首页 > 最新文献

2011 IEEE International Conference on Technologies for Homeland Security (HST)最新文献

英文 中文
Common framework to evaluate modern embedded systems against side-channel attacks 评估现代嵌入式系统对抗侧信道攻击的通用框架
Pub Date : 2011-12-19 DOI: 10.1109/THS.2011.6107852
Youssef Souissi, S. Guilley, S. Bhasin, J. Danger
Modern embedded systems rely on cryptographic co-processors to ensure security. These cryptographic coprocessors are theoretically secure but their physical implementations are vulnerable against Side-Channel Attacks (SCA). This paper puts forward a methodology to evaluate the robustness of embedded systems against such attacks and therefore enhance user trust. We propose an evaluation framework composed of five distinct phases which are characterization, simulation, acquisition, pre-processing and analysis. The paper will also highlight common pitfalls made by evaluators and their solutions.
现代嵌入式系统依靠加密协处理器来确保安全性。这些加密协处理器在理论上是安全的,但它们的物理实现容易受到侧信道攻击(SCA)的攻击。本文提出了一种方法来评估嵌入式系统对此类攻击的鲁棒性,从而提高用户信任。我们提出了一个由表征、仿真、采集、预处理和分析五个不同阶段组成的评估框架。本文还将重点介绍评价者常犯的陷阱及其解决方法。
{"title":"Common framework to evaluate modern embedded systems against side-channel attacks","authors":"Youssef Souissi, S. Guilley, S. Bhasin, J. Danger","doi":"10.1109/THS.2011.6107852","DOIUrl":"https://doi.org/10.1109/THS.2011.6107852","url":null,"abstract":"Modern embedded systems rely on cryptographic co-processors to ensure security. These cryptographic coprocessors are theoretically secure but their physical implementations are vulnerable against Side-Channel Attacks (SCA). This paper puts forward a methodology to evaluate the robustness of embedded systems against such attacks and therefore enhance user trust. We propose an evaluation framework composed of five distinct phases which are characterization, simulation, acquisition, pre-processing and analysis. The paper will also highlight common pitfalls made by evaluators and their solutions.","PeriodicalId":228322,"journal":{"name":"2011 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"735 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125256196","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A counter-IED preparedness methodology for large event planning 大型事件策划的反简易爆炸装置准备方法
Pub Date : 2011-12-19 DOI: 10.1109/THS.2011.6107868
Patricia W. Payne, D. Koch
Since 2009, Oak Ridge National Laboratory (ORNL) has been involved in a project sponsored by the Department of Homeland Security Science and Technology Directorate aimed at improving preparedness against Improvised Explosive Devices (IED) at large sporting events. Led by the University of Southern Mississippi (USM) as part of the Southeast Region Research Initiative, the project partners have been developing tools and methodologies for use by security personnel and first responders at sports stadiums. ORNL's contribution has been to develop an automated process to gather and organize disparate data that is usually part of an organization's security plan. The organized data informs a table-top exercise (TTX) conducted by USM using additional tools developed by them and their subcontractors. After participating in several pilot TTXs, patterns are beginning to emerge that would enable improvements to be formulated to increase the level of counter-IED preparedness. This paper focuses on the data collection and analysis process and shares insights gained to date.
自2009年以来,橡树岭国家实验室(ORNL)参与了一项由国土安全部科学技术局赞助的项目,旨在提高对大型体育赛事中简易爆炸装置(IED)的防范能力。作为东南地区研究计划的一部分,由南密西西比大学(USM)领导,项目合作伙伴一直在开发供体育场馆安保人员和急救人员使用的工具和方法。ORNL的贡献是开发了一个自动化的过程来收集和组织不同的数据,这些数据通常是组织安全计划的一部分。整理后的数据通知USM使用他们及其分包商开发的附加工具进行桌面练习(TTX)。在参加了几次ttx试点后,开始出现能够制定改进措施以提高反简易爆炸装置防备水平的模式。本文重点介绍了数据收集和分析过程,并分享了迄今为止获得的见解。
{"title":"A counter-IED preparedness methodology for large event planning","authors":"Patricia W. Payne, D. Koch","doi":"10.1109/THS.2011.6107868","DOIUrl":"https://doi.org/10.1109/THS.2011.6107868","url":null,"abstract":"Since 2009, Oak Ridge National Laboratory (ORNL) has been involved in a project sponsored by the Department of Homeland Security Science and Technology Directorate aimed at improving preparedness against Improvised Explosive Devices (IED) at large sporting events. Led by the University of Southern Mississippi (USM) as part of the Southeast Region Research Initiative, the project partners have been developing tools and methodologies for use by security personnel and first responders at sports stadiums. ORNL's contribution has been to develop an automated process to gather and organize disparate data that is usually part of an organization's security plan. The organized data informs a table-top exercise (TTX) conducted by USM using additional tools developed by them and their subcontractors. After participating in several pilot TTXs, patterns are beginning to emerge that would enable improvements to be formulated to increase the level of counter-IED preparedness. This paper focuses on the data collection and analysis process and shares insights gained to date.","PeriodicalId":228322,"journal":{"name":"2011 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116608968","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Criterra automatic location planning 自动定位规划
