首页 > 最新文献

2011 IEEE International Conference on Technologies for Homeland Security (HST)最新文献

英文 中文
Managed attributes, not standards, lead to interoperability 导致互操作性的是受管理的属性,而不是标准
Pub Date : 2011-12-19 DOI: 10.1109/THS.2011.6107863
T. Connell
As emergency managers prepare for and then are called upon to direct recovery and response efforts for disaster events of any size, they are charged with ensuring that the response effort interconnects all responding personnel in a united effort “to ensure that each patient receives the most appropriate health care, at the optimal location, with the minimum delay.” (Committee on the Future of Emergency Care in the United States Health System, 2006) Managed attributes, not standards, ensure this essential interoperability, the foundation for providing the most skilled, most timely and most appropriate response to any size situation. Advanced Response Concepts was the first to apply identity management vetting practices to the verification of attributes (skills, certifications, licensure, medical records, etc) and created two discrete containers on a Smartcard. One in compliance with federal PIV standards and a second for the secure storage of attribute datasets. The result is a strong identity credential interoperable at multiple policy levels with additional accessible information for the protection of the responder and effective management of the responder as a resource. When combined with a IDM system, a strong attribute management system can be an invaluable tool in tracking available resources before an event occurs. Attributes (certifications, licensures and training programs) are associated with an individual and the IDM system provides the tools for geo-locating available resources. Now it is possible to identify resources by capability and use that information for advanced placement of responders to a known threat. The ability to allow the command authority to know when and where specific resources are located, what tasking assignments have been given and to whom, is paramount. Specific tasking assignments may be given in the field to respond to dynamic changes in the incident or nature of the response. Leveraging the reporting capabilities of the attribute management system allows for the visualization of the movement of resources thereby making the command authority aware of a change before it is reported formally. This ability to monitor movement can also serve as an early warning indicator pointing out assignments that may be using incomplete information or lacking situational understanding. Attribute management systems give command authorities trusted, verified, data on skills licenses and certifications held by responding individuals and teams in order to allow use of these human resources at the highest common denominator thereby making the most effective use of the resources available and providing the highest level of care and services to those in need during times of disaster of any scale.
由于应急管理人员为任何规模的灾害事件做准备,然后被要求指导恢复和应对工作,因此他们有责任确保应对工作将所有应对人员团结起来,"以确保每位患者在最佳地点以最小的延误获得最适当的医疗保健。(美国卫生系统紧急护理未来委员会,2006)管理属性,而不是标准,确保了这种基本的互操作性,这是对任何规模的情况提供最熟练、最及时和最适当反应的基础。Advanced Response Concepts率先将身份管理审查实践应用于属性(技能、证书、执照、医疗记录等)的验证,并在智能卡上创建了两个独立的容器。一个符合联邦PIV标准,另一个用于安全存储属性数据集。其结果是在多个策略级别上具有强大的可互操作的身份凭证,并具有用于保护响应者和将响应者作为资源进行有效管理的附加可访问信息。当与IDM系统结合使用时,强大的属性管理系统可以成为在事件发生之前跟踪可用资源的宝贵工具。属性(证书、执照和培训计划)与个人相关联,IDM系统提供了地理定位可用资源的工具。现在可以根据能力识别资源,并使用该信息对已知威胁进行高级部署。最重要的是,能够让指挥当局了解具体资源的部署时间和地点,已经分配了哪些任务以及分配给了谁。具体的任务分配可能会在现场被分配,以应对事件或响应性质的动态变化。利用属性管理系统的报告功能,可以可视化资源的移动,从而使命令机构在正式报告更改之前就知道更改。这种监控运动的能力也可以作为早期预警指标,指出可能使用不完整的信息或缺乏对情境的理解的任务。属性管理系统为指挥当局提供可信赖的、经过验证的技能执照和证书数据,这些数据由响应的个人和团队持有,以便允许以最高的公共性使用这些人力资源,从而最有效地利用可用资源,并在任何规模的灾难期间向有需要的人提供最高水平的关怀和服务。
{"title":"Managed attributes, not standards, lead to interoperability","authors":"T. Connell","doi":"10.1109/THS.2011.6107863","DOIUrl":"https://doi.org/10.1109/THS.2011.6107863","url":null,"abstract":"As emergency managers prepare for and then are called upon to direct recovery and response efforts for disaster events of any size, they are charged with ensuring that the response effort interconnects all responding personnel in a united effort “to ensure that each patient receives the most appropriate health care, at the optimal location, with the minimum delay.” (Committee on the Future of Emergency Care in the United States Health System, 2006) Managed attributes, not standards, ensure this essential interoperability, the foundation for providing the most skilled, most timely and most appropriate response to any size situation. Advanced Response Concepts was the first to apply identity management vetting practices to the verification of attributes (skills, certifications, licensure, medical records, etc) and created two discrete containers on a Smartcard. One in compliance with federal PIV standards and a second for the secure storage of attribute datasets. The result is a strong identity credential interoperable at multiple policy levels with additional accessible information for the protection of the responder and effective management of the responder as a resource. When combined with a IDM system, a strong attribute management