首页 > 最新文献

Proceedings 39th Annual 2005 International Carnahan Conference on Security Technology最新文献

英文 中文
On the effects of image quality degradation on minutiae- and ridge-based automatic fingerprint recognition 图像质量退化对基于细节和脊线的自动指纹识别的影响
Julian Fierrez, L.M. Munoz-Serrano, F. Alonso-Fernandez, J. Ortega-Garcia
The effect of image quality degradation on the verification performance of automatic fingerprint recognition is investigated. We study the performance of two fingerprint matchers based on minutiae and ridge information under varying fingerprint image quality. The ridge-based system is found to be more robust to image quality degradation than the minutiae-based system for a number of different image quality criteria.
研究了图像质量退化对自动指纹识别验证性能的影响。研究了两种基于细节和脊线信息的指纹匹配器在不同指纹图像质量下的性能。对于许多不同的图像质量标准,基于脊线的系统比基于极小值的系统对图像质量退化的鲁棒性更强。
{"title":"On the effects of image quality degradation on minutiae- and ridge-based automatic fingerprint recognition","authors":"Julian Fierrez, L.M. Munoz-Serrano, F. Alonso-Fernandez, J. Ortega-Garcia","doi":"10.1109/CCST.2005.1594877","DOIUrl":"https://doi.org/10.1109/CCST.2005.1594877","url":null,"abstract":"The effect of image quality degradation on the verification performance of automatic fingerprint recognition is investigated. We study the performance of two fingerprint matchers based on minutiae and ridge information under varying fingerprint image quality. The ridge-based system is found to be more robust to image quality degradation than the minutiae-based system for a number of different image quality criteria.","PeriodicalId":411051,"journal":{"name":"Proceedings 39th Annual 2005 International Carnahan Conference on Security Technology","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115950642","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 35
Face recognition with small and large size databases 人脸识别与小型和大型数据库
J. Alcobé, M. Faúndez-Zanuy
This paper presents experimental results using the ORL (40 people) and FERET (994 people) databases. The ORL database can be useful for securing applications where few users attempting to access are expected. This is the case, for instance, of a PDA or PC where the password is the face of the user. On the other hand, the FERET database is useful for studying those situations where the number of authorized users is around a thousand people.
本文介绍了使用ORL(40人)和FERET(994人)数据库的实验结果。ORL数据库对于保护那些很少有用户试图访问的应用程序非常有用。例如,在PDA或PC中,密码就是用户的面孔。另一方面,FERET数据库对于研究授权用户数量在1000人左右的情况非常有用。
{"title":"Face recognition with small and large size databases","authors":"J. Alcobé, M. Faúndez-Zanuy","doi":"10.1109/CCST.2005.1594843","DOIUrl":"https://doi.org/10.1109/CCST.2005.1594843","url":null,"abstract":"This paper presents experimental results using the ORL (40 people) and FERET (994 people) databases. The ORL database can be useful for securing applications where few users attempting to access are expected. This is the case, for instance, of a PDA or PC where the password is the face of the user. On the other hand, the FERET database is useful for studying those situations where the number of authorized users is around a thousand people.","PeriodicalId":411051,"journal":{"name":"Proceedings 39th Annual 2005 International Carnahan Conference on Security Technology","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125777564","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Biometric verification of humans by means of hand geometry 通过手部几何图形对人体进行生物特征验证
M. Faúndez-Zanuy
This paper describes a hand geometry biometric identification system. We have acquired a database of 22 people, 10 acquisitions per person, using a conventional document scanner. We propose a feature extraction and classifier. The experimental results reveal a maximum identification rate equal to 93.64%, and a minimum value of the detection cost function equal to 2.92% using a multi layer perceptron classifier.
