首页 > 最新文献

2011 IEEE International Conference on Technologies for Homeland Security (HST)最新文献

英文 中文
Anomalous spectrum usage attack detection in cognitive radio wireless networks 认知无线电无线网络中频谱使用异常攻击检测
Pub Date : 2011-12-19 DOI: 10.1109/THS.2011.6107900
CaLynna Sorrells, Paul Potier, Lijun Qian, Xiangfang Li
In many mission-critical applications such as military operations or disaster relief efforts, wireless networks employing dynamic spectrum access enabled by cognitive radio technology gain popularity due to their high spectrum efficiency and interoperability. However, the use of cognitive radio further complicates the security problems in wireless networks and introduces additional challenges. For instance, an attacker may mimic the behavior of a licensed primary user and disrupt the communication strategy of opportunistic spectrum usage of cognitive radio nodes, known as Primary User Emulation Attacks. Another example is a smart jammer, who can scan the spectrum and jam channels selectively. A common characteristic of the attacks in both examples is that they cause anomalous spectrum usage and disrupt the dynamic spectrum access, thus we termed them Anomalous Spectrum Usage Attacks in the context of cognitive radio wireless networks. Anomalous Spectrum Usage Attacks are extremely difficult to detect. In order to address these challenges, we propose a cross-layer framework for security enhancement and attack mitigation. In addition to physical layer sensing, we also take advantage of statistical analysis of the routing information of multiple paths collected by the routing module at the network layer. Inference of congested areas due to spectrum shortage can be made by information fusion and the results from the inference module will be compared to prior knowledge of the primary users, and the suspicious spectrum shortage will be subject to selective auditing, where a manager such as a cluster head will poll more detailed data from the cognitive nodes locating near the suspicious area for further analysis. We use a spectrum-aware split multipath routing as a baseline routing for performance evaluation. The effectiveness of the proposed scheme is demonstrated by extensive simulations.
在许多关键任务应用中,如军事行动或救灾工作,采用认知无线电技术支持的动态频谱接入的无线网络由于其高频谱效率和互操作性而受到欢迎。然而,认知无线电的使用使无线网络中的安全问题进一步复杂化,并带来了额外的挑战。例如,攻击者可能模仿授权主用户的行为,破坏认知无线电节点的机会频谱使用的通信策略,称为主用户仿真攻击。另一个例子是智能干扰器,它可以扫描频谱并有选择地干扰频道。在这两个例子中,攻击的一个共同特征是它们导致异常频谱使用并破坏动态频谱访问,因此我们将其称为认知无线电无线网络背景下的异常频谱使用攻击。异常频谱使用攻击非常难以检测。为了应对这些挑战,我们提出了一个跨层框架来增强安全性和减轻攻击。除了物理层感知外,我们还利用路由模块在网络层收集的多路径路由信息进行统计分析。通过信息融合对频谱短缺导致的拥塞区域进行推断,并将推断模块的结果与主要用户的先验知识进行比较,对可疑的频谱短缺进行选择性审计,集群负责人等管理者将从可疑区域附近的认知节点中轮询更详细的数据进行进一步分析。我们使用频谱感知分裂多路径路由作为性能评估的基线路由。大量的仿真验证了该方案的有效性。
{"title":"Anomalous spectrum usage attack detection in cognitive radio wireless networks","authors":"CaLynna Sorrells, Paul Potier, Lijun Qian, Xiangfang Li","doi":"10.1109/THS.2011.6107900","DOIUrl":"https://doi.org/10.1109/THS.2011.6107900","url":null,"abstract":"In many mission-critical applications such as military operations or disaster relief efforts, wireless networks employing dynamic spectrum access enabled by cognitive radio technology gain popularity due to their high spectrum efficiency and interoperability. However, the use of cognitive radio further complicates the security problems in wireless networks and introduces additional challenges. For instance, an attacker may mimic the behavior of a licensed primary user and disrupt the communication strategy of opportunistic spectrum usage of cognitive radio nodes, known as Primary User Emulation Attacks. Another example is a smart jammer, who can scan the spectrum and jam channels selectively. A common characteristic of the attacks in both examples is that they cause anomalous spectrum usage and disrupt the dynamic spectrum access, thus we termed them Anomalous Spectrum Usage Attacks in the context of cognitive radio wireless networks. Anomalous Spectrum Usage Attacks are extremely difficult to detect. In order to address these challenges, we propose a cross-layer framework for security enhancement and attack mitigation. In addition to physical layer sensing, we also take advantage of statistical analysis of the routing information of multiple paths collected by the routing module at the network layer. Inference of congested areas due to spectrum