Pub Date : 2011-12-19 DOI: 10.1109/THS.2011.6107873
Lawrence Cassenti, P.E. Peter Leed
Criterra is a software suite that automatically determines optimum locations and heights in seconds/minutes for security system sensors, and locations for infrastructure and response forces based on dominant mosaic, line-of-sight, time-and-space, Doppler, propagation and other algorithms, executed on a terabyte size 3D geospatial and object database. Inputs include specifications of sensor systems, barriers, and response forces. Criterra is based on a methodology that integrates intelligence and scientific processes to quickly and automatically determine optimum locations that are NOT trial-and error. Criterra Automatically calculates: 1) threat paths and predicted locations, 2) the optimal locations for the minimum number of minimum height sensor towers, mobile sensors, and/or unattended ground sensors, and communication repeater towers to meet detection, surveillance and reconnaissance requirements considering predicted threat locations/levels within area use constraints, and 3) placements for fences, infrastructure and response forces within constraints to accomplish protection and interception with high degrees of confidence. The results are displayed on a visually rich and geospatially accurate 3D map which the user can navigate or use for computational model modifications, redefinition of constraints, and further analysis and planning. Criterra can be used now to support land and maritime border security threat, sensor, infrastructure, and response analysis and geospatial planning; physical security analysis and geospatial planning for protection of airports, seaports, military bases and other critical infrastructure; attack and disaster preparation, recovery, and response planning; and force management and collaboration using 3D maps with results of Criterra analyses as embedded mission data. Criterra performs geospatial analysis to predict threat location at specific times, and provides area use data for CONOPs and risk analysis. Criterra is used in requirements definitions, installations, training, operations, experimentation, and test and evaluation. Criterra can support analysis of small and extremely large areas and catastrophic events. Criterra is a predictive technique for pre-placing mobile or fixed resources; and locating and tasking first responders. It supports situational understanding, information management and data visualization on a 3D geospatially accurate laptop display. Users can use Criterra for information sharing, collaborative decision making and integrated/interoperable decision support where all users are referencing and plotting data on a shared 3D geospatial map. It can support decontamination and restoration strategies, approaches, and sensor placements following WMD events. Facilities, monuments, airports, seaports, transportation infrastructure, land and coastal borders, and ports of entry are all areas where Criterra computational models and Criterra analysis algorithms can be used to determine optimum locati
Criterra是一个软件套件,可以在几秒/分钟内自动确定安全系统传感器的最佳位置和高度,以及基础设施和响应部队的位置,这些位置基于主要的马赛克、视距、时空、多普勒、传播和其他算法,在tb大小的3D地理空间和对象数据库上执行。输入包括传感器系统、屏障和响应力的规格。Criterra基于一种集成了智能和科学流程的方法,可以快速、自动地确定最佳位置,而不是反复试验。自动计算:1)威胁路径和预测位置;2)考虑到区域使用限制内预测的威胁位置/级别,最小数量最小高度传感器塔、移动传感器和/或无人值守地面传感器和通信中继塔的最佳位置,以满足检测、监视和侦察要求;3)围栏的放置;基础设施和反应部队在有限的条件下以高度的信心完成保护和拦截。结果显示在视觉丰富和地理空间精确的3D地图上,用户可以导航或用于计算模型修改,重新定义约束,以及进一步的分析和规划。标准现在可用于支持陆地和海上边界安全威胁、传感器、基础设施和响应分析以及地理空间规划;机场、港口、军事基地等重要基础设施的物理安全分析和地理空间规划;攻击和灾难准备、恢复和响应计划;以及使用3D地图进行部队管理和协作,并将标准分析结果作为嵌入式任务数据。Criterra执行地理空间分析,以预测特定时间的威胁位置,并为CONOPs和风险分析提供区域使用数据。标准用于需求定义、安装、培训、操作、实验以及测试和评估。Criterra可以支持小型和超大区域以及灾难性事件的分析。准则是一种预先放置移动或固定资源的预测技术;定位和分配急救人员。它支持情景理解、信息管理和3D地理空间精确笔记本电脑显示器上的数据可视化。用户可以使用Criterra进行信息共享、协作决策和集成/互操作决策支持,所有用户都可以在共享的3D地理空间地图上引用和绘制数据。它可以支持大规模杀伤性武器事件后的去污和恢复战略、方法和传感器安置。设施、纪念碑、机场、海港、交通基础设施、陆地和沿海边界以及入境口岸都是可以使用Criterra计算模型和Criterra分析算法来确定最佳位置的领域。如今,标准计算模型和分析算法被用于规划地面监视和通信中继器的最佳位置,以保护关键基础设施、边界和港口。Criterra用于规划人员和设施资产的安全。Criterra数据库由两种类型的数据组成:1)一个区域的1平方米切片(大小仅受存储介质的限制),每个切片包含:纬度、经度、高度/海拔、地形组成、坡度、用途(如威胁、允许安装传感器、道路、资产等),来源于GIS数据(如DEM和DTM)和对象数据(如建筑物、基础设施、车辆等);2)雷达、摄像机、UGS、无线电、响应力和屏障规格。准则算法分析切片并为每个切片添加数据库,a)所有其他切片的视线连接性因素,以及b)所有其他切片的横向能力因素。
