首页 > 最新文献

2011 IEEE International Conference on Technologies for Homeland Security (HST)最新文献

英文 中文
Visualization, modeling and predictive analysis of cyber security attacks against cyber infrastructure-oriented systems 针对面向网络基础设施的系统的网络安全攻击的可视化、建模和预测分析
Pub Date : 2011-12-19 DOI: 10.1109/THS.2011.6107851
J. Walker, Travis Jones, R. Blount
Cyber security threats require rapid identification of imminent or potential attacks to support deterrence and protection. Thomas Friedman theorized that technology has leveled or “flattened” the global playing field that once existed. This flattening has happened as a result of what he calls the “triple convergence” of platform, process and people. However, there is a general lack of understanding about how to describe, assess the complex and dynamic nature of cyber security related information to improve overall cyber security task performance. Ever since the first computer virus traversed the Internet it has been apparent that attacks can spread rapidly across national boundaries. This paper presents research that utilize bioinformatics techniques, to forecast cyber security attacks by identifying emerging threats based on analysis of computer infection, and incursions models based on human disease models.
网络安全威胁需要快速识别迫在眉睫或潜在的攻击,以支持威慑和保护。托马斯·弗里德曼(Thomas Friedman)的理论认为,技术已经使曾经存在的全球竞争环境变得平坦或“扁平化”。这种扁平化是他所说的平台、流程和人员“三重融合”的结果。然而,人们普遍缺乏对如何描述、评估网络安全相关信息的复杂性和动态性以提高整体网络安全任务绩效的理解。自从第一个计算机病毒在互联网上传播以来,很明显,攻击可以跨越国界迅速传播。本文介绍了利用生物信息学技术来预测网络安全攻击的研究,通过分析计算机感染和基于人类疾病模型的入侵模型来识别新出现的威胁。
{"title":"Visualization, modeling and predictive analysis of cyber security attacks against cyber infrastructure-oriented systems","authors":"J. Walker, Travis Jones, R. Blount","doi":"10.1109/THS.2011.6107851","DOIUrl":"https://doi.org/10.1109/THS.2011.6107851","url":null,"abstract":"Cyber security threats require rapid identification of imminent or potential attacks to support deterrence and protection. Thomas Friedman theorized that technology has leveled or “flattened” the global playing field that once existed. This flattening has happened as a result of what he calls the “triple convergence” of platform, process and people. However, there is a general lack of understanding about how to describe, assess the complex and dynamic nature of cyber security related information to improve overall cyber security task performance. Ever since the first computer virus traversed the Internet it has been apparent that attacks can spread rapidly across national boundaries. This paper presents research that utilize bioinformatics techniques, to forecast cyber security attacks by identifying emerging threats based on analysis of computer infection, and incursions models based on human disease models.","PeriodicalId":228322,"journal":{"name":"2011 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"338 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116337511","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Phenomenological scattering analysis of an RF Area Secure Perimeter 射频区域安全周界的现象学散射分析
Pub Date : 2011-12-19 DOI: 10.1109/THS.2011.6107913
C. Rappaport, Y. Rodriguez-Vaqueiro, J. Martinez-Lorenzo, B. Gonzalez-Valdes, John Beaty, A. Morgenthaler, W. Naqvi
Surveillance of perimeters is essential, especially for critical infrastructure such as transportation hubs, power stations, chemical facilities and others. There are many approaches to perimeter surveillance, but most of these require large upfront investments. This investigation uses advanced electromagnetic modeling techniques with real human body geometries to establish the best set of detectable features using the Wireless Area Secure Perimeter (WASP) system geometry. Using the frequency, power level, network configuration, and antennas employed by WASP, predictions on limits to target recognition are presented, along with recommendations for system reconfiguration for improving target characterization.