system can be an invaluable tool in tracking available resources before an event occurs. Attributes (certifications, licensures and training programs) are associated with an individual and the IDM system provides the tools for geo-locating available resources. Now it is possible to identify resources by capability and use that information for advanced placement of responders to a known threat. The ability to allow the command authority to know when and where specific resources are located, what tasking assignments have been given and to whom, is paramount. Specific tasking assignments may be given in the field to respond to dynamic changes in the incident or nature of the response. Leveraging the reporting capabilities of the attribute management system allows for the visualization of the movement of resources thereby making the command authority aware of a change before it is reported formally. This ability to monitor movement can also serve as an early warning indicator pointing out assignments that may be using incomplete information or lacking situational understanding. Attribute management systems give command authorities trusted, verified, data on skills licenses and certifications held by responding individuals and teams in order to allow use of these human resources at the highest common denominator thereby making the most effective use of the resources available and providing the highest level of care and services to those in need during times of disaster of any scale.","PeriodicalId":228322,"journal":{"name":"2011 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130676697","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Beyond He-3 nuclear sensors — TMFDs for real-time SNM monitoring with directionality 超越He-3核传感器-用于实时定向SNM监测的tmfd
Pub Date : 2011-12-19 DOI: 10.1109/THS.2011.6107898
J. Webster, T. Grimes, B. Archambault, K. Fischer, N. Kostry, A. Lentner, J. Lapinskas, R. Taleyarkhan
Due to He-3 shortages as well as other fundamental limitations of 60-y nuclear power technology being adapted for present-day sensor needs, transformational nuclear particle sensor system developments have sponsored by DARPA, DoE, DHS and NSF. These systems dispense with need for conventional He-3, liquid scintillation or solid-state devices. The novel systems detect a variety of radiation types via interactions with ordinary fluids such as water and acetone placed under metastable states of tensioned (yes, sub-zero or below-vacuum) liquid pressures at room temperature. Advancements have resulted which: enable directionality information in 30s to within 10 degrees of a weapons of mass destruction (WMD) neutron source at 25m (80ft); offer over 90% intrinsic efficiency; offer the ability to decipher multiplicity of neutron emission characteristic of spontaneous and induced fission from fissile isotopes; and, enable one to detect WMD-shielded neutrons in the 0.01 eV range, to unshielded neutrons in the 1–10 MeV range, coupled with the ability to detect alpha emitting special nuclear material (SNM) signatures to within 1–5 keV in energy resolution, and detection sensitivities to ultra-trace levels (i.e., to femto-grams per cc of SNMs such as Pu, and Am). The novel tension metastable fluid detector (TMFD) systems are robust, and are presently built in the laboratory with material costs in the ∼$50+ range — with inherent gamma blindness capability. A multi-physics design framework (including nuclear particle transport, acoustics, structural dynamics, fluid-heat transfer, and electro-magnetics), has also been developed, and validated. Comparison against He-3 technology is presented along with adaptation to variety of scenarios ranging from border crossings, to spent nuclear reprocessing plants to portals and moving platforms.
由于氦-3的短缺以及60 y核电技术适应当今传感器需求的其他基本限制,转型核粒子传感器系统的开发得到了DARPA、DoE、DHS和NSF的资助。这些系统不需要传统的He-3、液体闪烁或固态器件。这种新型系统通过与普通流体(如水和丙酮)的相互作用来检测各种类型的辐射,这些流体置于室温下的亚稳态拉伸(是的,低于零或低于真空)液体压力下。所取得的进展包括:在25米(80英尺)高度的大规模杀伤性武器(WMD)中子源上获得30至10度范围内的方向性信息;提供90%以上的内在效率;提供从裂变同位素中破译自发和诱导裂变的多重中子发射特征的能力;并且,使人们能够检测到0.01 eV范围内的大规模杀伤性武器屏蔽中子,到1-10 MeV范围内的非屏蔽中子,再加上能够检测到能量分辨率在1-5 keV以内的α发射特殊核材料(SNM)特征,以及超痕量水平的检测灵敏度(即,到飞克/毫升的SNM,如Pu和Am)。新型的张力亚稳流体探测器(TMFD)系统非常强大,目前在实验室中构建,材料成本在50美元以上,具有固有的伽马盲性能力。多物理场设计框架(包括核粒子输运、声学、结构动力学、流体传热和电磁学)也得到了开发和验证。与He-3技术的比较以及对各种场景的适应,从边境过境,到废核后处理工厂,再到门户和移动平台。
{"title":"Beyond He-3 nuclear sensors — TMFDs for real-time SNM monitoring with directionality","authors":"J. Webster, T. Grimes, B. Archambault, K. Fischer, N. Kostry, A. Lentner, J. Lapinskas, R. Taleyarkhan","doi":"10.1109/THS.2011.6107898","DOIUrl":"https://doi.org/10.1109/THS.2011.6107898","url":null,"abstract":"Due to He-3 shortages as well as other fundamental limitations of 60-y nuclear power technology being adapted for present-day sensor needs, transformational nuclear particle sensor system developments have sponsored by DARPA, DoE, DHS and NSF. These systems dispense with need for conventional He-3, liquid scintillation or solid-state devices. The novel systems detect a variety of radiation types via interactions with ordinary fluids such as water and acetone placed under metastable states of tensioned (yes, sub-zero or below-vacuum) liquid