{"title":"Criterra automatic location planning","authors":"Lawrence Cassenti, P.E. Peter Leed","doi":"10.1109/THS.2011.6107873","DOIUrl":"https://doi.org/10.1109/THS.2011.6107873","url":null,"abstract":"Criterra is a software suite that automatically determines optimum locations and heights in seconds/minutes for security system sensors, and locations for infrastructure and response forces based on dominant mosaic, line-of-sight, time-and-space, Doppler, propagation and other algorithms, executed on a terabyte size 3D geospatial and object database. Inputs include specifications of sensor systems, barriers, and response forces. Criterra is based on a methodology that integrates intelligence and scientific processes to quickly and automatically determine optimum locations that are NOT trial-and error. Criterra Automatically calculates: 1) threat paths and predicted locations, 2) the optimal locations for the minimum number of minimum height sensor towers, mobile sensors, and/or unattended ground sensors, and communication repeater towers to meet detection, surveillance and reconnaissance requirements considering predicted threat locations/levels within area use constraints, and 3) placements for fences, infrastructure and response forces within constraints to accomplish protection and interception with high degrees of confidence. The results are displayed on a visually rich and geospatially accurate 3D map which the user can navigate or use for computational model modifications, redefinition of constraints, and further analysis and planning. Criterra can be used now to support land and maritime border security threat, sensor, infrastructure, and response analysis and geospatial planning; physical security analysis and geospatial planning for protection of airports, seaports, military bases and other critical infrastructure; attack and disaster preparation, recovery, and response planning; and force management and collaboration using 3D maps with results of Criterra analyses as embedded mission data. Criterra performs geospatial analysis to predict threat location at specific times, and provides area use data for CONOPs and risk analysis. Criterra is used in requirements definitions, installations, training, operations, experimentation, and test and evaluation. Criterra can support analysis of small and extremely large areas and catastrophic events. Criterra is a predictive technique for pre-placing mobile or fixed resources; and locating and tasking first responders. It supports situational understanding, information management and data visualization on a 3D geospatially accurate laptop display. Users can use Criterra for information sharing, collaborative decision making and integrated/interoperable decision support where all users are referencing and plotting data on a shared 3D geospatial map. It can support decontamination and restoration strategies, approaches, and sensor placements following WMD events. Facilities, monuments, airports, seaports, transportation infrastructure, land and coastal borders, and ports of entry are all areas where Criterra computational models and Criterra analysis algorithms can be used to determine optimum locati","PeriodicalId":228322,"journal":{"name":"2011 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117005003","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Real-time scalable resource tracking framework (DIORAMA): System description and experimentation 实时可扩展资源跟踪框架(DIORAMA):系统描述和实验
Pub Date : 2011-12-19 DOI: 10.1109/THS.2011.6107904
A. Ganz, Xunyi Yu, James M. Schafer, Graydon Lord
DIORAMA system assists the incident commander in the management of a mass casualty incident. This system is a mobile, scalable tool that can be deployed at a disaster scene to enable an offsite commander to visualize the location and condition of the casualties, the location and condition of available resources, to aid the evacuator on site to retrieve and evacuate the patients accordingly to their triage level. Our experimental results conducted with human subjects in a simulated disaster site show that the DIORAMA system can significantly reduce the evacuation time (up to 43%) when compared to paper based evacuation. This fact attests to the DIORAMA effectiveness in reducing the patients' mortality.