shortage can be made by information fusion and the results from the inference module will be compared to prior knowledge of the primary users, and the suspicious spectrum shortage will be subject to selective auditing, where a manager such as a cluster head will poll more detailed data from the cognitive nodes locating near the suspicious area for further analysis. We use a spectrum-aware split multipath routing as a baseline routing for performance evaluation. The effectiveness of the proposed scheme is demonstrated by extensive simulations.","PeriodicalId":228322,"journal":{"name":"2011 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"2675 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129202130","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 32
Probabilistic Effectiveness Methodology: A holistic approach on risk assessment of nuclear smuggling 概率有效性方法论:核走私风险评估的整体方法
Pub Date : 2011-12-19 DOI: 10.1109/THS.2011.6107891
L. Cuéllar, T. Cleland, D. Kubicek, T. Kelton, M. Mathis, F. Roach, R. Roberts, P. Stroud, K. Saeger, James P. Smith
The Probabilistic Effectiveness Methodology (PEM) is a simulation tool with a holistic approach to risk assessment of nuclear smuggling. PEM simulates valid representations of threat motivation, capabilities, and intent, threat transportation pathways (air, land, and sea), the performance of detector architectures, and individual detector performance associated with preventive radiological and nuclear detection. Further, it analyses from a Red/Adversary perspective, gaps, seams and vulnerabilities of the Global Nuclear Detection Architecture (GNDA). This paper presents the different PEM components and illustrates (through use of notional data) several examples of how PEM can support the decision making process for GNDA problems.
概率有效性方法(PEM)是一种综合评估核走私风险的模拟工具。PEM模拟了威胁动机、能力和意图、威胁传输路径(空中、陆地和海上)、探测器架构的性能以及与预防性辐射和核探测相关的单个探测器性能的有效表示。此外,它还从红色/对手的角度分析了全球核探测体系结构(GNDA)的差距、接缝和漏洞。本文介绍了不同的PEM组件,并举例说明(通过使用概念数据)PEM如何支持GNDA问题的决策过程。
{"title":"Probabilistic Effectiveness Methodology: A holistic approach on risk assessment of nuclear smuggling","authors":"L. Cuéllar, T. Cleland, D. Kubicek, T. Kelton, M. Mathis, F. Roach, R. Roberts, P. Stroud, K. Saeger, James P. Smith","doi":"10.1109/THS.2011.6107891","DOIUrl":"https://doi.org/10.1109/THS.2011.6107891","url":null,"abstract":"The Probabilistic Effectiveness Methodology (PEM) is a simulation tool with a holistic approach to risk assessment of nuclear smuggling. PEM simulates valid representations of threat motivation, capabilities, and intent, threat transportation pathways (air, land, and sea), the performance of detector architectures, and individual detector performance associated with preventive radiological and nuclear detection. Further, it analyses from a Red/Adversary perspective, gaps, seams and vulnerabilities of the Global Nuclear Detection Architecture (GNDA). This paper presents the different PEM components and illustrates (through use of notional data) several examples of how PEM can support the decision making process for GNDA problems.","PeriodicalId":228322,"journal":{"name":"2011 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"291 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121731058","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Scanning White Light Interferometry, — A new 3D forensics tool 扫描白光干涉测量法-一种新的3D取证工具
Pub Date : 2011-12-19 DOI: 10.1109/THS.2011.6107892
V. Heikkinen, I. Kassamakov, E. Haggstrom, S. Lehto, J. Kiljunen, T. Reinikainen, J. Aaltonen
Three dimensional (3D) imaging has been introduced into forensic work. Quantitative height data adds information compared to the conventional 2D-images when micro-scale evidence is studied. We show the potential of Scanning White Light Interferometry (SWLI) as a 3D imaging method for forensic studies. SWLI allows rapid, non contact measurements of millimeter-size objects with nanometer vertical resolution without sample preparation. We compared toolmarks and to examined crossing lines on metal. When studying marks made by diagonal cutters on wires and firing pin impressions on cartridges we could match cases that were hard to match with a normal forensic microscope. When studying crossing lines the confidence of the examiner was improved from 3.3 ± 1.9 / 5 to 4.2 ± 0.9 / 5 when using 3D images.