pressures at room temperature. Advancements have resulted which: enable directionality information in 30s to within 10 degrees of a weapons of mass destruction (WMD) neutron source at 25m (80ft); offer over 90% intrinsic efficiency; offer the ability to decipher multiplicity of neutron emission characteristic of spontaneous and induced fission from fissile isotopes; and, enable one to detect WMD-shielded neutrons in the 0.01 eV range, to unshielded neutrons in the 1–10 MeV range, coupled with the ability to detect alpha emitting special nuclear material (SNM) signatures to within 1–5 keV in energy resolution, and detection sensitivities to ultra-trace levels (i.e., to femto-grams per cc of SNMs such as Pu, and Am). The novel tension metastable fluid detector (TMFD) systems are robust, and are presently built in the laboratory with material costs in the ∼$50+ range — with inherent gamma blindness capability. A multi-physics design framework (including nuclear particle transport, acoustics, structural dynamics, fluid-heat transfer, and electro-magnetics), has also been developed, and validated. Comparison against He-3 technology is presented along with adaptation to variety of scenarios ranging from border crossings, to spent nuclear reprocessing plants to portals and moving platforms.","PeriodicalId":228322,"journal":{"name":"2011 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121451183","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Self-organizing resilient network sensing (SornS) with very large scale anomaly detection 大规模异常检测的自组织弹性网络感知(SornS)
Pub Date : 2011-12-19 DOI: 10.1109/THS.2011.6107917
R. Dove
Anomaly detection promises to find elements of abnormality in a field of data. Computational barriers constrain anomaly detection to sparse subsets of total anomaly space. Barriers manifest in three ways — conserving both pattern memory capacity and pattern matching cycle time, while closing off scalability. The research reported here has discovered and analyzed a technology to eliminate two of these barriers, memory capacity and cycle time, and by targeting implementation at a new VLSI pattern processor, eliminate the third scalability barrier. An example shows how 10 to the 15 patterns integrated as a single gang detector can be stored in 193 bytes of memory, with much larger pattern magnitudes practical as well. The architecture of the gang detector enables complete processing of all 10 to the 15 patterns in time determined by the number of features in a single pattern, rather than the total number of patterns. Scalability is provided by a reconfigurable massively parallel VLSI pattern-matching processor chip that can accommodate a virtually unbounded number of such gang detectors. Anomalous behavior detection promises a way round the limitations of looking only for known attack patterns, but it raises new issues in the cyber domain of higher false positive rates and questionable normal-behavior stability. Work reported in this paper describes the nature and capability of gang detector employment, and suggests that the traditional issues of anomaly detection can be addressed with an architecture that engages in continuous learning and re-profiling of normal behavior, and employs a sensemaking hierarchy to reduce false positives. The architecture is based on process patterns from the biological immune system combined with process patterns of mammalian cortical hierarchical sensemaking.
异常检测有望发现数据领域中的异常元素。计算屏障将异常检测限制在整个异常空间的稀疏子集上。障碍表现在三个方面——保留模式内存容量和模式匹配周期时间,同时关闭可伸缩性。本文报告的研究发现并分析了一种技术,可以消除其中两个障碍,即内存容量和周期时间,并通过针对新的VLSI模式处理器的实现,消除了第三个可扩展性障碍。一个示例显示了集成为单个gang检测器的10到15个模式如何存储在193字节的内存中,并且可以使用更大的模式大小。团伙检测器的架构能够在由单个模式中的特征数量而不是模式总数决定的时间内完成对所有10到15个模式的处理。可扩展性由可重构的大规模并行VLSI模式匹配处理器芯片提供,该芯片可以容纳几乎无限数量的此类组合检测器。异常行为检测有望绕过只寻找已知攻击模式的限制,但它在网络领域提出了更高的误报率和可疑的正常行为稳定性的新问题。本文报告的工作描述了帮派检测器使用的性质和能力,并建议可以通过持续学习和重新分析正常行为的体系结构来解决传统的异常检测问题,并采用语义构建层次结构来减少误报。该结构基于生物免疫系统的过程模式,并结合哺乳动物皮层分层感知的过程模式。
{"title":"Self-organizing resilient network sensing (SornS) with very large scale anomaly detection","authors":"R. Dove","doi":"10.1109/THS.2011.6107917","DOIUrl":"https://doi.org/10.1109/THS.2011.6107917","url":null,"abstract":"Anomaly detection promises to find elements of abnormality in a field of data. Computational barriers constrain anomaly detection to sparse subsets of total anomaly space. Barriers manifest in three ways — conserving both pattern memory capacity and pattern matching cycle time, while closing off scalability. The research reported here has discovered and analyzed a technology to eliminate two of these barriers, memory capacity and cycle time, and by targeting implementation at a new VLSI pattern processor, eliminate the third scalability barrier. An example shows how 10 to the 15 patterns integrated as a single gang detector can be stored in 193 bytes of memory, with much larger pattern magnitudes practical as well. The architecture of the gang detector enables complete processing of all 10 to the 15 patterns in time determined by the number of features in a single pattern, rather than the total number of patterns. Scalability is provided by a reconfigurable massively parallel VLSI pattern-matching