DIORAMA系统协助事故指挥官管理大规模伤亡事件。该系统是一种可移动、可扩展的工具,可以部署在灾难现场,使非现场指挥官能够可视化伤亡的位置和状况,以及可用资源的位置和状况,以帮助现场疏散人员根据他们的分类级别检索和疏散患者。我们在模拟灾难现场对人类受试者进行的实验结果表明,与基于纸张的疏散相比,DIORAMA系统可以显着减少疏散时间(高达43%)。这一事实证明了DIORAMA在降低患者死亡率方面的有效性。
{"title":"Real-time scalable resource tracking framework (DIORAMA): System description and experimentation","authors":"A. Ganz, Xunyi Yu, James M. Schafer, Graydon Lord","doi":"10.1109/THS.2011.6107904","DOIUrl":"https://doi.org/10.1109/THS.2011.6107904","url":null,"abstract":"DIORAMA system assists the incident commander in the management of a mass casualty incident. This system is a mobile, scalable tool that can be deployed at a disaster scene to enable an offsite commander to visualize the location and condition of the casualties, the location and condition of available resources, to aid the evacuator on site to retrieve and evacuate the patients accordingly to their triage level. Our experimental results conducted with human subjects in a simulated disaster site show that the DIORAMA system can significantly reduce the evacuation time (up to 43%) when compared to paper based evacuation. This fact attests to the DIORAMA effectiveness in reducing the patients' mortality.","PeriodicalId":228322,"journal":{"name":"2011 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"117 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117270715","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Modeling attacker-technology system interaction in transportation networks: P2I3-model 交通网络中攻击者-技术系统交互建模:p2i3模型
Pub Date : 2011-12-19 DOI: 10.1109/THS.2011.6107888
S. Tolba, L. Fiondella, R. Ammar, N. Lownes, S. Rajasekaran, J. Ivan, Qixing Wang
An important challenge for homeland security agencies is to properly understand the interaction between terrorists and the methods to protect and deter attacks on the transportation network. Examining the nature of these interactions can greatly assist the enhancement of existing technologies and guide the development of new ones. This interaction is complex, possessing numerous variables that affect potential outcomes. This paper presents the Perception Square Interaction Cube Model (P2I3-Model) to describe these interactions using the system dynamics approach. This model incorporates three participants: the homeland security agency, the attacker, and the real world. The HS-Agency-perception, Attacker-perception, and Real-world submodels respectively characterize these participants. These three interacting sub-models combine to form the system governing the participants' perceptions, behaviors, and actions. The model accepts a set of measurable inputs from the HS agency and produces quantitative outputs to guide the HS agency's protection planning, deployment, and strategic policy revision activities. Simulation results suggest that the probability of attack success from the perspectives of the HS agency and attacker can differ significantly. System uncertainties and intelligence efforts are the central factors influencing these probabilities.
国土安全机构面临的一个重要挑战是正确理解恐怖分子与保护和阻止交通网络攻击的方法之间的相互作用。研究这些相互作用的性质可以极大地帮助增强现有技术并指导新技术的开发。这种相互作用是复杂的,具有许多影响潜在结果的变量。本文提出了感知方交互立方体模型(p2i3模型)来描述这些使用系统动力学方法的交互。这个模型包含三个参与者:国土安全机构、攻击者和现实世界。hs - agent -perception子模型、attack -perception子模型和Real-world子模型分别描述了这些参与者的特征。这三个相互作用的子模型结合起来形成管理参与者的感知、行为和行动的系统。该模型接受HS机构的一组可测量的输入,并产生定量的输出,以指导HS机构的保护规划、部署和战略政策修订活动。仿真结果表明,从HS机构和攻击者的角度来看,攻击成功的概率可能存在显著差异。系统不确定性和情报工作是影响这些概率的主要因素。
{"title":"Modeling attacker-technology system interaction in transportation networks: P2I3-model","authors":"S. Tolba, L. Fiondella, R. Ammar, N. Lownes, S. Rajasekaran, J. Ivan, Qixing Wang","doi":"10.1109/THS.2011.6107888","DOIUrl":"https://doi.org/10.1109/THS.2011.6107888","url":null,"abstract":"An important challenge for homeland security agencies is to properly understand the interaction between terrorists and the methods to protect and deter attacks on the transportation network. Examining the nature of these interactions can greatly assist the enhancement of existing technologies and guide the development of new ones. This interaction is complex, possessing numerous variables that affect potential outcomes. This paper presents the Perception Square Interaction Cube Model (P2I3-Model) to describe these interactions using the system dynamics approach. This model incorporates three participants: the homeland security agency, the attacker, and the real world. The HS-Agency-perception, Attacker-perception, and Real-world submodels respectively characterize these participants. These three interacting sub-models combine to form the system governing the participants' perceptions, behaviors, and actions. The model accepts a set of measurable inputs from the HS agency and produces quantitative outputs to guide the HS agency's protection planning, deployment, and strategic policy revision activities. Simulation results suggest that the probability of attack success from the perspectives of the HS agency and attacker can differ significantly. System uncertainties and intelligence efforts are the central factors influencing these probabilities.","PeriodicalId":228322,"journal":{"name":"2011 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123236357","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Submerged explosives detection platforms using immunosensing technology 利用免疫传感技术的水下炸药探测平台
