Pub Date : 2011-12-19DOI: 10.1109/THS.2011.6107849
V. O. Kunnil, A. Pillai, S. Mil'shtein
Biometric methods of authentication such as fingerprints, hand geometry, face recognition, voice, retina and iris scan are being increasingly used for security purposes. However online transactions still use traditional knowledge based, i.e., Personal Identification Number (PIN) or password for authentication. Such methods have proved ineffective over the course of time. Traditional key based authentication has been in use over the years, but not many forays have been made in to securing network transactions using biometrics. The length of the authentication key used in authentication systems is an important piece of the authentication process. In non-biometric authentication processes such as passwords or PIN numbers, depending on the length of the key, the information may be vulnerable to access by unauthorized users. Our system makes conventional key based authentication obsolete by replacing or supplementing the normal key characters with a personal identifier of the user. Without this biometric key the service is inaccessible. In this study we propose novel authentication protocol, based on use of a contactless undistorted fingerprint images to generate authentication key. The authentication process will be reinforced by randomly selected areas of a fingerprint that are used to generate keys. An additional layer of security is provided by using blood vessel map to determine a live finger is being used. We assert that usage of contactless, thus non-distorted, fingerprint as input to generate single session keys will enhance security of network transactions because of the amount of information in randomly selected segments of a fingerprint which is available to generate unique keys.
{"title":"Biometrics assisted secure network transactions","authors":"V. O. Kunnil, A. Pillai, S. Mil'shtein","doi":"10.1109/THS.2011.6107849","DOIUrl":"https://doi.org/10.1109/THS.2011.6107849","url":null,"abstract":"Biometric methods of authentication such as fingerprints, hand geometry, face recognition, voice, retina and iris scan are being increasingly used for security purposes. However online transactions still use traditional knowledge based, i.e., Personal Identification Number (PIN) or password for authentication. Such methods have proved ineffective over the course of time. Traditional key based authentication has been in use over the years, but not many forays have been made in to securing network transactions using biometrics. The length of the authentication key used in authentication systems is an important piece of the authentication process. In non-biometric authentication processes such as passwords or PIN numbers, depending on the length of the key, the information may be vulnerable to access by unauthorized users. Our system makes conventional key based authentication obsolete by replacing or supplementing the normal key characters with a personal identifier of the user. Without this biometric key the service is inaccessible. In this study we propose novel authentication protocol, based on use of a contactless undistorted fingerprint images to generate authentication key. The authentication process will be reinforced by randomly selected areas of a fingerprint that are used to generate keys. An additional layer of security is provided by using blood vessel map to determine a live finger is being used. We assert that usage of contactless, thus non-distorted, fingerprint as input to generate single session keys will enhance security of network transactions because of the amount of information in randomly selected segments of a fingerprint which is available to generate unique keys.","PeriodicalId":228322,"journal":{"name":"2011 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126713997","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-12-19DOI: 10.1109/THS.2011.6107853
K. P. Lennox, L. Glascoe
Validated computer simulation is an important aspect of critical infrastructure vulnerability assessment. The high computational cost of such models limits the number of threat scenarios that may be directly evaluated, which leads to a need for statistical emulation to predict outcomes for additional scenarios. Our particular area of interest is statistical methods for emulating complex computer codes that predict if a particular tunnel/explosive configuration results in the breaching of an underground transportation tunnel. In this case, there is considerable a priori information as to the properties of this breach classification boundary. We propose a constrained classifier, in the form of a parametric support vector machine, that allows us to incorporate expert knowledge into the shape of the decision boundary. We demonstrate the effectiveness of this technique with both a simulation study and by applying the method to a tunnel breach data set. This analysis reveals that constrained classification can offer substantial benefits for small sample sizes. The technique may be used either to provide a final classification result in the face of extremely limited data or as an interim step to guide adaptive sampling.
{"title":"Constrained classification for infrastructure threat assessment","authors":"K. P. Lennox, L. Glascoe","doi":"10.1109/THS.2011.6107853","DOIUrl":"https://doi.org/10.1109/THS.2011.6107853","url":null,"abstract":"Validated computer simulation is an important aspect of critical infrastructure vulnerability assessment. The high computational cost of such models limits the number of threat scenarios that may be directly evaluated, which leads to a need for statistical emulation to predict outcomes for additional scenarios. Our particular area of interest is statistical methods for emulating complex computer codes that predict if a particular tunnel/explosive configuration results in the breaching of an underground transportation tunnel. In this case, there is considerable a priori information as to the properties of this breach classification boundary. We propose a constrained classifier, in the form of a parametric support vector machine, that allows us to incorporate expert knowledge into the shape of the decision boundary. We demonstrate the effectiveness of this technique with both a simulation study and by applying the method to a tunnel breach data set. This analysis reveals that constrained classification can offer substantial benefits for small sample sizes. The technique may be used either to provide a final classification result in the face of extremely limited data or as an interim step to guide adaptive sampling.","PeriodicalId":228322,"journal":{"name":"2011 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121748829","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-12-19DOI: 10.1109/THS.2011.6107909
S. Lagree, K. Bowyer
Previous researchers have reported success in predicting ethnicity and in predicting gender from features of the iris texture. This paper is the first to consider both problems using similar experimental approaches. Contributions of this work include greater accuracy than previous work on predicting ethnicity from iris texture, empirical evidence that suggests that gender prediction is harder than ethnicity prediction, and empirical evidence that ethnicity prediction is more difficult for females than for males.