processor chip that can accommodate a virtually unbounded number of such gang detectors. Anomalous behavior detection promises a way round the limitations of looking only for known attack patterns, but it raises new issues in the cyber domain of higher false positive rates and questionable normal-behavior stability. Work reported in this paper describes the nature and capability of gang detector employment, and suggests that the traditional issues of anomaly detection can be addressed with an architecture that engages in continuous learning and re-profiling of normal behavior, and employs a sensemaking hierarchy to reduce false positives. The architecture is based on process patterns from the biological immune system combined with process patterns of mammalian cortical hierarchical sensemaking.","PeriodicalId":228322,"journal":{"name":"2011 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123875559","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Harbor shield program update: Underwater acoustic imaging of moving vessels 港盾计划更新:移动船只的水声成像
Pub Date : 2011-12-19 DOI: 10.1109/THS.2011.6107883
R. Granger, L. Faulkner, E. Rabe, D. Steinbrecher
Battelle and Naval Undersea Warfare Center (NUWC) Division Newport have developed a maritime security system called Harbor Shield, which can acoustically image the underhull of a vessel from a fixed location to detect potential threats while the vessel is underway. US Immigration and Customs Enforcement dive teams and other security personnel have recovered parasitic drug smuggling devices attached to hulls, and similar devices could be used to attach explosives. At present, the only way to detect such objects is through inspection of stationary vessels by divers, remotely operated vehicles (ROVs) or autonomous underwater vehicles (AUVs). This method is resource intensive and disruptive to traffic, making 100% inspection of vessels a challenge. Harbor Shield will provide the ability to scan moving vessels; process and fuse data from multiple sensors (including side scan sonar); and interface with harbor security systems. This paper discusses recent results, future plans, and benefits of the system.
巴特尔和海军水下作战中心(NUWC)纽波特分部已经开发了一种称为“港盾”的海上安全系统,该系统可以从固定位置对船舶的船体下部进行声学成像,以在船舶航行时探测潜在威胁。美国移民和海关执法局潜水队和其他安全人员已经发现了附着在船体上的寄生毒品走私装置,类似的装置可以用来安装爆炸物。目前,检测此类物体的唯一方法是通过潜水员、远程操作车辆(rov)或自主水下航行器(auv)检查固定船只。这种方法是资源密集型的,并且对交通造成干扰,使得对船舶的100%检查成为一项挑战。“港盾”将提供扫描移动船只的能力;处理和融合来自多个传感器(包括侧扫声纳)的数据;并与港口安全系统连接。本文讨论了该系统的最新结果、未来计划和效益。
{"title":"Harbor shield program update: Underwater acoustic imaging of moving vessels","authors":"R. Granger, L. Faulkner, E. Rabe, D. Steinbrecher","doi":"10.1109/THS.2011.6107883","DOIUrl":"https://doi.org/10.1109/THS.2011.6107883","url":null,"abstract":"Battelle and Naval Undersea Warfare Center (NUWC) Division Newport have developed a maritime security system called Harbor Shield, which can acoustically image the underhull of a vessel from a fixed location to detect potential threats while the vessel is underway. US Immigration and Customs Enforcement dive teams and other security personnel have recovered parasitic drug smuggling devices attached to hulls, and similar devices could be used to attach explosives. At present, the only way to detect such objects is through inspection of stationary vessels by divers, remotely operated vehicles (ROVs) or autonomous underwater vehicles (AUVs). This method is resource intensive and disruptive to traffic, making 100% inspection of vessels a challenge. Harbor Shield will provide the ability to scan moving vessels; process and fuse data from multiple sensors (including side scan sonar); and interface with harbor security systems. This paper discusses recent results, future plans, and benefits of the system.","PeriodicalId":228322,"journal":{"name":"2011 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122572407","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Digital televison for homeland security: Broadband datacast for situational awareness and command coordination 用于国土安全的数字电视:用于态势感知和指挥协调的宽带数据广播
Pub Date : 2011-12-19 DOI: 10.1109/THS.2011.6107844
R. Desourdis, Kevin F. Vest, Mark O'Brien, David J. Mulholland
Digital television (DTV) provides a critical broadband broadcast resource for interoperable public safety and homeland security applications. Beyond the simplistic view of DTV as a resource for repurposed spectrum to public safety, existing DTV stations are providing megabits per second of encrypted data, including Internet Protocol (IP) video, geospatial visualization, data files, text messages, and any digital media. These datacasts, not available to the public, can be targeted to one or any number of selected receivers or groups of receivers in the broadcast area with no congestion effects, unlike cellular systems; that is, DTV ensures all subscribers receive the full bandwidth available. This paper is an introduction to DTV for both day-to-day applications as well as resilient emergency and post-disaster datacast for wide-area situational awareness and command coordination. The paper also emphasizes the development of a datacast concept of operations for public safety and homeland security.