三维(3D)成像已被引入到法医工作中。在研究微观尺度证据时,定量高度数据比传统的二维图像增加了信息。我们展示了扫描白光干涉法(SWLI)作为法医研究的3D成像方法的潜力。SWLI允许快速、非接触式测量毫米级大小的物体,具有纳米级的垂直分辨率,而无需制备样品。我们比较了工具印,并检查了金属上的交叉线。当研究斜切刀在电线上留下的痕迹和枪弹上的针脚印痕时,我们可以匹配用普通法医显微镜很难匹配的案件。在研究交叉线时,使用3D图像时,审查员的置信度从3.3±1.9 / 5提高到4.2±0.9 / 5。
{"title":"Scanning White Light Interferometry, — A new 3D forensics tool","authors":"V. Heikkinen, I. Kassamakov, E. Haggstrom, S. Lehto, J. Kiljunen, T. Reinikainen, J. Aaltonen","doi":"10.1109/THS.2011.6107892","DOIUrl":"https://doi.org/10.1109/THS.2011.6107892","url":null,"abstract":"Three dimensional (3D) imaging has been introduced into forensic work. Quantitative height data adds information compared to the conventional 2D-images when micro-scale evidence is studied. We show the potential of Scanning White Light Interferometry (SWLI) as a 3D imaging method for forensic studies. SWLI allows rapid, non contact measurements of millimeter-size objects with nanometer vertical resolution without sample preparation. We compared toolmarks and to examined crossing lines on metal. When studying marks made by diagonal cutters on wires and firing pin impressions on cartridges we could match cases that were hard to match with a normal forensic microscope. When studying crossing lines the confidence of the examiner was improved from 3.3 ± 1.9 / 5 to 4.2 ± 0.9 / 5 when using 3D images.","PeriodicalId":228322,"journal":{"name":"2011 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"433 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133227357","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Behavior-based network traffic synthesis 基于行为的网络流量综合
Pub Date : 2011-11-01 DOI: 10.1109/THS.2011.6107893
Yingbo Song, S. Stolfo, T. Jebara
Modern network security research has demonstrated a clear necessity for open sharing of traffic datasets between organizations - a need that has so far been superseded by the challenges of removing sensitive content from the data beforehand. Network Data Anonymization is an emerging field dedicated to solving this problem, with a main focus on removal of identifiable artifacts that might pierce privacy, such as usernames and IP addresses. However, recent research has demonstrated that more subtle statistical artifacts may yield fingerprints that are just as differen-tiable as the former. This result highlights certain shortcomings in current anonymization frameworks; particularly, ignoring the behavioral idiosyncrasies of network protocols, applications, and users. Network traffic synthesis (or simulation) is a closely related complimentary approach which, while more difficult to execute accurately, has the potential for far greater flexibility. This paper leverages the statistical-idiosyncrasies of network behavior to augment anonymization and traffic-synthesis techniques through machine-learning models specifically designed to capture host-level behavior. We present the design of a system that can automatically learn models for network host behavior across time, then use these models to replicate the original behavior, to interpolate across gaps in the original traffic, and demonstrate how to generate new diverse behaviors. Further, we measure the similarity of the synthesized data to the original, providing us with a quantifiable estimate of data fidelity.