Pub Date : 2011-12-19 DOI: 10.1109/THS.2011.6107882
S. Veitch, R. Fratantonio, P. Egli, A. Hanson, A. Kusterbeck, P. Charles, J. Deschamps, André A. Adams
One of the most difficult aspects of maintaining port and maritime security is the detection, localization, and classification of submerged explosive devices, biochemical agents, and contraband including narcotics. The Explosives Ordnance Disposal (EOD) community has expressed the need for improved methods of detection to augment current capabilities. SubChem Systems Inc. and the U.S. Naval Research Laboratory (NRL) has been working to transition displacement-based immunosensing technology to a commercial system with application towards submerged munitions and contraband detection, classification, and localization. Immunosensing is based upon antibody specificity for a desired target. Funded by the Office of Naval Research, the partners have demonstrated using this technology as a means of chemical detection onboard a custom designed payload for an autonomous underwater vehicle (AUV). The NAVY Small Business Innovative Research (SBIR) program enabled SubChem Systems to provide a concept adaptation of the AUV payload to a diver held version for use in high clutter, low visibility, environments that present an added danger to EOD divers.
维护港口和海上安全最困难的方面之一是水下爆炸装置、生化制剂和包括麻醉品在内的违禁品的探测、定位和分类。爆炸物处理(EOD)界已经表示需要改进探测方法以增强现有能力。SubChem系统公司和美国海军研究实验室(NRL)一直致力于将基于位移的免疫传感技术转化为商业系统,应用于水下弹药和违禁品的探测、分类和定位。免疫感应是基于抗体特异性的期望目标。在美国海军研究办公室(Office of Naval Research)的资助下,合作伙伴展示了将该技术作为一种化学检测手段,搭载在一艘自主水下航行器(AUV)的定制有效载荷上。美国海军小企业创新研究(SBIR)项目使SubChem Systems公司能够将AUV有效载荷的概念调整为潜水员携带的版本,用于高杂波、低能见度、对EOD潜水员构成额外危险的环境。
{"title":"Submerged explosives detection platforms using immunosensing technology","authors":"S. Veitch, R. Fratantonio, P. Egli, A. Hanson, A. Kusterbeck, P. Charles, J. Deschamps, André A. Adams","doi":"10.1109/THS.2011.6107882","DOIUrl":"https://doi.org/10.1109/THS.2011.6107882","url":null,"abstract":"One of the most difficult aspects of maintaining port and maritime security is the detection, localization, and classification of submerged explosive devices, biochemical agents, and contraband including narcotics. The Explosives Ordnance Disposal (EOD) community has expressed the need for improved methods of detection to augment current capabilities. SubChem Systems Inc. and the U.S. Naval Research Laboratory (NRL) has been working to transition displacement-based immunosensing technology to a commercial system with application towards submerged munitions and contraband detection, classification, and localization. Immunosensing is based upon antibody specificity for a desired target. Funded by the Office of Naval Research, the partners have demonstrated using this technology as a means of chemical detection onboard a custom designed payload for an autonomous underwater vehicle (AUV). The NAVY Small Business Innovative Research (SBIR) program enabled SubChem Systems to provide a concept adaptation of the AUV payload to a diver held version for use in high clutter, low visibility, environments that present an added danger to EOD divers.","PeriodicalId":228322,"journal":{"name":"2011 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"94 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123482780","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Non-lethal ballistic system with point accuracy for facility and border security 非致命弹道系统,用于设施和边境安全
Pub Date : 2011-12-19 DOI: 10.1109/THS.2011.6107858
J. Widder, James Rascoe, Christopher A. Perhala
Few non-lethal systems are point accurate beyond 30 meters and also small, lightweight, and logistically simple to maintain in the field. Inaccuracy is principally due to the use of smooth bore launchers and aerodynamically unstable projectiles. Moreover, smokeless powder munitions require the use of manually operated weapons, which result in low rates of fire. To achieve higher rates of fire, pneumatic systems have been developed. However, their use is complicated as they require electric, gas, or diesel powered air compressors to refill the empty air bottles generated from use, or the storage and distribution of pre-filled bottles of gas. The weapon systems described here solve these problems. They use a novel solid propellant propulsion system to fire projectiles from rifled barrels. The design of the propulsion system results in far greater accuracy than the current state-of-the-art, consistent terminal effects, and enables semi automatic fires from a mechanically simple and lightweight launcher.