对周边环境进行监控至关重要,尤其是对交通枢纽、发电站、化学设施等关键基础设施。周边监控有很多方法,但大多数都需要大量的前期投资。本研究使用先进的电磁建模技术和真实的人体几何形状,利用无线区域安全周界(WASP)系统几何形状建立最佳的可检测特征集。利用WASP使用的频率、功率水平、网络配置和天线,对目标识别的限制进行了预测,并提出了改进目标表征的系统重构建议。
{"title":"Phenomenological scattering analysis of an RF Area Secure Perimeter","authors":"C. Rappaport, Y. Rodriguez-Vaqueiro, J. Martinez-Lorenzo, B. Gonzalez-Valdes, John Beaty, A. Morgenthaler, W. Naqvi","doi":"10.1109/THS.2011.6107913","DOIUrl":"https://doi.org/10.1109/THS.2011.6107913","url":null,"abstract":"Surveillance of perimeters is essential, especially for critical infrastructure such as transportation hubs, power stations, chemical facilities and others. There are many approaches to perimeter surveillance, but most of these require large upfront investments. This investigation uses advanced electromagnetic modeling techniques with real human body geometries to establish the best set of detectable features using the Wireless Area Secure Perimeter (WASP) system geometry. Using the frequency, power level, network configuration, and antennas employed by WASP, predictions on limits to target recognition are presented, along with recommendations for system reconfiguration for improving target characterization.","PeriodicalId":228322,"journal":{"name":"2011 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"141 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123349141","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Attribution requirements for next generation Internets 下一代互联网的归属要求
Pub Date : 2011-12-19 DOI: 10.1109/THS.2011.6107894
Jeffrey Hunker, C. Gates, M. Bishop
The notion of attribution is usually tied to identity: the ability to associate the originator of something with that data. This notion is both a simplification of the myriad aspects of attribution, and a masking of many different types of attribution under the rubric of “identity.” Current efforts at attribution of data in the network focus either on traceback of packets or signing data at various network layers, and management of the keys involved. As the Internet evolves into the next generation network, and people implement testbeds to facilitate that evolution, they can design support mechanisms for other forms of attribution. What types of attribution should those mechanisms support? This paper presents requirements for attribution that will be useful both in the next generation infrastructure and in the data it manages.
归因的概念通常与身份联系在一起:将某些内容的创建者与该数据联系起来的能力。这个概念既简化了归因的无数方面,又在“身份”的标题下掩盖了许多不同类型的归因。当前网络中数据归属的工作集中在数据包的回溯或在各个网络层对数据进行签名,以及所涉及的密钥的管理。随着Internet向下一代网络演进,人们实现了促进这种演进的测试平台,他们可以为其他形式的归属设计支持机制。这些机制应该支持哪些类型的归因?本文提出了在下一代基础设施及其管理的数据中有用的归属要求。
{"title":"Attribution requirements for next generation Internets","authors":"Jeffrey Hunker, C. Gates, M. Bishop","doi":"10.1109/THS.2011.6107894","DOIUrl":"https://doi.org/10.1109/THS.2011.6107894","url":null,"abstract":"The notion of attribution is usually tied to identity: the ability to associate the originator of something with that data. This notion is both a simplification of the myriad aspects of attribution, and a masking of many different types of attribution under the rubric of “identity.” Current efforts at attribution of data in the network focus either on traceback of packets or signing data at various network layers, and management of the keys involved. As the Internet evolves into the next generation network, and people implement testbeds to facilitate that evolution, they can design support mechanisms for other forms of attribution. What types of attribution should those mechanisms support? This paper presents requirements for attribution that will be useful both in the next generation infrastructure and in the data it manages.","PeriodicalId":228322,"journal":{"name":"2011 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"135 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127379097","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Constrained classification for infrastructure threat assessment 基础设施威胁评估的约束分类
Pub Date : 2011-12-19 DOI: 10.1109/THS.2011.6107853
K. P. Lennox, L. Glascoe
Validated computer simulation is an important aspect of critical infrastructure vulnerability assessment. The high computational cost of such models limits the number of threat scenarios that may be directly evaluated, which leads to a need for statistical emulation to predict outcomes for additional scenarios. Our particular area of interest is statistical methods for emulating complex computer codes that predict if a particular tunnel/explosive configuration results in the breaching of an underground transportation tunnel. In this case, there is considerable a priori information as to the properties of this breach classification boundary. We propose a constrained classifier, in the form of a parametric support vector machine, that allows us to incorporate expert knowledge into the shape of the decision boundary. We demonstrate the effectiveness of this technique with both a simulation study and by applying the method to a tunnel breach data set. This analysis reveals that constrained classification can offer substantial benefits for small sample sizes. The technique may be used either to provide a final classification result in the face of extremely limited data or as an interim step to guide adaptive sampling.