数字电视(DTV)为可互操作的公共安全和国土安全应用提供了重要的宽带广播资源。除了将数字电视视为一种用于公共安全的频谱资源的简单观点之外,现有的数字电视台正在提供每秒兆比特的加密数据,包括互联网协议(IP)视频、地理空间可视化、数据文件、文本消息和任何数字媒体。与蜂窝系统不同,这些不向公众提供的数据广播可以针对广播区域内的一个或任意数量的选定接收器或接收器组,而不会产生拥塞效应;也就是说,数字电视确保所有用户都能接收到可用的全部带宽。本文介绍了数字电视的日常应用,以及用于广域态势感知和指挥协调的弹性应急和灾后数据广播。本文还强调了公共安全和国土安全行动的数据广播概念的发展。
{"title":"Digital televison for homeland security: Broadband datacast for situational awareness and command coordination","authors":"R. Desourdis, Kevin F. Vest, Mark O'Brien, David J. Mulholland","doi":"10.1109/THS.2011.6107844","DOIUrl":"https://doi.org/10.1109/THS.2011.6107844","url":null,"abstract":"Digital television (DTV) provides a critical broadband broadcast resource for interoperable public safety and homeland security applications. Beyond the simplistic view of DTV as a resource for repurposed spectrum to public safety, existing DTV stations are providing megabits per second of encrypted data, including Internet Protocol (IP) video, geospatial visualization, data files, text messages, and any digital media. These datacasts, not available to the public, can be targeted to one or any number of selected receivers or groups of receivers in the broadcast area with no congestion effects, unlike cellular systems; that is, DTV ensures all subscribers receive the full bandwidth available. This paper is an introduction to DTV for both day-to-day applications as well as resilient emergency and post-disaster datacast for wide-area situational awareness and command coordination. The paper also emphasizes the development of a datacast concept of operations for public safety and homeland security.","PeriodicalId":228322,"journal":{"name":"2011 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"25 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122217093","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
New technologies and processes for the Homeland Security Exercise and Evaluation Program toolkit 国土安全演习和评估计划工具包的新技术和流程
Pub Date : 2011-12-19 DOI: 10.1109/THS.2011.6107910
C. J. John, C. Pancerella, L. Yang, Karim Mahrous, K. Holtermann, G. R. Elkin, A. Norige, J. Mapar
The Department of Homeland Security — Science and Technology Directorate (S&T) has partnered with FEMA to investigate and assess new technologies and processes for an updated Homeland Security Exercise and Evaluation Program (HSEEP) Enterprise Platform (EP) for operational use. HSEEP is a capabilities and performance-based exercise program which provides a standardized policy, methodology, and terminology for exercise design, development, conduct, evaluation, and improvement planning. An integral part of HSEEP was the development of the HSEEP Toolkit, a web-based collection of tools for exercise scheduling, design, development, evaluation and improvement planning. The current HSEEP toolkit does not facilitate information sharing or provide a seamlessly integrated exercise support system. In order to effectively update the capabilities of this HSEEP toolkit, an exhaustive assessment was performed that focused on: new system requirements; translation of the new system requirements and the results of an initial operations analysis into an improved HSEEP toolkit prototype aimed at exercise support; and the incorporation of science-based information and data via modeling and simulation (M&S) capabilities into the HSEEP exercise cycle.