现代网络安全研究已经证明,在组织之间开放共享流量数据集是非常必要的——迄今为止,这种需求已经被事先从数据中删除敏感内容的挑战所取代。网络数据匿名化是一个致力于解决这一问题的新兴领域,主要关注于删除可能侵犯隐私的可识别工件,如用户名和IP地址。然而,最近的研究表明,更微妙的统计人工制品可能会产生与前者一样可区分的指纹。这一结果突出了当前匿名化框架的某些缺点;特别是,忽略了网络协议、应用程序和用户的行为特性。网络流量合成(或模拟)是一种密切相关的互补方法,虽然更难以准确执行,但具有更大灵活性的潜力。本文利用网络行为的统计特性,通过专门设计用于捕获主机级行为的机器学习模型来增强匿名化和流量合成技术。我们设计了一个系统,该系统可以自动学习网络主机行为的模型,然后使用这些模型来复制原始行为,在原始流量的间隙中插入,并演示如何生成新的多样化行为。此外,我们测量合成数据与原始数据的相似性,为我们提供数据保真度的可量化估计。
{"title":"Behavior-based network traffic synthesis","authors":"Yingbo Song, S. Stolfo, T. Jebara","doi":"10.1109/THS.2011.6107893","DOIUrl":"https://doi.org/10.1109/THS.2011.6107893","url":null,"abstract":"Modern network security research has demonstrated a clear necessity for open sharing of traffic datasets between organizations - a need that has so far been superseded by the challenges of removing sensitive content from the data beforehand. Network Data Anonymization is an emerging field dedicated to solving this problem, with a main focus on removal of identifiable artifacts that might pierce privacy, such as usernames and IP addresses. However, recent research has demonstrated that more subtle statistical artifacts may yield fingerprints that are just as differen-tiable as the former. This result highlights certain shortcomings in current anonymization frameworks; particularly, ignoring the behavioral idiosyncrasies of network protocols, applications, and users. Network traffic synthesis (or simulation) is a closely related complimentary approach which, while more difficult to execute accurately, has the potential for far greater flexibility. This paper leverages the statistical-idiosyncrasies of network behavior to augment anonymization and traffic-synthesis techniques through machine-learning models specifically designed to capture host-level behavior. We present the design of a system that can automatically learn models for network host behavior across time, then use these models to replicate the original behavior, to interpolate across gaps in the original traffic, and demonstrate how to generate new diverse behaviors. Further, we measure the similarity of the synthesized data to the original, providing us with a quantifiable estimate of data fidelity.","PeriodicalId":228322,"journal":{"name":"2011 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"146 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115740909","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Modeling & Simulation Capability for Consequence Management 结果管理的建模与仿真能力
Pub Date : 2011-11-01 DOI: 10.1109/THS.2011.6107911
Vic Baker
The Modeling & Simulation Capability for Consequence Management prototype allows emergency planners to design and run dynamic, time aware, ArcGIS 10 based “what-if” gaming simulations depicting the impacts upon critical infrastructure and resource consumption during a large-scale mass evacuation from the National Capital Region to a host region. The capability enables emergency planners to run multiple iterations of a simulated event with different resource allocations including the ability to activate and deactivate shelters, place barriers, and enforce fuel rationing. The technical aspects of the capability rely on the ESRI ArcGIS API for Flex coupled with custom geoprocessing services housed on an ESRI ArcGIS Server. The prototype system was developed for the FEMA Regional Catastrophic Preparedness Grant Program initially focusing on the eastern panhandle of West Virginia. The simulation logic is designed for extensibility to encompass all state-wide counties, neighboring states, and geographical regions/districts.