{"title":"Predicting ethnicity and gender from iris texture","authors":"S. Lagree, K. Bowyer","doi":"10.1109/THS.2011.6107909","DOIUrl":"https://doi.org/10.1109/THS.2011.6107909","url":null,"abstract":"Previous researchers have reported success in predicting ethnicity and in predicting gender from features of the iris texture. This paper is the first to consider both problems using similar experimental approaches. Contributions of this work include greater accuracy than previous work on predicting ethnicity from iris texture, empirical evidence that suggests that gender prediction is harder than ethnicity prediction, and empirical evidence that ethnicity prediction is more difficult for females than for males.","PeriodicalId":228322,"journal":{"name":"2011 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130850873","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-12-19DOI: 10.1109/THS.2011.6107913
C. Rappaport, Y. Rodriguez-Vaqueiro, J. Martinez-Lorenzo, B. Gonzalez-Valdes, John Beaty, A. Morgenthaler, W. Naqvi
Surveillance of perimeters is essential, especially for critical infrastructure such as transportation hubs, power stations, chemical facilities and others. There are many approaches to perimeter surveillance, but most of these require large upfront investments. This investigation uses advanced electromagnetic modeling techniques with real human body geometries to establish the best set of detectable features using the Wireless Area Secure Perimeter (WASP) system geometry. Using the frequency, power level, network configuration, and antennas employed by WASP, predictions on limits to target recognition are presented, along with recommendations for system reconfiguration for improving target characterization.
{"title":"Phenomenological scattering analysis of an RF Area Secure Perimeter","authors":"C. Rappaport, Y. Rodriguez-Vaqueiro, J. Martinez-Lorenzo, B. Gonzalez-Valdes, John Beaty, A. Morgenthaler, W. Naqvi","doi":"10.1109/THS.2011.6107913","DOIUrl":"https://doi.org/10.1109/THS.2011.6107913","url":null,"abstract":"Surveillance of perimeters is essential, especially for critical infrastructure such as transportation hubs, power stations, chemical facilities and others. There are many approaches to perimeter surveillance, but most of these require large upfront investments. This investigation uses advanced electromagnetic modeling techniques with real human body geometries to establish the best set of detectable features using the Wireless Area Secure Perimeter (WASP) system geometry. Using the frequency, power level, network configuration, and antennas employed by WASP, predictions on limits to target recognition are presented, along with recommendations for system reconfiguration for improving target characterization.","PeriodicalId":228322,"journal":{"name":"2011 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"141 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123349141","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-12-19DOI: 10.1109/THS.2011.6107875
Rick A. Jones, Troy V. Nguyen, B. Horowitz
As shown in the recently publicized Stuxnet attack in Iran, there are significant threats of embedded infections by the producers of equipment that support our nations nuclear power plants that cannot be completely addressed by advancing perimeter security solutions. In this paper we layout a new systems engineering focused approach for addressing these threats: referred to as System-Aware Security for Nuclear Power Systems. This security architecture resides at the application layer and is based on smart reusable system security services. Furthermore, to show how such an architecture can enhance the security of nuclear power systems, this paper present a vision for this architectural formulation for a Nuclear Power Plant Turbine Control System.
{"title":"System-aware security for nuclear power systems","authors":"Rick A. Jones, Troy V. Nguyen, B. Horowitz","doi":"10.1109/THS.2011.6107875","DOIUrl":"https://doi.org/10.1109/THS.2011.6107875","url":null,"abstract":"As shown in the recently publicized Stuxnet attack in Iran, there are significant threats of embedded infections by the producers of equipment that support our nations nuclear power plants that cannot be completely addressed by advancing perimeter security solutions. In this paper we layout a new systems engineering focused approach for addressing these threats: referred to as System-Aware Security for Nuclear Power Systems. This security architecture resides at the application layer and is based on smart reusable system security services. Furthermore, to show how such an architecture can enhance the security of nuclear power systems, this paper present a vision for this architectural formulation for a Nuclear Power Plant Turbine Control System.","PeriodicalId":228322,"journal":{"name":"2011 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134229258","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-12-19DOI: 10.1109/THS.2011.6107894
Jeffrey Hunker, C. Gates, M. Bishop
The notion of attribution is usually tied to identity: the ability to associate the originator of something with that data. This notion is both a simplification of the myriad aspects of attribution, and a masking of many different types of attribution under the rubric of “identity.” Current efforts at attribution of data in the network focus either on traceback of packets or signing data at various network layers, and management of the keys involved. As the Internet evolves into the next generation network, and people implement testbeds to facilitate that evolution, they can design support mechanisms for other forms of attribution. What types of attribution should those mechanisms support? This paper presents requirements for attribution that will be useful both in the next generation infrastructure and in the data it manages.