国土安全部科学技术局(S&T)与联邦应急管理局(FEMA)合作,调查和评估新技术和流程,以更新国土安全演习和评估计划(HSEEP)企业平台(EP),以供作战使用。HSEEP是一个基于能力和性能的训练计划,它为训练设计、开发、实施、评估和改进计划提供了标准化的策略、方法和术语。HSEEP的一个组成部分是HSEEP工具包的开发,这是一个基于网络的工具集合,用于锻炼计划、设计、开发、评估和改进计划。目前的HSEEP工具包不能促进信息共享或提供无缝集成的锻炼支持系统。为了有效地更新该HSEEP工具包的功能,进行了详尽的评估,重点是:新的系统需求;将新的系统需求和初始作战分析结果转化为改进的HSEEP工具包原型,旨在为演习提供支持;以及通过建模和仿真(M&S)能力将基于科学的信息和数据纳入HSEEP演习周期。
{"title":"New technologies and processes for the Homeland Security Exercise and Evaluation Program toolkit","authors":"C. J. John, C. Pancerella, L. Yang, Karim Mahrous, K. Holtermann, G. R. Elkin, A. Norige, J. Mapar","doi":"10.1109/THS.2011.6107910","DOIUrl":"https://doi.org/10.1109/THS.2011.6107910","url":null,"abstract":"The Department of Homeland Security — Science and Technology Directorate (S&T) has partnered with FEMA to investigate and assess new technologies and processes for an updated Homeland Security Exercise and Evaluation Program (HSEEP) Enterprise Platform (EP) for operational use. HSEEP is a capabilities and performance-based exercise program which provides a standardized policy, methodology, and terminology for exercise design, development, conduct, evaluation, and improvement planning. An integral part of HSEEP was the development of the HSEEP Toolkit, a web-based collection of tools for exercise scheduling, design, development, evaluation and improvement planning. The current HSEEP toolkit does not facilitate information sharing or provide a seamlessly integrated exercise support system. In order to effectively update the capabilities of this HSEEP toolkit, an exhaustive assessment was performed that focused on: new system requirements; translation of the new system requirements and the results of an initial operations analysis into an improved HSEEP toolkit prototype aimed at exercise support; and the incorporation of science-based information and data via modeling and simulation (M&S) capabilities into the HSEEP exercise cycle.","PeriodicalId":228322,"journal":{"name":"2011 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122217853","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Polarization-cum-energy metric for footstep detection using vector-sensor 基于偏振和能量度量的矢量传感器脚步声检测
Pub Date : 2011-12-19 DOI: 10.1109/THS.2011.6107870
Divya Venkatraman, V. Reddy, Andy W. H. Khong, B. Ng
We address the problem of human footstep detection using data recorded by a single tri-axial geophone. It is observed that footstep signature recorded using a vector-sensor is characterized by signal polarization, which, when exploited effectively, has the capability to identify footsteps at increasing source-sensor distances compared to existing techniques. We quantify the effect of signal polarization by fitting a great-arc using spherical linear interpolation (SLERP) to the data vectors after normalization. Furthermore, the signal polarization metric, which provides extended detection range, is combined with signal energy to form a robust polarization-cum-energy metric for efficient detection. Experimental results are presented to substantiate the performance of this technique.
我们解决的问题,人类的脚步检测使用的数据记录了一个单一的三轴检波器。可以观察到,使用矢量传感器记录的脚步声特征具有信号极化的特征,当有效利用时,与现有技术相比,具有在增加源传感器距离时识别脚步声的能力。我们通过对归一化后的数据向量使用球面线性插值(SLERP)拟合大弧来量化信号极化的影响。此外,该方法将信号极化度量与信号能量相结合,可提供更大的检测范围,从而形成一种鲁棒的极化-能量度量,以实现高效检测。实验结果证实了该技术的性能。
{"title":"Polarization-cum-energy metric for footstep detection using vector-sensor","authors":"Divya Venkatraman, V. Reddy, Andy W. H. Khong, B. Ng","doi":"10.1109/THS.2011.6107870","DOIUrl":"https://doi.org/10.1109/THS.2011.6107870","url":null,"abstract":"We address the problem of human footstep detection using data recorded by a single tri-axial geophone. It is observed that footstep signature recorded using a vector-sensor is characterized by signal polarization, which, when exploited effectively, has the capability to identify footsteps at increasing source-sensor distances compared to existing techniques. We quantify the effect of signal polarization by fitting a great-arc using spherical linear interpolation (SLERP) to the data vectors after normalization. Furthermore, the signal polarization metric, which provides extended detection range, is combined with signal energy to form a robust polarization-cum-energy metric for efficient detection. Experimental results are presented to substantiate the performance of this technique.","PeriodicalId":228322,"journal":{"name":"2011 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130204458","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Person attribute search for large-area video surveillance 大面积视频监控的人员属性搜索
Pub Date : 2011-12-19 DOI: 10.1109/THS.2011.6107847
J. Thornton, Jeanette Baran-Gale, Daniel Butler, Michael T. Chan, Heather Zwahlen
This paper describes novel video analytics technology which allows an operator to search through large volumes of surveillance video data to find persons that match a particular attribute profile. Since the proposed technique is geared for surveillance of large areas, this profile consists of attributes that are observable at a distance (including clothing information, hair color, gender, etc) rather than identifying information at the face level. The purpose of this tool is to allow security staff or investigators to quickly locate a person-of-interest in real time (e.g., based on witness descriptions) or to speed up the process of video-based forensic investigations. The proposed algorithm consists of two main components: a technique for detecting individual moving persons in large and potentially crowded scenes, and an algorithm for scoring how well each detection matches a given attribute profile based on a generative probabilistic model. The system described in this paper has been implemented as a proof-of-concept interactive software tool and has been applied to different test video datasets, including collections in an airport terminal and collections in an outdoor environment for law enforcement monitoring. This paper discusses performance statistics measured on these datasets, as well as key algorithmic challenges and useful extensions of this work based on end-user feedback.1