本文介绍了一种手部几何形状的生物识别系统。我们已经获得了一个22人的数据库,使用传统的文档扫描仪,每人获得10个。我们提出了一种特征提取和分类器。实验结果表明,多层感知器分类器的最大识别率为93.64%,检测代价函数的最小值为2.92%。
{"title":"Biometric verification of humans by means of hand geometry","authors":"M. Faúndez-Zanuy","doi":"10.1109/CCST.2005.1594816","DOIUrl":"https://doi.org/10.1109/CCST.2005.1594816","url":null,"abstract":"This paper describes a hand geometry biometric identification system. We have acquired a database of 22 people, 10 acquisitions per person, using a conventional document scanner. We propose a feature extraction and classifier. The experimental results reveal a maximum identification rate equal to 93.64%, and a minimum value of the detection cost function equal to 2.92% using a multi layer perceptron classifier.","PeriodicalId":411051,"journal":{"name":"Proceedings 39th Annual 2005 International Carnahan Conference on Security Technology","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133788615","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Security, Internet connectivity and aircraft data networks 安全,互联网连接和飞机数据网络
N. Thanthry, M. S. Ali, R. Pendse
Internet connectivity which was in experimental stages only a few years ago is a reality today. Current implementations allow passengers to access Internet for pleasure and in some cases secure VPN access is provided to corporate networks. Several researchers are looking at the possibility of the existence of a total three networks: passenger network (PN), crew network (CRN), and the control network (CON). Researchers envision an architecture where these three networks co-exist in an airplane. The available Internet connectivity can be utilized for transporting flight critical information like cockpit flight data recorder (CFDR) data, digital flight data recorder (DFDR) data, cockpit voice recorder (CVR) data and controller pilot data link communication. In addition, the Internet connectivity could also be used for other safety mechanisms like video surveillance and remote control of the flight. Security is one of the major concerns that affect the successful deployment of aircraft data networks (ADN) and other safety features. Several studies have been carried out to secure the network using firewalls and intrusion detection system but so far no study has focused on securing the communication channel (between the aircraft and the ground station) and its impact on the ADN. The scope of this research is to determine the viability and need of a security mechanism. The research also focuses on the performance of different security architectures and determine their usability in the framework of an ADN
几年前还处于实验阶段的互联网连接如今已成为现实。目前的实现允许乘客访问互联网以获得乐趣,并且在某些情况下为公司网络提供安全的VPN访问。一些研究人员正在研究三种网络存在的可能性:乘客网络(PN)、机组网络(CRN)和控制网络(CON)。研究人员设想了一种架构,即这三种网络在飞机上共存。可用的互联网连接可用于传输飞行关键信息,如驾驶舱飞行数据记录仪(CFDR)数据、数字飞行数据记录仪(DFDR)数据、驾驶舱语音记录仪(CVR)数据和控制器飞行员数据链通信。此外,互联网连接也可以用于其他安全机制,如视频监控和远程控制飞行。安全性是影响飞机数据网络(ADN)和其他安全功能成功部署的主要问题之一。已经进行了几项研究,利用防火墙和入侵检测系统来保护网络,但到目前为止,还没有研究集中在保护通信信道(飞机和地面站之间)及其对ADN的影响。本研究的范围是确定安全机制的可行性和必要性。研究还侧重于不同安全架构的性能,并确定它们在ADN框架中的可用性
{"title":"Security, Internet connectivity and aircraft data networks","authors":"N. Thanthry, M. S. Ali, R. Pendse","doi":"10.1109/MAES.2006.284351","DOIUrl":"https://doi.org/10.1109/MAES.2006.284351","url":null,"abstract":"Internet connectivity which was in experimental stages only a few years ago is a reality today. Current implementations allow passengers to access Internet for pleasure and in some cases secure VPN access is provided to corporate networks. Several researchers are looking at the possibility of the existence of a total three networks: passenger network (PN), crew network (CRN), and the control network (CON). Researchers envision an architecture where these three networks co-exist in an airplane. The available Internet connectivity can be utilized for transporting flight critical information like cockpit flight data recorder (CFDR) data, digital flight data recorder (DFDR) data, cockpit voice recorder (CVR) data and controller pilot data link communication. In addition, the Internet connectivity could also be used for other safety mechanisms like video surveillance and remote control of the flight. Security is one of the major concerns that affect the successful deployment of aircraft data networks (ADN) and other safety features. Several studies have been carried out to secure the network using firewalls and intrusion detection system but so far no study has focused on securing the communication channel (between the aircraft and the ground station) and its impact on the ADN. The scope of this research is to determine the viability and need of a security mechanism. The research also focuses on the performance of different security architectures and determine their usability in the framework of an ADN","PeriodicalId":411051,"journal":{"name":"Proceedings 39th Annual 2005 International Carnahan Conference on Security Technology","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122090660","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
The X-ray object recognition test (X-ray ORT) - a reliable and valid instrument for measuring visual abilities needed in X-ray screening x射线目标识别测试(x射线ORT)——一种可靠有效的测量x射线筛查所需视觉能力的仪器
D. Hardmeier, F. Hofer, A. Schwaninger
Aviation security screening has become very important in recent years. It was shown by Schwaninger et al. (2004) that certain image-based factors influence detection when visually inspecting X-ray images of passenger bags. Threat items are more difficult to recognize when placed in close-packed bags (effect of bag complexity), when superimposed by other objects (effect of superposition), and when rotated (effect of viewpoint). The X-ray object recognition rest (X-ray ORT) was developed to measure the abilities needed to cope with these factors. In this study, we examined the reliability and validity of the X-ray ORT based on a sample of 453 aviation security screeners and 453 novices. Cronbach Alpha and split-half analysis revealed high reliability. Validity was examined using internal, convergent, discriminant and criterion-related validity estimates. The results show that the X-ray ORT is a reliable and valid instrument for measuring visual abilities needed in X-ray screening. This makes the X-ray ORT an interesting tool for competency and pre-employment assessment purposes.