结果管理建模和仿真能力原型允许应急规划者设计和运行动态的、时间感知的、基于ArcGIS 10的“假设”游戏模拟,描绘从国家首都地区到宿主地区的大规模大规模疏散对关键基础设施和资源消耗的影响。该功能使应急计划人员能够运行具有不同资源分配的模拟事件的多次迭代,包括激活和停用避难所、设置屏障和执行燃料配给的能力。该功能的技术方面依赖于ESRI ArcGIS Flex API以及ESRI ArcGIS服务器上的自定义地理处理服务。原型系统是为联邦应急管理局区域灾难准备拨款项目开发的,最初的重点是西弗吉尼亚州东部狭长地带。模拟逻辑是为可扩展性而设计的,以涵盖所有州范围的县、邻近的州和地理区域/区。
{"title":"Modeling & Simulation Capability for Consequence Management","authors":"Vic Baker","doi":"10.1109/THS.2011.6107911","DOIUrl":"https://doi.org/10.1109/THS.2011.6107911","url":null,"abstract":"The Modeling & Simulation Capability for Consequence Management prototype allows emergency planners to design and run dynamic, time aware, ArcGIS 10 based “what-if” gaming simulations depicting the impacts upon critical infrastructure and resource consumption during a large-scale mass evacuation from the National Capital Region to a host region. The capability enables emergency planners to run multiple iterations of a simulated event with different resource allocations including the ability to activate and deactivate shelters, place barriers, and enforce fuel rationing. The technical aspects of the capability rely on the ESRI ArcGIS API for Flex coupled with custom geoprocessing services housed on an ESRI ArcGIS Server. The prototype system was developed for the FEMA Regional Catastrophic Preparedness Grant Program initially focusing on the eastern panhandle of West Virginia. The simulation logic is designed for extensibility to encompass all state-wide counties, neighboring states, and geographical regions/districts.","PeriodicalId":228322,"journal":{"name":"2011 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128986063","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Risk based screening and explosive detection at the passenger screening checkpoint 在旅客检查检查站进行基于风险的检查和爆炸物检测
Pub Date : 2011-11-01 DOI: 10.1109/THS.2011.6107854
Douglas Mook, E. Scheinman
Recent threats to aviation security have focused on the passenger screening checkpoint. To name a few, the Christmas Day 2009 bombing attempt, the UK liquid threat of 2006, the Richard Reid shoe bomb attempt 2002, and the 9/11 highjackings. A number of new technologies and processes have been implemented to meet this increasing threat at the checkpoint such as the liquid, shoes, and laptop procedures which are generally viewed as tolerable annoyances but the body imagers and enhanced pat-downs are viewed more broadly as an invasion of privacy. Yet even with all these new technologies and processes it is not clear that the system will meet the threats facing it. Even more onerous, invasive, costly, and operationally intensive processes are needed to detect the diverse threats aimed at the checkpoint. It seems inconceivable that new measures or some of the more invasive current measures should be used on every passenger. It has been generally agreed that checkpoints and possibly other security processes need to move to a risk based screening system where a measure of threat is accumulated for each passenger using the least invasive approaches first and only applying the most onerous processes to the highest risk passengers. To that end we have been bringing together the key elements of the passenger screening process to develop comprehensive Risk Based screening for the passenger screening checkpoint. This system will include screening technology, ID Authentication, Biometric verification, Background information assessment, and Behavior analysis.
最近对航空安全的威胁主要集中在旅客检查检查站。举几个例子,2009年圣诞节的爆炸企图,2006年英国的液体威胁,2002年理查德·里德的鞋子炸弹企图,以及9/11劫机事件。为了应对这一日益严重的威胁,检查点采用了许多新技术和新程序,比如液体、鞋子和笔记本电脑检查程序,这些通常被认为是可以容忍的麻烦,但身体成像仪和加强搜身检查被更广泛地视为侵犯隐私。然而,即使有了所有这些新技术和新工艺,也不清楚该系统是否能应对其面临的威胁。检测针对检查点的各种威胁需要更加繁重、侵入性、昂贵和操作密集的流程。似乎不可思议的是,新的措施或一些更具侵入性的现行措施应该对每一位乘客使用。人们普遍认为,检查站和可能的其他安全程序需要转向基于风险的筛选系统,首先使用侵入性最小的方法对每位乘客累积威胁程度,只对风险最高的乘客应用最繁琐的程序。为此,我们汇集了乘客检查过程中的关键要素,为乘客检查检查站制定了全面的基于风险的检查方法。该系统将包括筛选技术、身份验证、生物特征验证、背景信息评估、行为分析等。
{"title":"Risk based screening and explosive detection at the passenger screening checkpoint","authors":"Douglas Mook, E. Scheinman","doi":"10.1109/THS.2011.6107854","DOIUrl":"https://doi.org/10.1109/THS.2011.6107854","url":null,"abstract":"Recent threats to aviation security have focused on the passenger screening checkpoint. To name a few, the Christmas Day 2009 bombing attempt, the UK liquid threat of 2006, the Richard Reid shoe bomb attempt 2002, and the 9/11 highjackings. A number of new technologies and processes have been implemented to meet this increasing threat at the checkpoint such as the liquid, shoes, and laptop procedures which are generally viewed as tolerable annoyances but the body imagers and enhanced pat-downs are viewed more broadly as an invasion of privacy. Yet even with all these new technologies and processes it is not clear that the system will meet the threats facing it. Even more onerous, invasive, costly, and operationally intensive processes are needed to detect