验证计算机仿真是关键基础设施脆弱性评估的一个重要方面。这种模型的高计算成本限制了可以直接评估的威胁场景的数量,这导致需要统计模拟来预测其他场景的结果。我们特别感兴趣的领域是模拟复杂计算机代码的统计方法,这些代码可以预测特定的隧道/爆炸配置是否会导致地下运输隧道的破坏。在这种情况下,关于这个缺口分类边界的性质有相当多的先验信息。我们提出了一个约束分类器,以参数支持向量机的形式,允许我们将专家知识合并到决策边界的形状中。我们通过模拟研究和将该方法应用于隧道破口数据集来证明该技术的有效性。这一分析表明,约束分类可以为小样本量提供实质性的好处。该技术既可用于在数据极其有限的情况下提供最终分类结果,也可作为指导自适应采样的过渡步骤。
{"title":"Constrained classification for infrastructure threat assessment","authors":"K. P. Lennox, L. Glascoe","doi":"10.1109/THS.2011.6107853","DOIUrl":"https://doi.org/10.1109/THS.2011.6107853","url":null,"abstract":"Validated computer simulation is an important aspect of critical infrastructure vulnerability assessment. The high computational cost of such models limits the number of threat scenarios that may be directly evaluated, which leads to a need for statistical emulation to predict outcomes for additional scenarios. Our particular area of interest is statistical methods for emulating complex computer codes that predict if a particular tunnel/explosive configuration results in the breaching of an underground transportation tunnel. In this case, there is considerable a priori information as to the properties of this breach classification boundary. We propose a constrained classifier, in the form of a parametric support vector machine, that allows us to incorporate expert knowledge into the shape of the decision boundary. We demonstrate the effectiveness of this technique with both a simulation study and by applying the method to a tunnel breach data set. This analysis reveals that constrained classification can offer substantial benefits for small sample sizes. The technique may be used either to provide a final classification result in the face of extremely limited data or as an interim step to guide adaptive sampling.","PeriodicalId":228322,"journal":{"name":"2011 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121748829","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Predicting ethnicity and gender from iris texture 从虹膜纹理预测种族和性别
Pub Date : 2011-12-19 DOI: 10.1109/THS.2011.6107909
S. Lagree, K. Bowyer
Previous researchers have reported success in predicting ethnicity and in predicting gender from features of the iris texture. This paper is the first to consider both problems using similar experimental approaches. Contributions of this work include greater accuracy than previous work on predicting ethnicity from iris texture, empirical evidence that suggests that gender prediction is harder than ethnicity prediction, and empirical evidence that ethnicity prediction is more difficult for females than for males.
先前的研究人员已经成功地通过虹膜纹理的特征来预测种族和性别。本文首次使用类似的实验方法来考虑这两个问题。这项工作的贡献包括比以前从虹膜纹理预测种族的工作更高的准确性,经验证据表明性别预测比种族预测更难,经验证据表明种族预测对女性比男性更困难。
{"title":"Predicting ethnicity and gender from iris texture","authors":"S. Lagree, K. Bowyer","doi":"10.1109/THS.2011.6107909","DOIUrl":"https://doi.org/10.1109/THS.2011.6107909","url":null,"abstract":"Previous researchers have reported success in predicting ethnicity and in predicting gender from features of the iris texture. This paper is the first to consider both problems using similar experimental approaches. Contributions of this work include greater accuracy than previous work on predicting ethnicity from iris texture, empirical evidence that suggests that gender prediction is harder than ethnicity prediction, and empirical evidence that ethnicity prediction is more difficult for females than for males.","PeriodicalId":228322,"journal":{"name":"2011 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130850873","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 85
System-aware security for nuclear power systems 核电系统的系统感知安全
Pub Date : 2011-12-19 DOI: 10.1109/THS.2011.6107875
Rick A. Jones, Troy V. Nguyen, B. Horowitz
As shown in the recently publicized Stuxnet attack in Iran, there are significant threats of embedded infections by the producers of equipment that support our nations nuclear power plants that cannot be completely addressed by advancing perimeter security solutions. In this paper we layout a new systems engineering focused approach for addressing these threats: referred to as System-Aware Security for Nuclear Power Systems. This security architecture resides at the application layer and is based on smart reusable system security services. Furthermore, to show how such an architecture can enhance the security of nuclear power systems, this paper present a vision for this architectural formulation for a Nuclear Power Plant Turbine Control System.