近年来,航空安全检查变得非常重要。Schwaninger et al.(2004)在目视检查旅客行李的x射线图像时表明,某些基于图像的因素会影响检测。当威胁道具被放置在紧密包装的袋子中时(袋子复杂性的影响),当与其他物体叠加时(叠加的影响),以及当旋转时(视点的影响),它们更难以识别。开发了x射线物体识别测试(x射线ORT)来测量应对这些因素所需的能力。在本研究中,我们以453名航空安检人员和453名新手为样本,检验了x射线ORT的信度和效度。Cronbach Alpha和split-half分析显示高信度。效度采用内部、收敛、判别和标准相关的效度估计进行检验。结果表明,x射线ORT是一种可靠、有效的测量x射线筛查所需视觉能力的仪器。这使得x光测试成为胜任能力和就业前评估的有趣工具。
{"title":"The X-ray object recognition test (X-ray ORT) - a reliable and valid instrument for measuring visual abilities needed in X-ray screening","authors":"D. Hardmeier, F. Hofer, A. Schwaninger","doi":"10.1109/CCST.2005.1594876","DOIUrl":"https://doi.org/10.1109/CCST.2005.1594876","url":null,"abstract":"Aviation security screening has become very important in recent years. It was shown by Schwaninger et al. (2004) that certain image-based factors influence detection when visually inspecting X-ray images of passenger bags. Threat items are more difficult to recognize when placed in close-packed bags (effect of bag complexity), when superimposed by other objects (effect of superposition), and when rotated (effect of viewpoint). The X-ray object recognition rest (X-ray ORT) was developed to measure the abilities needed to cope with these factors. In this study, we examined the reliability and validity of the X-ray ORT based on a sample of 453 aviation security screeners and 453 novices. Cronbach Alpha and split-half analysis revealed high reliability. Validity was examined using internal, convergent, discriminant and criterion-related validity estimates. The results show that the X-ray ORT is a reliable and valid instrument for measuring visual abilities needed in X-ray screening. This makes the X-ray ORT an interesting tool for competency and pre-employment assessment purposes.","PeriodicalId":411051,"journal":{"name":"Proceedings 39th Annual 2005 International Carnahan Conference on Security Technology","volume":"13 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132663018","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 58
Voice over IP security and law enforcement 知识产权安全和执法的声音
N. Thanthry, R. Pendse, K. Namuduri
Voice over IP is one of the fastest growing Internet based application in today's networking world. As more and more enterprises are moving towards IP based voice network, the payload security has become an important issue. The voice traffic is exposed to the same threats as the normal data traffic. However, with voice traffic, the security and accessibility requirements are different from the data traffic. While it is important to protect the voice packets from spoofing and eves dropping, it is equally important that the law enforcement agencies gain access to these voice packets when legally required. With the deployment of security mechanisms like encryption, it becomes harder for the law enforcement agencies to decipher the information hidden in the IP packets related to voice calls. It would make sense to use standardized encryption techniques with voice over IP, at the same time provide a means to decipher the data as and when needed. This would provide the law enforcement agencies an easier access to the information during critical situations provided they have access to the encryption keys. The emphasis should be placed on the choice of encryption keys making it difficult for intruders to decipher. In this paper, the authors review the security requirements of voice traffic transmitted via Internet with the law enforcement and security perspective. The authors review the requirements of various law enforcement agencies and assess the impact of security mechanisms deployed in VOIP networks on law enforcement
IP语音是当今网络世界中发展最快的基于Internet的应用之一。随着越来越多的企业转向基于IP的语音网络,有效载荷的安全成为一个重要的问题。语音业务面临着与普通数据业务相同的威胁。但是,语音流量的安全性和可访问性需求与数据流量不同。虽然保护语音数据包不受欺骗和窃取很重要,但执法机构在法律要求时获得这些语音数据包的访问权限同样重要。随着加密等安全机制的部署,执法机构破译隐藏在与语音通话相关的IP数据包中的信息变得更加困难。使用标准化的IP语音加密技术是有意义的,同时在需要的时候提供一种破译数据的方法。这将使执法机构在紧急情况下更容易获得信息,只要他们能够获得加密密钥。重点应该放在加密密钥的选择上,使入侵者难以破译。本文从执法和安全的角度对互联网语音通信的安全要求进行了综述。作者回顾了各种执法机构的要求,并评估了在VOIP网络中部署的安全机制对执法的影响