the diverse threats aimed at the checkpoint. It seems inconceivable that new measures or some of the more invasive current measures should be used on every passenger. It has been generally agreed that checkpoints and possibly other security processes need to move to a risk based screening system where a measure of threat is accumulated for each passenger using the least invasive approaches first and only applying the most onerous processes to the highest risk passengers. To that end we have been bringing together the key elements of the passenger screening process to develop comprehensive Risk Based screening for the passenger screening checkpoint. This system will include screening technology, ID Authentication, Biometric verification, Background information assessment, and Behavior analysis.","PeriodicalId":228322,"journal":{"name":"2011 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114487090","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Pervasive readiness: Pipedream or possible? A practical approach for measuring public saftey readiness 普遍准备:白日梦还是可能?一种衡量公共安全准备程度的实用方法
Pub Date : 2011-11-01 DOI: 10.1109/THS.2011.6107887
Ari A. Vidali, Jason D. Hutchens, Mitch Javidi
Government organizations at all levels are facing intense pressure to establish and measure readiness: the ability to prepare for, respond to, and recover from crises and natural disasters. Readiness as a concept is easy to grasp in principle, yet exceedingly difficult to implement due to the fragmentation of processes within the public safety sector and a fundamental failure to understand the difference between capacity and capability building to achieve Readiness. A strategy is required that will enable heterogeneous public safety communities to achieve operational agility before, during and after a crisis while optimizing their allocation of funding to arrive at a balanced readiness posture. No single individual, department, agency or organization has all of the information necessary to continuously measure readiness within its geographic boundary. Participation in standardized measurement is often stymied by disparate data storage, fragmented processes, budgets, politics, culture and resistance to change. Yet it is recognized that readiness saves lives; therefore a practical approach is required to establish a framework for effectively measuring readiness against a government's prioritized Hazard/Threat Identification and Risk Assessment. The Indiana Department of Homeland Security has made significant progress in uniting all of the major stakeholders into a cohesive public safety ecosystem. Indiana is taking an innovative approach to achieving, measuring, and optimizing readiness. We outline significant lessons learned, best practices, and feasible approaches towards achieving a sustainable state of pervasive readiness which is the concept of readiness as an integral part of the very fabric of a nation.
各级政府机构都面临着建立和衡量准备能力的巨大压力:准备、响应和从危机和自然灾害中恢复的能力。准备作为一个概念在原则上很容易掌握,但由于公共安全部门内部流程的碎片化,以及从根本上未能理解实现准备的能力和能力建设之间的区别,因此实施起来极其困难。需要一种战略,使不同的公共安全社区能够在危机发生之前、期间和之后实现行动敏捷性,同时优化其资金分配,以达到平衡的准备状态。没有一个单独的个人、部门、机构或组织拥有在其地理边界内持续测量准备情况所需的全部信息。标准化测量的参与常常受到不同的数据存储、分散的流程、预算、政治、文化和变革阻力的阻碍。然而,人们认识到,做好准备可以挽救生命;因此,需要一种实用的方法来建立一个框架,根据政府优先考虑的危害/威胁识别和风险评估,有效地衡量准备情况。印第安纳州国土安全部在将所有主要利益相关者团结成一个有凝聚力的公共安全生态系统方面取得了重大进展。印第安纳州正在采取一种创新的方法来实现、衡量和优化战备状态。我们概述了重要的经验教训、最佳实践和可行的方法,以实现可持续的普遍战备状态,这是一个国家结构中不可或缺的一部分的战备概念。
{"title":"Pervasive readiness: Pipedream or possible? A practical approach for measuring public saftey readiness","authors":"Ari A. Vidali, Jason D. Hutchens, Mitch Javidi","doi":"10.1109/THS.2011.6107887","DOIUrl":"https://doi.org/10.1109/THS.2011.6107887","url":null,"abstract":"Government organizations at all levels are facing intense pressure to establish and measure readiness: the ability to prepare for, respond to, and recover from crises and natural disasters. Readiness as a concept is easy to grasp in principle, yet exceedingly difficult to implement due to the fragmentation of processes within the public safety sector and a fundamental failure to understand the difference between capacity and capability building to achieve Readiness. A strategy is required that will enable heterogeneous public safety communities to achieve operational agility before, during and after a crisis while optimizing their allocation of funding to arrive at a balanced readiness posture. No single individual, department, agency or organization has all of the information necessary to continuously measure readiness within its geographic boundary. Participation in standardized measurement is often stymied by disparate data storage, fragmented processes, budgets, politics, culture and resistance to change. Yet it is recognized that readiness saves lives; therefore a practical approach is required to establish a framework for effectively measuring readiness against a government's prioritized Hazard/Threat Identification and Risk Assessment. The Indiana Department of Homeland Security has made significant progress in uniting all of the major stakeholders into a cohesive public safety ecosystem. Indiana is taking an innovative approach to achieving, measuring, and optimizing readiness. We outline significant lessons learned, best practices, and feasible approaches towards achieving a sustainable state of pervasive readiness which is the concept of readiness as an integral part of the very fabric of a nation.","PeriodicalId":228322,"journal":{"name":"2011 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115954583","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