很少有非致命系统的点精度超过30米,而且体积小,重量轻,在战场上后勤维护简单。不精确主要是由于使用光滑膛发射装置和空气动力学不稳定的弹丸。此外,无烟火药弹药需要使用手动操作的武器,这导致射速低。为了达到更高的射速,气动系统得到了发展。然而,它们的使用是复杂的,因为它们需要电动,燃气或柴油驱动的空气压缩机来重新填充使用中产生的空空气瓶,或存储和分配预充好的气体瓶。这里描述的武器系统解决了这些问题。他们使用一种新型固体推进剂推进系统从膛线炮管发射炮弹。推进系统的设计比目前最先进的技术具有更高的精度,一致的终端效果,并且可以从机械简单和轻量级的发射器上实现半自动射击。
{"title":"Non-lethal ballistic system with point accuracy for facility and border security","authors":"J. Widder, James Rascoe, Christopher A. Perhala","doi":"10.1109/THS.2011.6107858","DOIUrl":"https://doi.org/10.1109/THS.2011.6107858","url":null,"abstract":"Few non-lethal systems are point accurate beyond 30 meters and also small, lightweight, and logistically simple to maintain in the field. Inaccuracy is principally due to the use of smooth bore launchers and aerodynamically unstable projectiles. Moreover, smokeless powder munitions require the use of manually operated weapons, which result in low rates of fire. To achieve higher rates of fire, pneumatic systems have been developed. However, their use is complicated as they require electric, gas, or diesel powered air compressors to refill the empty air bottles generated from use, or the storage and distribution of pre-filled bottles of gas. The weapon systems described here solve these problems. They use a novel solid propellant propulsion system to fire projectiles from rifled barrels. The design of the propulsion system results in far greater accuracy than the current state-of-the-art, consistent terminal effects, and enables semi automatic fires from a mechanically simple and lightweight launcher.","PeriodicalId":228322,"journal":{"name":"2011 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124796812","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
CHANNELS: An information flow modeling system to support planning and interoperability CHANNELS:支持计划和互操作性的信息流建模系统
Pub Date : 2011-12-19 DOI: 10.1109/THS.2011.6107864
Jean-Francois Cloutier, David G. Kamien, R. Desourdis
In order to manage security and disaster risk, government agencies and their partners need to share information. Having the tools and networks needed to transmit and receive information is vital, but even with these systems in place, information doesn't spontaneously flow as needed between people and/or systems. To achieve the required information sharing, the flow of information needs to be planned ahead of a critical incident and analyzed in order to reduce the risk of a communication breakdown. This paper will explain the role of CHANNELS, developed by Mind-Alliance Systems, information sharing planning (ISP) software to achieve enhanced operability and interoperability. CHANNELS supports information-sharing planning, capability assessment and training processes. CHANNELS (i) automatically generates information flow maps derived from profiling the information needs and sharing flows associated with tasks, (ii) detects/reports improperly defined elements, information flow gaps, and identifies weaknesses. It generates guidance to responders at all levels.
为了管理安全和灾害风险,政府机构及其合作伙伴需要共享信息。拥有传输和接收信息所需的工具和网络是至关重要的,但即使有了这些系统,信息也不会自发地在人和/或系统之间流动。为了实现所需的信息共享,需要在关键事件发生之前对信息流进行规划和分析,以降低通信中断的风险。本文将解释由Mind-Alliance Systems开发的信息共享规划(ISP)软件CHANNELS的作用,以实现增强的可操作性和互操作性。CHANNELS支持信息共享规划、能力评估和培训过程。CHANNELS (i)自动生成信息流图,该图来源于对与任务相关的信息需求和共享流的概要分析,(ii)检测/报告定义不当的元素、信息流缺口,并识别弱点。它为各级应急人员提供指导。
{"title":"CHANNELS: An information flow modeling system to support planning and interoperability","authors":"Jean-Francois Cloutier, David G. Kamien, R. Desourdis","doi":"10.1109/THS.2011.6107864","DOIUrl":"https://doi.org/10.1109/THS.2011.6107864","url":null,"abstract":"In order to manage security and disaster risk, government agencies and their partners need to share information. Having the tools and networks needed to transmit and receive information is vital, but even with these systems in place, information doesn't spontaneously flow as needed between people and/or systems. To achieve the required information sharing, the flow of information needs to be planned ahead of a critical incident and analyzed in order to reduce the risk of a communication breakdown. This paper will explain the role of CHANNELS, developed by Mind-Alliance Systems, information sharing planning (ISP) software to achieve enhanced operability and interoperability. CHANNELS supports information-sharing planning, capability assessment and training processes. CHANNELS (i) automatically generates information flow maps derived from profiling the information needs and sharing flows associated with tasks, (ii) detects/reports improperly defined elements, information flow gaps, and identifies weaknesses. It generates guidance to responders at all levels.","PeriodicalId":228322,"journal":{"name":"2011 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123708747","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Systems engineering approach to chemical biological and radiological detection system design 系统工程方法用于化学、生物和放射检测系统的设计