{"title":"Voice over IP security and law enforcement","authors":"N. Thanthry, R. Pendse, K. Namuduri","doi":"10.1109/CCST.2005.1594888","DOIUrl":"https://doi.org/10.1109/CCST.2005.1594888","url":null,"abstract":"Voice over IP is one of the fastest growing Internet based application in today's networking world. As more and more enterprises are moving towards IP based voice network, the payload security has become an important issue. The voice traffic is exposed to the same threats as the normal data traffic. However, with voice traffic, the security and accessibility requirements are different from the data traffic. While it is important to protect the voice packets from spoofing and eves dropping, it is equally important that the law enforcement agencies gain access to these voice packets when legally required. With the deployment of security mechanisms like encryption, it becomes harder for the law enforcement agencies to decipher the information hidden in the IP packets related to voice calls. It would make sense to use standardized encryption techniques with voice over IP, at the same time provide a means to decipher the data as and when needed. This would provide the law enforcement agencies an easier access to the information during critical situations provided they have access to the encryption keys. The emphasis should be placed on the choice of encryption keys making it difficult for intruders to decipher. In this paper, the authors review the security requirements of voice traffic transmitted via Internet with the law enforcement and security perspective. The authors review the requirements of various law enforcement agencies and assess the impact of security mechanisms deployed in VOIP networks on law enforcement","PeriodicalId":411051,"journal":{"name":"Proceedings 39th Annual 2005 International Carnahan Conference on Security Technology","volume":"123 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122906305","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
SecurIST: co-ordinating the development of a strategic research agenda for security and dependability R&D 安全专家:协调安全和可靠性研发的战略研究议程的发展
J. Clarke, W. M. Fitzgerald
There has been much discussion about the emergence of the knowledge society. The engine driving the creation of this society is an ICT framework based on the convergence of media, processes and communications networks delivering ubiquitous access to knowledge irrespective of location. Much of the ICT research agenda is focused on the specification of this framework. The proposed systems are highly complex requiring the interconnection of highly complex infrastructures and systems. The pervasiveness of ICT in this new society creates challenges in terms of privacy, access control, trust and reliability. The development of an effective secure and dependable environment is crucial for the effective delivery of the knowledge society. The creation of a knowledge society within Europe requires that Europe position itself at the forefront of research in this area. The key challenges for Europe are to develop security solutions, which can guarantee dependability and resilience of ICT infrastructures and well as provide management and control capabilities for these networks. The IST FP6 project SecurIST is addressing the challenge of developing a European strategic security research agenda for post FP6, designed to drive the development of the security research program for FP7. The project acts as a catalyst bringing together the key research scientists and industry decision makers to develop this agenda. Participation in the development of this agenda is open to all organisations interested in making a contribution to developing a European security and dependability research agenda. The project has ensured uptake of its outputs by creating a security advisory board composed of key industrial experts and decision makers charged with providing guidance to the project in the development of the security research agenda and in promoting the projects outputs to industry. This paper provides a brief overview of SecurIST and an introduction to the security task force initiatives that have been formed. Companies and projects wishing to join these initiatives can still register their interests at www.securitytaskforce.org