本文描述了一种新的视频分析技术,该技术允许操作员在大量监控视频数据中搜索匹配特定属性配置文件的人员。由于所提出的技术适用于大面积监视,因此该轮廓由远距离可观察到的属性(包括服装信息、头发颜色、性别等)组成,而不是面部水平的识别信息。该工具的目的是使安全人员或调查人员能够实时快速定位感兴趣的人(例如,根据证人描述)或加快基于视频的法医调查过程。该算法由两个主要部分组成:一种用于在大型和潜在拥挤的场景中检测单个移动人员的技术,以及一种基于生成概率模型对每个检测与给定属性配置文件的匹配程度进行评分的算法。本文中描述的系统已作为概念验证交互式软件工具实施,并已应用于不同的测试视频数据集,包括机场航站楼的收集和执法监控室外环境的收集。本文讨论了在这些数据集上测量的性能统计数据,以及基于最终用户反馈的关键算法挑战和这项工作的有用扩展
{"title":"Person attribute search for large-area video surveillance","authors":"J. Thornton, Jeanette Baran-Gale, Daniel Butler, Michael T. Chan, Heather Zwahlen","doi":"10.1109/THS.2011.6107847","DOIUrl":"https://doi.org/10.1109/THS.2011.6107847","url":null,"abstract":"This paper describes novel video analytics technology which allows an operator to search through large volumes of surveillance video data to find persons that match a particular attribute profile. Since the proposed technique is geared for surveillance of large areas, this profile consists of attributes that are observable at a distance (including clothing information, hair color, gender, etc) rather than identifying information at the face level. The purpose of this tool is to allow security staff or investigators to quickly locate a person-of-interest in real time (e.g., based on witness descriptions) or to speed up the process of video-based forensic investigations. The proposed algorithm consists of two main components: a technique for detecting individual moving persons in large and potentially crowded scenes, and an algorithm for scoring how well each detection matches a given attribute profile based on a generative probabilistic model. The system described in this paper has been implemented as a proof-of-concept interactive software tool and has been applied to different test video datasets, including collections in an airport terminal and collections in an outdoor environment for law enforcement monitoring. This paper discusses performance statistics measured on these datasets, as well as key algorithmic challenges and useful extensions of this work based on end-user feedback.1","PeriodicalId":228322,"journal":{"name":"2011 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130391027","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 46
Integrating physical and cyber security resources to detect wireless threats to critical infrastructure 整合物理和网络安全资源,检测关键基础设施的无线威胁
Pub Date : 2011-12-19 DOI: 10.1109/THS.2011.6107918
A. D'Amico, Christina Verderosa, Christopher Horn, Timothy Imhof
Critical infrastructure can be vulnerable to cyber attacks through 802.11 wireless networks. Because wireless intruders are within short range of the targeted network, they can be directly observed by security forces cued to their presence. WildCAT is a prototype system that extends the reach of a physical security force into the cyber realm to detect and respond to wireless threats and vulnerabilities. Its design uses physical security vehicles as the platform for collecting wireless network activity that is then sent via a cellular network to an analysis center. At the analysis center, cyber security specialists detect suspicious activity and cue the physical security force to its location. WildCAT will be tested in comparison to traditional approaches to wardriving, as well as a supplement to wireless intrusion detection systems.
关键的基础设施很容易受到802.11无线网络的网络攻击。由于无线入侵者在目标网络的短范围内,安全部队可以直接观察到他们的存在。WildCAT是一个原型系统,它将物理安全部队的范围扩展到网络领域,以检测和响应无线威胁和漏洞。它的设计使用物理安全车辆作为收集无线网络活动的平台,然后通过蜂窝网络发送到分析中心。在分析中心,网络安全专家发现可疑活动,并向物理安全部队提示其位置。WildCAT将与传统的作战驾驶方法进行比较测试,并作为无线入侵检测系统的补充。
{"title":"Integrating physical and cyber security resources to detect wireless threats to critical infrastructure","authors":"A. D'Amico, Christina Verderosa, Christopher Horn, Timothy Imhof","doi":"10.1109/THS.2011.6107918","DOIUrl":"https://doi.org/10.1109/THS.2011.6107918","url":null,"abstract":"Critical infrastructure can be vulnerable to cyber attacks through 802.11 wireless networks. Because wireless intruders are within short range of the targeted network, they can be directly observed by security forces cued to their presence. WildCAT is a prototype system that extends the reach of a physical security force into the cyber realm to detect and respond to wireless threats and vulnerabilities. Its design uses physical security vehicles as the platform for collecting wireless network activity that is then sent via a cellular network to an analysis center. At the analysis center, cyber security specialists detect suspicious activity and cue the physical security force to its location. WildCAT will be tested in comparison to traditional approaches to wardriving, as well as a supplement to wireless intrusion detection systems.","PeriodicalId":228322,"journal":{"name":"2011 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127297550","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