正如最近公布的伊朗Stuxnet攻击所显示的那样,支持我们国家核电站的设备生产商存在嵌入式感染的重大威胁,这无法通过推进外围安全解决方案来完全解决。在本文中,我们提出了一种新的系统工程方法来解决这些威胁:称为核电系统的系统感知安全。这种安全体系结构位于应用层,基于智能可重用的系统安全服务。此外,为了展示这种体系结构如何提高核电系统的安全性,本文提出了核电厂涡轮控制系统的这种体系结构的构想。
{"title":"System-aware security for nuclear power systems","authors":"Rick A. Jones, Troy V. Nguyen, B. Horowitz","doi":"10.1109/THS.2011.6107875","DOIUrl":"https://doi.org/10.1109/THS.2011.6107875","url":null,"abstract":"As shown in the recently publicized Stuxnet attack in Iran, there are significant threats of embedded infections by the producers of equipment that support our nations nuclear power plants that cannot be completely addressed by advancing perimeter security solutions. In this paper we layout a new systems engineering focused approach for addressing these threats: referred to as System-Aware Security for Nuclear Power Systems. This security architecture resides at the application layer and is based on smart reusable system security services. Furthermore, to show how such an architecture can enhance the security of nuclear power systems, this paper present a vision for this architectural formulation for a Nuclear Power Plant Turbine Control System.","PeriodicalId":228322,"journal":{"name":"2011 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134229258","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Separating the baby from the bathwater: Toward a generic and practical framework for anonymization 从洗澡水中分离婴儿:走向一个通用和实用的匿名框架
Pub Date : 2011-12-19 DOI: 10.1109/THS.2011.6107839
S. Shapiro
Anonymization — the process of removing or otherwise transforming information so as to reduce the ability to associate it with an identifiable individual — has been much criticized of late, yet interest in it remains high in many quarters. Potential use cases, including those found in the homeland security domain, vary much more widely than those represented by the incidents that have cast doubt on anonymization's utility. Dealing with this variety effectively and efficiently, though, poses challenges. This paper will present a generic anonymization methodology for tabular textual data being developed by the Science and Technology Directorate of the Department of Homeland Security. This methodology views anonymization as a single, non-exclusive privacy risk control to be considered along with other potential controls. The anonymization process it describes is as much a programmatic risk management process as a technical one. It aims to make anonymization more of a systems engineering activity.
匿名化——删除或以其他方式转换信息的过程,以减少将其与可识别的个人联系起来的能力——最近受到了很多批评,但许多方面对它的兴趣仍然很高。潜在的用例,包括那些在国土安全领域发现的用例,比那些对匿名化的效用产生怀疑的事件所代表的用例差异要大得多。然而,有效和高效地处理这种多样性带来了挑战。本文将介绍国土安全部科学技术局正在开发的表格文本数据的通用匿名化方法。这种方法将匿名化视为一种单一的、非排他性的隐私风险控制,要与其他潜在的控制一起考虑。它所描述的匿名化过程既是一个程序化的风险管理过程,也是一个技术过程。它的目标是使匿名化更多地成为一种系统工程活动。
{"title":"Separating the baby from the bathwater: Toward a generic and practical framework for anonymization","authors":"S. Shapiro","doi":"10.1109/THS.2011.6107839","DOIUrl":"https://doi.org/10.1109/THS.2011.6107839","url":null,"abstract":"Anonymization — the process of removing or otherwise transforming information so as to reduce the ability to associate it with an identifiable individual — has been much criticized of late, yet interest in it remains high in many quarters. Potential use cases, including those found in the homeland security domain, vary much more widely than those represented by the incidents that have cast doubt on anonymization's utility. Dealing with this variety effectively and efficiently, though, poses challenges. This paper will present a generic anonymization methodology for tabular textual data being developed by the Science and Technology Directorate of the Department of Homeland Security. This methodology views anonymization as a single, non-exclusive privacy risk control to be considered along with other potential controls. The anonymization process it describes is as much a programmatic risk management process as a technical one. It aims to make anonymization more of a systems engineering activity.","PeriodicalId":228322,"journal":{"name":"2011 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115003567","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Enabling distributed command and control with standards-based geospatial collaboration 通过基于标准的地理空间协作实现分布式命令和控制
Pub Date : 2011-12-19 DOI: 10.1109/THS.2011.6107921
Ray Di Ciaccio, J. Pullen, P. Breimyer
Large-scale disasters present significant incident management challenges due to their size and complexity. Organizations often introduce distinct Concepts of Operations (CONOPs), resources, and tools. Collecting and disseminating real-time information across all responders and organizations presents a difficult, but urgent, technical problem, exemplified by the responses to the 2010 Deep Water Horizon oil spill and the 2011 9.0 magnitude earthquake and ensuing tsunami in Japan. Web-based application capabilities have matured significantly and can provide a distributed, feature-rich, and standards-based collaboration environment for First Responders. This paper describes the Next-Generation Incident Command System (NICS), formerly the Lincoln Distributed Disaster Response System (LDDRS), an open, non-proprietary, distributed, scalable, web-based situational awareness system for First Responders. NICS is developed by MIT Lincoln Laboratory (MIT LL), in partnership with the California Department of Forestry and Fire Protection (CAL FIRE), under the sponsorship of the Department of Homeland Security Science & Technology Directorate (S&T).