{"title":"Attribution requirements for next generation Internets","authors":"Jeffrey Hunker, C. Gates, M. Bishop","doi":"10.1109/THS.2011.6107894","DOIUrl":"https://doi.org/10.1109/THS.2011.6107894","url":null,"abstract":"The notion of attribution is usually tied to identity: the ability to associate the originator of something with that data. This notion is both a simplification of the myriad aspects of attribution, and a masking of many different types of attribution under the rubric of “identity.” Current efforts at attribution of data in the network focus either on traceback of packets or signing data at various network layers, and management of the keys involved. As the Internet evolves into the next generation network, and people implement testbeds to facilitate that evolution, they can design support mechanisms for other forms of attribution. What types of attribution should those mechanisms support? This paper presents requirements for attribution that will be useful both in the next generation infrastructure and in the data it manages.","PeriodicalId":228322,"journal":{"name":"2011 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"135 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127379097","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-12-19DOI: 10.1109/THS.2011.6107916
B. O'Brien, A. D'Amico, Mark Larkin
Despite more than a decade of significant government investment in network defense research and technology development, there have been relatively few successful transitions across the chasm between research and operational use. Prior work describes approaches to crossing the “valley of death” from the perspective of the government sponsor or independent tester. The researcher and developer's perspective offered in this paper adds to our understanding of the challenges faced and solutions applied to deployment of advanced technologies into operational environments. The paper describes lessons learned from recent transitions of two information assurance technologies — the VIAssist® netflow visualization tool and the MeerCAT® wireless vulnerability analysis tool — into operational use by the Department of Homeland Security (DHS) and the Department of Defense (DoD).
{"title":"Technology transition of network defense visual analytics: Lessons learned from case studies","authors":"B. O'Brien, A. D'Amico, Mark Larkin","doi":"10.1109/THS.2011.6107916","DOIUrl":"https://doi.org/10.1109/THS.2011.6107916","url":null,"abstract":"Despite more than a decade of significant government investment in network defense research and technology development, there have been relatively few successful transitions across the chasm between research and operational use. Prior work describes approaches to crossing the “valley of death” from the perspective of the government sponsor or independent tester. The researcher and developer's perspective offered in this paper adds to our understanding of the challenges faced and solutions applied to deployment of advanced technologies into operational environments. The paper describes lessons learned from recent transitions of two information assurance technologies — the VIAssist® netflow visualization tool and the MeerCAT® wireless vulnerability analysis tool — into operational use by the Department of Homeland Security (DHS) and the Department of Defense (DoD).","PeriodicalId":228322,"journal":{"name":"2011 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"122 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123729017","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-12-19DOI: 10.1109/THS.2011.6107861
Peter Wells, Q. America, Ted Lobb, Howard LaValley, J. Rezac, T. Chyba
In a joint collaboration, QinetiQ North America (QNA), Idaho National Labs (INL) and ITT are developing a ground robotic platform that provides real time remote sensitive site assessment with sensor fused area mapping, dynamic obstacle detection and avoidance, and path planning that can be retrofitted to the over 3000 fielded TALONs to date. This platform is developed under Defense Threat Reduction Agency (DTRA) Rapid Area Sensitive-Site Reconnaissance (RASR) Advanced Technical Demonstration (ATD) in conjunction with the Edgewood Chemical Biological Center. The RASR platform provides Warfighters, Civil Support Teams and First Responders with marked improvements in enhanced situational awareness and remote assessment tools.
