leaves decision makers to deal with a multi-national challenge that is very much connected to the aerospace, land and cyberspace domains. In order for the decision makers responsible for the Maritime Security and Defense of North America to effectively execute their missions, they require both an understanding of their current capabilities and gaps, and a means to determine the capability requirements to close any identified gaps. This paper presents the Maritime Timeline Analysis and Requirements Toolset (M-TART) as a modeling and simulation solution to address this problem. The M-TART is a deterministic, scenario-based model that accounts for the various states of the maritime event timeline and provides decision makers with statistical and graphical information regarding current capabilities and gaps.","PeriodicalId":228322,"journal":{"name":"2011 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"2015 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132522539","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-12-19DOI: 10.1109/THS.2011.6107874
L. Ungar, S. Leibholz, C. Chaski
IntentFinder is a computational method of extracting mutually relevant information from a large collection of narrative data. We describe an approach that takes advantage of a new view of documents as coming from evolving stories. IntentFinder consists of six main components: 1) A document management system 2) A story extraction system 3) A significance determination system 4) A reputation management 5) A lexical-semantic analysis 6) A user interface In addition a method has been found for quantitatively determining the topology and hierarchy of a social subnetwork embedded inside a very noisy self-reorganizing network (e.g., the Internet). All these components will work together to allow analysts to discover and understand events and stories implicit in collections of documents, including newswire, reports, emails and tweets, which would be prohibitively difficult to uncover manually, and ultimately estimating the organizational structure of a social network.
{"title":"IntentFinder: A system for discovering significant information implicit in large, heterogeneous document collections and computationally mapping social networks and command nodes","authors":"L. Ungar, S. Leibholz, C. Chaski","doi":"10.1109/THS.2011.6107874","DOIUrl":"https://doi.org/10.1109/THS.2011.6107874","url":null,"abstract":"IntentFinder is a computational method of extracting mutually relevant information from a large collection of narrative data. We describe an approach that takes advantage of a new view of documents as coming from evolving stories. IntentFinder consists of six main components: 1) A document management system 2) A story extraction system 3) A significance determination system 4) A reputation management 5) A lexical-semantic analysis 6) A user interface In addition a method has been found for quantitatively determining the topology and hierarchy of a social subnetwork embedded inside a very noisy self-reorganizing network (e.g., the Internet). All these components will work together to allow analysts to discover and understand events and stories implicit in collections of documents, including newswire, reports, emails and tweets, which would be prohibitively difficult to uncover manually, and ultimately estimating the organizational structure of a social network.","PeriodicalId":228322,"journal":{"name":"2011 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"417 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124392797","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}