大规模灾难由于其规模和复杂性,给事件管理带来了重大挑战。组织经常引入不同的操作概念(CONOPs)、资源和工具。在所有响应者和组织中收集和传播实时信息是一个困难但紧迫的技术问题,2010年深水地平线漏油事件和2011年日本9.0级地震及随后的海啸的响应就是一个例子。基于web的应用程序功能已经非常成熟,可以为First Responders提供一个分布式的、功能丰富的、基于标准的协作环境。本文介绍了下一代事件指挥系统(NICS),即林肯分布式灾难响应系统(LDDRS),这是一种开放的、非专有的、分布式的、可扩展的、基于网络的第一响应者态势感知系统。NICS由麻省理工学院林肯实验室(MIT LL)与加州林业和消防部(CAL Fire)合作开发,在国土安全部科学与技术局(S&T)的赞助下。
{"title":"Enabling distributed command and control with standards-based geospatial collaboration","authors":"Ray Di Ciaccio, J. Pullen, P. Breimyer","doi":"10.1109/THS.2011.6107921","DOIUrl":"https://doi.org/10.1109/THS.2011.6107921","url":null,"abstract":"Large-scale disasters present significant incident management challenges due to their size and complexity. Organizations often introduce distinct Concepts of Operations (CONOPs), resources, and tools. Collecting and disseminating real-time information across all responders and organizations presents a difficult, but urgent, technical problem, exemplified by the responses to the 2010 Deep Water Horizon oil spill and the 2011 9.0 magnitude earthquake and ensuing tsunami in Japan. Web-based application capabilities have matured significantly and can provide a distributed, feature-rich, and standards-based collaboration environment for First Responders. This paper describes the Next-Generation Incident Command System (NICS), formerly the Lincoln Distributed Disaster Response System (LDDRS), an open, non-proprietary, distributed, scalable, web-based situational awareness system for First Responders. NICS is developed by MIT Lincoln Laboratory (MIT LL), in partnership with the California Department of Forestry and Fire Protection (CAL FIRE), under the sponsorship of the Department of Homeland Security Science & Technology Directorate (S&T).","PeriodicalId":228322,"journal":{"name":"2011 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130150308","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Technology transition of network defense visual analytics: Lessons learned from case studies 网络防御可视化分析的技术转型:案例研究的经验教训
Pub Date : 2011-12-19 DOI: 10.1109/THS.2011.6107916
B. O'Brien, A. D'Amico, Mark Larkin
Despite more than a decade of significant government investment in network defense research and technology development, there have been relatively few successful transitions across the chasm between research and operational use. Prior work describes approaches to crossing the “valley of death” from the perspective of the government sponsor or independent tester. The researcher and developer's perspective offered in this paper adds to our understanding of the challenges faced and solutions applied to deployment of advanced technologies into operational environments. The paper describes lessons learned from recent transitions of two information assurance technologies — the VIAssist® netflow visualization tool and the MeerCAT® wireless vulnerability analysis tool — into operational use by the Department of Homeland Security (DHS) and the Department of Defense (DoD).