HOMEbaseTM: An operational concept for collaborative disaster response HOMEbaseTM:协作灾难响应的操作概念
Pub Date : 2011-11-01 DOI: 10.1109/THS.2011.6107862
Peter C. Hitt, Karl Zollinger
This paper describes the operational concept for HOMEbase — the Headquarters and Operations Modular Emergency base — a scalable disaster management complex transportable via land, sea or air in ISO 20-foot shipping containers. HOMEbase incorporates an integrated planning, decision-support, and resource management system with the primary objectives of enhancing continuity of operations among First Responders, Emergency Managers and civil authorities engaged in complex disaster response and recovery operations. Its secondary mission is to ensure “continuity of community” by providing semi-permanent housing for displaced populations and facilities for public health, local governance and civic functions while enabling the restoration of economic and social life of the affected community. HOMEbase initiates a paradigm shift in disaster management through a focus on private-public partnerships to leverage the combined strengths and resources of federal, state and local agencies, private enterprise, nongovernmental organizations and citizens to achieve efficient all-hazards response and recovery from disasters.
本文描述了HOMEbase(总部和作战模块化应急基地)的作战概念,这是一个可扩展的灾害管理综合体,可通过陆海空运输,采用ISO 20英尺的集装箱。HOMEbase集成了一个综合规划、决策支持和资源管理系统,其主要目标是提高参与复杂灾害响应和恢复行动的第一响应者、应急管理人员和民政当局之间的业务连续性。其次要任务是确保"社区的连续性",为流离失所者提供半永久性住房,并为公共卫生、地方治理和公民职能提供设施,同时使受影响社区的经济和社会生活得以恢复。HOMEbase通过注重公私伙伴关系,利用联邦、州和地方机构、私营企业、非政府组织和公民的综合力量和资源,发起了灾害管理模式的转变,以实现有效的所有灾害应对和灾后恢复。
{"title":"HOMEbaseTM: An operational concept for collaborative disaster response","authors":"Peter C. Hitt, Karl Zollinger","doi":"10.1109/THS.2011.6107862","DOIUrl":"https://doi.org/10.1109/THS.2011.6107862","url":null,"abstract":"This paper describes the operational concept for HOMEbase — the Headquarters and Operations Modular Emergency base — a scalable disaster management complex transportable via land, sea or air in ISO 20-foot shipping containers. HOMEbase incorporates an integrated planning, decision-support, and resource management system with the primary objectives of enhancing continuity of operations among First Responders, Emergency Managers and civil authorities engaged in complex disaster response and recovery operations. Its secondary mission is to ensure “continuity of community” by providing semi-permanent housing for displaced populations and facilities for public health, local governance and civic functions while enabling the restoration of economic and social life of the affected community. HOMEbase initiates a paradigm shift in disaster management through a focus on private-public partnerships to leverage the combined strengths and resources of federal, state and local agencies, private enterprise, nongovernmental organizations and citizens to achieve efficient all-hazards response and recovery from disasters.","PeriodicalId":228322,"journal":{"name":"2011 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"3 8","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132576010","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Measuring the human factor of cyber security 衡量网络安全的人为因素
Pub Date : 2011-11-01 DOI: 10.1109/THS.2011.6107876
Brian M. Bowen, R. Devarajan, S. Stolfo
This paper investigates new methods to measure, quantify and evaluate the security posture of human organizations especially within large corporations and government agencies. Computer security is not just about technology and systems. It is also about the people that use those systems and how their vulnerable behaviors can lead to exploitation. We focus on measuring enterprise-level susceptibility to phishing attacks. Results of experiments conducted at Columbia University and the system used to conduct the experiments are presented that show how the system can also be effective for training users. We include a description of follow-on work that has been proposed to DHS that aims to measure and improve the security posture of government departments and agencies, as well as for comparing security postures of individual agencies against one another.