Pub Date : 2011-12-19 DOI: 10.1109/THS.2011.6107879
J. Risser, M. Saxon
The ability to design effective detection systems is critical to the development of systems to protect against and respond to chemical, biological, and radiological (CBR) attacks. Unfortunately, there are numerous examples of CBR detection systems being designed “in a vacuum,” without full consideration of threat and vulnerability assessments, or the proposed protection strategy and response plans that the detection system must support. The potential negative effects of this approach include systems that are excessively costly in the best case, and systems that fail to deliver the required detection performance while providing a false sense of security in the worst case. The solution to this problem is the application of systems engineering principles. As with any system, the critical foundation for the system design is requirements development. Requirements for CBR detection systems include, but are not limited to, the spectrum of threats to be detected, the required sensitivity and speed of detection for each threat, the allowable false alarm and false negative rates, and operations and maintenance (O&M) needs. The requirements form the basis of system architecture and component selection, and allow trade studies that support an optimal system design. The process continues through detailed system design and integration, and culminates with system commissioning, verification and validation, and O&M planning. This paper presents Battelle's systems engineering approach to CBR detection system design and discusses several aspects of detection systems including: • Similarities and differences between chemical, biological, and radiological detection systems • Difference in requirements for “detect to warn”, “detect to protect”, and “detect to treat” strategies • Detector selection options • Architecture options such as sampling systems to cost-effectively increase coverage or response speed, and use of “orthogonal” detectors or trigger and confirmatory detectors for false alarm reduction Also discussed are the role of modeling in requirements development and system design, as well as the importance of commissioning and testing to effective detection system performance.
设计有效的探测系统的能力对于防御和响应化学、生物和放射性(CBR)攻击的系统的发展至关重要。不幸的是,有许多CBR检测系统在“真空中”设计的例子,没有充分考虑威胁和脆弱性评估,也没有提出检测系统必须支持的保护策略和响应计划。这种方法的潜在负面影响包括:在最好的情况下,系统成本过高;在最坏的情况下,系统无法提供所需的检测性能,同时提供错误的安全感。解决这个问题的方法是应用系统工程原理。与任何系统一样,系统设计的关键基础是需求开发。CBR检测系统的要求包括但不限于要检测的威胁范围、每个威胁所需的灵敏度和检测速度、允许的假警报和假阴性率,以及操作和维护(O&M)需求。这些需求构成了系统架构和组件选择的基础,并允许进行支持最佳系统设计的贸易研究。该过程继续进行详细的系统设计和集成,并在系统调试、验证和确认以及O&M计划中达到高潮。本文介绍了巴特尔对CBR检测系统设计的系统工程方法,并讨论了检测系统的几个方面,包括:•化学、生物和放射检测系统之间的异同•“检测到警告”、“检测到保护”和“检测到治疗”策略要求的差异•探测器选择选项•架构选项,如采样系统,以经济有效地增加覆盖范围或响应速度;并讨论了建模在需求开发和系统设计中的作用,以及调试和测试对有效检测系统性能的重要性。
{"title":"Systems engineering approach to chemical biological and radiological detection system design","authors":"J. Risser, M. Saxon","doi":"10.1109/THS.2011.6107879","DOIUrl":"https://doi.org/10.1109/THS.2011.6107879","url":null,"abstract":"The ability to design effective detection systems is critical to the development of systems to protect against and respond to chemical, biological, and radiological (CBR) attacks. Unfortunately, there are numerous examples of CBR detection systems being designed “in a vacuum,” without full consideration of threat and vulnerability assessments, or the proposed protection strategy and response plans that the detection system must support. The potential negative effects of this approach include systems that are excessively costly in the best case, and systems that fail to deliver the required detection performance while providing a false sense of security in the worst case. The solution to this problem is the application of systems engineering principles. As with any system, the critical foundation for the system design is requirements development. Requirements for CBR detection systems include, but are not limited to, the spectrum of threats to be detected, the required sensitivity and speed of detection for each threat, the allowable false alarm and false negative rates, and operations and maintenance (O&M) needs. The requirements form the basis of system architecture and component selection, and allow trade studies that support an optimal system design. The process continues through detailed system design and integration, and culminates with system commissioning, verification and validation, and O&M planning. This paper presents Battelle's systems engineering approach to CBR detection system design and discusses several aspects of detection systems including: • Similarities and differences between chemical, biological, and radiological detection systems • Difference in requirements for “detect to warn”, “detect to protect”, and “detect to treat” strategies • Detector selection options • Architecture options such as sampling systems to cost-effectively increase coverage or response speed, and use of “orthogonal” detectors or trigger and confirmatory detectors for false alarm reduction Also discussed are the role of modeling in requirements development and system design, as well as the importance of commissioning and testing to effective detection system performance.","PeriodicalId":228322,"journal":{"name":"2011 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122010283","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