尽管十多年来,政府在网络防御研究和技术开发方面进行了大量投资,但在研究和作战使用之间的鸿沟上,成功的过渡相对较少。先前的工作描述了从政府赞助者或独立测试者的角度跨越“死亡之谷”的方法。本文提供的研究人员和开发人员的观点增加了我们对将先进技术部署到操作环境中所面临的挑战和解决方案的理解。本文描述了从最近两种信息保障技术(VIAssist®netflow可视化工具和MeerCAT®无线漏洞分析工具)过渡到国土安全部(DHS)和国防部(DoD)实际使用的经验教训。
{"title":"Technology transition of network defense visual analytics: Lessons learned from case studies","authors":"B. O'Brien, A. D'Amico, Mark Larkin","doi":"10.1109/THS.2011.6107916","DOIUrl":"https://doi.org/10.1109/THS.2011.6107916","url":null,"abstract":"Despite more than a decade of significant government investment in network defense research and technology development, there have been relatively few successful transitions across the chasm between research and operational use. Prior work describes approaches to crossing the “valley of death” from the perspective of the government sponsor or independent tester. The researcher and developer's perspective offered in this paper adds to our understanding of the challenges faced and solutions applied to deployment of advanced technologies into operational environments. The paper describes lessons learned from recent transitions of two information assurance technologies — the VIAssist® netflow visualization tool and the MeerCAT® wireless vulnerability analysis tool — into operational use by the Department of Homeland Security (DHS) and the Department of Defense (DoD).","PeriodicalId":228322,"journal":{"name":"2011 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"122 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123729017","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Next generation RASR TALONTM A remote robotic rapid area sensitive site reconnaissance platform 下一代RASR TALONTM远程机器人快速区域敏感现场侦察平台
Pub Date : 2011-12-19 DOI: 10.1109/THS.2011.6107861
Peter Wells, Q. America, Ted Lobb, Howard LaValley, J. Rezac, T. Chyba
In a joint collaboration, QinetiQ North America (QNA), Idaho National Labs (INL) and ITT are developing a ground robotic platform that provides real time remote sensitive site assessment with sensor fused area mapping, dynamic obstacle detection and avoidance, and path planning that can be retrofitted to the over 3000 fielded TALONs to date. This platform is developed under Defense Threat Reduction Agency (DTRA) Rapid Area Sensitive-Site Reconnaissance (RASR) Advanced Technical Demonstration (ATD) in conjunction with the Edgewood Chemical Biological Center. The RASR platform provides Warfighters, Civil Support Teams and First Responders with marked improvements in enhanced situational awareness and remote assessment tools.
在一项联合合作中,QinetiQ北美公司(QNA)、爱达荷国家实验室(INL)和ITT公司正在开发一种地面机器人平台,该平台可以提供实时远程敏感站点评估,包括传感器融合区域映射、动态障碍物检测和避免以及路径规划,该平台可以改造到目前为止超过3000台现场talon。该平台是由国防威胁减少局(DTRA)与Edgewood化学生物中心联合开发的快速区域敏感点侦察(RASR)先进技术演示(ATD)。RASR平台为作战人员、民事支援小组和第一响应者提供了显著改进的增强态势感知和远程评估工具。
{"title":"Next generation RASR TALONTM A remote robotic rapid area sensitive site reconnaissance platform","authors":"Peter Wells, Q. America, Ted Lobb, Howard LaValley, J. Rezac, T. Chyba","doi":"10.1109/THS.2011.6107861","DOIUrl":"https://doi.org/10.1109/THS.2011.6107861","url":null,"abstract":"In a joint collaboration, QinetiQ North America (QNA), Idaho National Labs (INL) and ITT are developing a ground robotic platform that provides real time remote sensitive site assessment with sensor fused area mapping, dynamic obstacle detection and avoidance, and path planning that can be retrofitted to the over 3000 fielded TALONs to date. This platform is developed under Defense Threat Reduction Agency (DTRA) Rapid Area Sensitive-Site Reconnaissance (RASR) Advanced Technical Demonstration (ATD) in conjunction with the Edgewood Chemical Biological Center. The RASR platform provides Warfighters, Civil Support Teams and First Responders with marked improvements in enhanced situational awareness and remote assessment tools.","PeriodicalId":228322,"journal":{"name":"2011 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127493704","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2011 IEEE International Conference on Technologies for Homeland Security (HST)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1