本文研究了测量、量化和评估人类组织安全态势的新方法,特别是在大公司和政府机构内。计算机安全不仅仅是技术和系统的问题。它还与使用这些系统的人以及他们的脆弱行为如何导致剥削有关。我们专注于衡量企业对网络钓鱼攻击的敏感性。在哥伦比亚大学进行的实验和用于进行实验的系统的结果显示,该系统如何也可以有效地培训用户。我们还包括了向国土安全部提出的后续工作的描述,这些工作旨在衡量和改善政府部门和机构的安全状况,并将各个机构的安全状况进行比较。
{"title":"Measuring the human factor of cyber security","authors":"Brian M. Bowen, R. Devarajan, S. Stolfo","doi":"10.1109/THS.2011.6107876","DOIUrl":"https://doi.org/10.1109/THS.2011.6107876","url":null,"abstract":"This paper investigates new methods to measure, quantify and evaluate the security posture of human organizations especially within large corporations and government agencies. Computer security is not just about technology and systems. It is also about the people that use those systems and how their vulnerable behaviors can lead to exploitation. We focus on measuring enterprise-level susceptibility to phishing attacks. Results of experiments conducted at Columbia University and the system used to conduct the experiments are presented that show how the system can also be effective for training users. We include a description of follow-on work that has been proposed to DHS that aims to measure and improve the security posture of government departments and agencies, as well as for comparing security postures of individual agencies against one another.","PeriodicalId":228322,"journal":{"name":"2011 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126805951","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 75
Validation of HADES-based simulations of radiographic experiments 基于hades的射线照相实验模拟的验证
Pub Date : 2011-06-22 DOI: 10.1109/THS.2011.6107855
Haiyin Chen, M. Aufderheide, W. T. White, G. Roberson, L. Glascoe
As a part of a code validation study, we have compared radiographic simulations generated using the HADES code against experimental measurements of a set of common materials of known composition and density: graphite, Teflon, Delrin, magnesium, silicon, titanium, and water cylinders. HADES calculations show good agreement with radiograph measurements. Discrepancies between simulation and experimental data are analyzed. Sources of error and future model improvement are discussed.
作为代码验证研究的一部分,我们将使用HADES代码生成的射线照相模拟与一组已知成分和密度的常见材料的实验测量结果进行了比较:石墨、特氟龙、德林、镁、硅、钛和水瓶。HADES计算结果与x射线照相测量结果吻合良好。分析了仿真数据与实验数据的差异。讨论了误差的来源和未来模型的改进。
{"title":"Validation of HADES-based simulations of radiographic experiments","authors":"Haiyin Chen, M. Aufderheide, W. T. White, G. Roberson, L. Glascoe","doi":"10.1109/THS.2011.6107855","DOIUrl":"https://doi.org/10.1109/THS.2011.6107855","url":null,"abstract":"As a part of a code validation study, we have compared radiographic simulations generated using the HADES code against experimental measurements of a set of common materials of known composition and density: graphite, Teflon, Delrin, magnesium, silicon, titanium, and water cylinders. HADES calculations show good agreement with radiograph measurements. Discrepancies between simulation and experimental data are analyzed. Sources of error and future model improvement are discussed.","PeriodicalId":228322,"journal":{"name":"2011 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115061987","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2011 IEEE International Conference on Technologies for Homeland Security (HST)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1