An integrated machine learning and control theoretic model for mining concept-drifting data streams 基于机器学习和控制理论的概念漂移数据流挖掘模型
Pub Date : 2011-12-19 DOI: 10.1109/THS.2011.6107850
S. Shetty, S. Mukkavilli, L. Keel
Anomaly-based network Intrusion Detection Systems (IDS) model patterns of normal activity and detect novel network attacks. However, these systems depend on the availability of the systems normal traffic pattern profile. But the statistical fingerprint of the normal traffic pattern can change and shift over a period of time due to changes in operational or user activity at the networked site or even system updates. The changes in normal traffic patterns over time lead to concept drift. Some changes can be temporal, cyclical and can be short-lived or they can last for longer periods of time. Depending on a number of factors the speed at which the change in traffic patterns occurs can also be variable, ranging from near instantaneous to the change occurring over the span of numerous months. These changes in traffic patterns are a cause of concern for IDSs as they can lead to a significant increase in false positive rates, thereby reducing the overall system performance. In order to improve the reliability of the IDS, there is a need for an automated mechanism to detect valid traffic changes and avoid inappropriate ad hoc responses. ROC curves have historically been used to evaluate the accuracy of IDSs. ROC curves generated using fixed, time-invariant classification thresholds do not characterize the best accuracy that an IDS can achieve in presence of concept-drifting network traffic. In this paper, we present a integrated supervised machine learning and control theoretic model for detecting concept drift in network traffic patterns. The model comprises of a online support vector machine based classifier(incremental anomaly based detection), a Kullback - Leibler divergence based relative entropy measurement scheme(quantifying concept drift) and feedback control engine(adapting ROC thresholding). In our proposed system, any intrusion activity will cause significant variations, thereby causing a large error, while a minor aberration in the variations (concept drift) will not be immediately reported as alert.
基于异常的网络入侵检测系统(IDS)对正常活动模式进行建模并检测新的网络攻击。然而,这些系统依赖于系统正常流量模式配置文件的可用性。但是,正常流量模式的统计指纹可能会在一段时间内由于网络站点的操作或用户活动的变化甚至系统更新而发生变化和转移。随着时间的推移,正常交通模式的变化导致了概念漂移。有些变化可能是暂时的、周期性的,可能是短暂的,也可能持续较长时间。取决于许多因素,交通模式变化的速度也可能是可变的,从接近瞬间的变化到几个月的变化。流量模式的这些变化引起了ids的关注,因为它们可能导致误报率显著增加,从而降低了整体系统性能。为了提高IDS的可靠性,需要一种自动机制来检测有效的流量变化并避免不适当的临时响应。ROC曲线历来被用来评估ids的准确性。使用固定的、时不变的分类阈值生成的ROC曲线并不能表征IDS在存在概念漂移的网络流量时所能达到的最佳精度。在本文中,我们提出了一个集成的监督机器学习和控制理论模型,用于检测网络流量模式中的概念漂移。该模型由基于在线支持向量机的分类器(基于增量异常检测)、基于Kullback - Leibler散度的相对熵测量方案(量化概念漂移)和反馈控制引擎(自适应ROC阈值)组成。在我们提出的系统中,任何入侵活动都会引起显著的变化,从而导致大的错误,而变化中的小偏差(概念漂移)不会立即作为警报报告。
{"title":"An integrated machine learning and control theoretic model for mining concept-drifting data streams","authors":"S. Shetty, S. Mukkavilli, L. Keel","doi":"10.1109/THS.2011.6107850","DOIUrl":"https://doi.org/10.1109/THS.2011.6107850","url":null,"abstract":"Anomaly-based network Intrusion Detection Systems (IDS) model patterns of normal activity and detect novel network attacks. However, these systems depend on the availability of the systems normal traffic pattern profile. But the statistical fingerprint of the normal traffic pattern can change and shift over a period of time due to changes in operational or user activity at the networked site or even system updates. The changes in normal traffic patterns over time lead to concept drift. Some changes can be temporal, cyclical and can be short-lived or they can last for longer periods of time. Depending on a number of factors the speed at which the change in traffic patterns occurs can also be variable, ranging from near instantaneous to the change occurring over the span of numerous months. These changes in traffic patterns are a cause of concern for IDSs as they can lead to a significant increase in false positive rates, thereby reducing the overall system performance. In order to improve the reliability of the IDS, there is a need for an automated mechanism to detect valid traffic changes and avoid inappropriate ad hoc responses. ROC curves have historically been used to evaluate the accuracy of IDSs. ROC curves generated using fixed, time-invariant classification thresholds do not characterize the best accuracy that an IDS can achieve in presence of concept-drifting network traffic. In this paper, we present a integrated supervised machine learning and control theoretic model for detecting concept drift in network traffic patterns. The model comprises of a online support vector machine based classifier(incremental anomaly based detection), a Kullback - Leibler divergence based relative entropy measurement scheme(quantifying concept drift) and feedback control engine(adapting ROC thresholding). In our proposed system, any intrusion activity will cause significant variations, thereby causing a large error, while a minor aberration in the variations (concept drift) will not be immediately reported as alert.","PeriodicalId":228322,"journal":{"name":"2011 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116687440","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
期刊
2011 IEEE International Conference on Technologies for Homeland Security (HST)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1