CSharp: Surreptitious standoff tagging and tracking system using passive nanotechnical transponders: A spiral research, development, test, engineering (RDTE) and production program 使用无源纳米技术应答器的秘密对峙标记和跟踪系统:一个螺旋研究、开发、测试、工程(RDTE)和生产计划
Pub Date : 2011-12-19 DOI: 10.1109/THS.2011.6107872
S. Leibholz, Michael J. Maston
We report the development and successful testing at TRL-5 of a persistent (no-batteries) Surreptitious tagging and tracking system for vehicles, containers and personnel which can be applied and monitored at a distance, requiring no batteries in the target transponder. The system employs a metamaterial consisting of quantities of a novel nanotechnical device (size depending on frequency) in random configuration, with tunable electrodynamic and aerodynamic properties, the latter providing correct geometry and intermolecular (van der Waals) adherence of the transponders to a target. The transponder cluster appears as a smudge of dirt to the naked eye and acts to retroreflect a properly-tuned interrogating laser narrowly to its source, with a brightness measured to exceed a sheet of white paper (a perfect Lambertian reflector) by about 10 dB. Unique ID of the target is feasible using a “bar code” in the wavelength or frequency domain and a multi-wavelength interrogation. CSharp is considered ready for engineering and low-rate initial production (LRIP). Present and future applications include homeland security, intelligence and counterintelligence, counterterrorism and law enforcement, as well as defense. Other applications that have been studied but not tested include “smart chaff” with controlled peek-through and aerodynamic dispersion properties, and application to signaling clouds of frequency-selective obscurants.
我们报告在TRL-5开发并成功测试了一种用于车辆、集装箱和人员的持久(无电池)秘密标记和跟踪系统,该系统可以在远距离应用和监控,目标应答器不需要电池。该系统采用了一种由大量随机配置的新型纳米技术器件(尺寸取决于频率)组成的超材料,具有可调的电动力学和空气动力学特性,后者提供了正确的几何形状和分子间(范德华)应答器与目标的粘附性。在肉眼看来,应答器星团就像一团污迹,它的作用是将经过适当调谐的询问激光反向反射到狭窄的光源处,其亮度比一张白纸(一个完美的兰伯反射器)高出约10db。利用波长或频域的“条形码”和多波长查询,可以实现目标的唯一ID。CSharp被认为已经准备好进行工程和低速率初始生产(LRIP)。目前和未来的应用包括国土安全,情报和反情报,反恐和执法,以及国防。其他已经研究但尚未测试的应用包括“智能箔条”,具有可控的穿透和空气动力学分散特性,以及应用于频率选择性遮挡物的信号云。
{"title":"CSharp: Surreptitious standoff tagging and tracking system using passive nanotechnical transponders: A spiral research, development, test, engineering (RDTE) and production program","authors":"S. Leibholz, Michael J. Maston","doi":"10.1109/THS.2011.6107872","DOIUrl":"https://doi.org/10.1109/THS.2011.6107872","url":null,"abstract":"We report the development and successful testing at TRL-5 of a persistent (no-batteries) Surreptitious tagging and tracking system for vehicles, containers and personnel which can be applied and monitored at a distance, requiring no batteries in the target transponder. The system employs a metamaterial consisting of quantities of a novel nanotechnical device (size depending on frequency) in random configuration, with tunable electrodynamic and aerodynamic properties, the latter providing correct geometry and intermolecular (van der Waals) adherence of the transponders to a target. The transponder cluster appears as a smudge of dirt to the naked eye and acts to retroreflect a properly-tuned interrogating laser narrowly to its source, with a brightness measured to exceed a sheet of white paper (a perfect Lambertian reflector) by about 10 dB. Unique ID of the target is feasible using a “bar code” in the wavelength or frequency domain and a multi-wavelength interrogation. CSharp is considered ready for engineering and low-rate initial production (LRIP). Present and future applications include homeland security, intelligence and counterintelligence, counterterrorism and law enforcement, as well as defense. Other applications that have been studied but not tested include “smart chaff” with controlled peek-through and aerodynamic dispersion properties, and application to signaling clouds of frequency-selective obscurants.","PeriodicalId":228322,"journal":{"name":"2011 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128008413","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2011 IEEE International Conference on Technologies for Homeland Security (HST)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1