{"title":"Next generation RASR TALONTM A remote robotic rapid area sensitive site reconnaissance platform","authors":"Peter Wells, Q. America, Ted Lobb, Howard LaValley, J. Rezac, T. Chyba","doi":"10.1109/THS.2011.6107861","DOIUrl":"https://doi.org/10.1109/THS.2011.6107861","url":null,"abstract":"In a joint collaboration, QinetiQ North America (QNA), Idaho National Labs (INL) and ITT are developing a ground robotic platform that provides real time remote sensitive site assessment with sensor fused area mapping, dynamic obstacle detection and avoidance, and path planning that can be retrofitted to the over 3000 fielded TALONs to date. This platform is developed under Defense Threat Reduction Agency (DTRA) Rapid Area Sensitive-Site Reconnaissance (RASR) Advanced Technical Demonstration (ATD) in conjunction with the Edgewood Chemical Biological Center. The RASR platform provides Warfighters, Civil Support Teams and First Responders with marked improvements in enhanced situational awareness and remote assessment tools.","PeriodicalId":228322,"journal":{"name":"2011 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127493704","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-12-19DOI: 10.1109/THS.2011.6107921
Ray Di Ciaccio, J. Pullen, P. Breimyer
Large-scale disasters present significant incident management challenges due to their size and complexity. Organizations often introduce distinct Concepts of Operations (CONOPs), resources, and tools. Collecting and disseminating real-time information across all responders and organizations presents a difficult, but urgent, technical problem, exemplified by the responses to the 2010 Deep Water Horizon oil spill and the 2011 9.0 magnitude earthquake and ensuing tsunami in Japan. Web-based application capabilities have matured significantly and can provide a distributed, feature-rich, and standards-based collaboration environment for First Responders. This paper describes the Next-Generation Incident Command System (NICS), formerly the Lincoln Distributed Disaster Response System (LDDRS), an open, non-proprietary, distributed, scalable, web-based situational awareness system for First Responders. NICS is developed by MIT Lincoln Laboratory (MIT LL), in partnership with the California Department of Forestry and Fire Protection (CAL FIRE), under the sponsorship of the Department of Homeland Security Science & Technology Directorate (S&T).
{"title":"Enabling distributed command and control with standards-based geospatial collaboration","authors":"Ray Di Ciaccio, J. Pullen, P. Breimyer","doi":"10.1109/THS.2011.6107921","DOIUrl":"https://doi.org/10.1109/THS.2011.6107921","url":null,"abstract":"Large-scale disasters present significant incident management challenges due to their size and complexity. Organizations often introduce distinct Concepts of Operations (CONOPs), resources, and tools. Collecting and disseminating real-time information across all responders and organizations presents a difficult, but urgent, technical problem, exemplified by the responses to the 2010 Deep Water Horizon oil spill and the 2011 9.0 magnitude earthquake and ensuing tsunami in Japan. Web-based application capabilities have matured significantly and can provide a distributed, feature-rich, and standards-based collaboration environment for First Responders. This paper describes the Next-Generation Incident Command System (NICS), formerly the Lincoln Distributed Disaster Response System (LDDRS), an open, non-proprietary, distributed, scalable, web-based situational awareness system for First Responders. NICS is developed by MIT Lincoln Laboratory (MIT LL), in partnership with the California Department of Forestry and Fire Protection (CAL FIRE), under the sponsorship of the Department of Homeland Security Science & Technology Directorate (S&T).","PeriodicalId":228322,"journal":{"name":"2011 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130150308","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-12-19DOI: 10.1109/THS.2011.6107839
S. Shapiro
Anonymization — the process of removing or otherwise transforming information so as to reduce the ability to associate it with an identifiable individual — has been much criticized of late, yet interest in it remains high in many quarters. Potential use cases, including those found in the homeland security domain, vary much more widely than those represented by the incidents that have cast doubt on anonymization's utility. Dealing with this variety effectively and efficiently, though, poses challenges. This paper will present a generic anonymization methodology for tabular textual data being developed by the Science and Technology Directorate of the Department of Homeland Security. This methodology views anonymization as a single, non-exclusive privacy risk control to be considered along with other potential controls. The anonymization process it describes is as much a programmatic risk management process as a technical one. It aims to make anonymization more of a systems engineering activity.
{"title":"Separating the baby from the bathwater: Toward a generic and practical framework for anonymization","authors":"S. Shapiro","doi":"10.1109/THS.2011.6107839","DOIUrl":"https://doi.org/10.1109/THS.2011.6107839","url":null,"abstract":"Anonymization — the process of removing or otherwise transforming information so as to reduce the ability to associate it with an identifiable individual — has been much criticized of late, yet interest in it remains high in many quarters. Potential use cases, including those found in the homeland security domain, vary much more widely than those represented by the incidents that have cast doubt on anonymization's utility. Dealing with this variety effectively and efficiently, though, poses challenges. This paper will present a generic anonymization methodology for tabular textual data being developed by the Science and Technology Directorate of the Department of Homeland Security. This methodology views anonymization as a single, non-exclusive privacy risk control to be considered along with other potential controls. The anonymization process it describes is as much a programmatic risk management process as a technical one. It aims to make anonymization more of a systems engineering activity.","PeriodicalId":228322,"journal":{"name":"2011 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115003567","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}