关于知识社会的出现,人们进行了很多讨论。推动创建这一社会的引擎是基于媒体、流程和通信网络融合的信息通信技术框架,使人们无论身处何地都能获得无处不在的知识。信息通信技术研究议程的大部分内容都集中在这一框架的规范上。所建议的系统是高度复杂的,需要高度复杂的基础设施和系统的互连。在这个新社会中,信息通信技术的普及在隐私、访问控制、信任和可靠性方面带来了挑战。建立一个有效、安全、可靠的环境,对于知识社会的有效交付至关重要。在欧洲内部创建一个知识社会要求欧洲将自己定位在这一领域研究的前沿。欧洲面临的主要挑战是开发安全解决方案,以保证信息通信技术基础设施的可靠性和弹性,并为这些网络提供管理和控制能力。IST FP6项目SecurIST正在解决为FP6后制定欧洲战略安全研究议程的挑战,旨在推动FP7安全研究计划的发展。该项目起到催化剂的作用,将主要研究科学家和行业决策者聚集在一起,制定这一议程。所有有兴趣为制定欧洲安全和可靠性研究议程做出贡献的组织都可以参与该议程的制定。该项目设立了一个由主要工业专家和决策者组成的安全咨询委员会,负责在制定安全研究议程和向工业推广项目产出方面向该项目提供指导,从而确保其产出得到吸收。本文简要概述了SecurIST,并介绍了已经形成的安全任务组计划。希望加入这些倡议的公司和项目仍然可以在www.securitytaskforce.org上注册他们的兴趣
{"title":"SecurIST: co-ordinating the development of a strategic research agenda for security and dependability R&D","authors":"J. Clarke, W. M. Fitzgerald","doi":"10.1109/CCST.2005.1594887","DOIUrl":"https://doi.org/10.1109/CCST.2005.1594887","url":null,"abstract":"There has been much discussion about the emergence of the knowledge society. The engine driving the creation of this society is an ICT framework based on the convergence of media, processes and communications networks delivering ubiquitous access to knowledge irrespective of location. Much of the ICT research agenda is focused on the specification of this framework. The proposed systems are highly complex requiring the interconnection of highly complex infrastructures and systems. The pervasiveness of ICT in this new society creates challenges in terms of privacy, access control, trust and reliability. The development of an effective secure and dependable environment is crucial for the effective delivery of the knowledge society. The creation of a knowledge society within Europe requires that Europe position itself at the forefront of research in this area. The key challenges for Europe are to develop security solutions, which can guarantee dependability and resilience of ICT infrastructures and well as provide management and control capabilities for these networks. The IST FP6 project SecurIST is addressing the challenge of developing a European strategic security research agenda for post FP6, designed to drive the development of the security research program for FP7. The project acts as a catalyst bringing together the key research scientists and industry decision makers to develop this agenda. Participation in the development of this agenda is open to all organisations interested in making a contribution to developing a European security and dependability research agenda. The project has ensured uptake of its outputs by creating a security advisory board composed of key industrial experts and decision makers charged with providing guidance to the project in the development of the security research agenda and in promoting the projects outputs to industry. This paper provides a brief overview of SecurIST and an introduction to the security task force initiatives that have been formed. Companies and projects wishing to join these initiatives can still register their interests at www.securitytaskforce.org","PeriodicalId":411051,"journal":{"name":"Proceedings 39th Annual 2005 International Carnahan Conference on Security Technology","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114917706","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Towards a model for estimating image difficulty in X-ray screening x射线筛选中图像难度估计模型的研究
A. Schwaninger, S. Michel, A. Bolfing
In this study, we developed a first computational model for estimating image difficulty of X-ray images of passenger bags. Based on Schwaninger (2003) three image-based factors are proposed as predictors of image difficulty; view difficulty of the threat item, superposition by other objects, and bag complexity (i.e. clutter and transparency of the bag). First, these factors were validated using detection experiments. We then developed computer-based algorithms to estimate the image-based factors automatically. Finally, we could show that our computational model can better explain human performance than human ratings of the image-based factors
在本研究中,我们建立了第一个估计旅客行李x射线图像图像难度的计算模型。Schwaninger(2003)提出了三个基于图像的因素作为图像难度的预测因子;查看威胁道具的难度、与其他物体的叠加以及包的复杂性(即包的杂乱性和透明性)。首先,利用检测实验对这些因素进行验证。然后,我们开发了基于计算机的算法来自动估计基于图像的因素。最后,我们可以证明我们的计算模型可以更好地解释人类的表现,而不是人类对基于图像的因素的评分
{"title":"Towards a model for estimating image difficulty in X-ray screening","authors":"A. Schwaninger, S. Michel, A. Bolfing","doi":"10.1109/CCST.2005.1594875","DOIUrl":"https://doi.org/10.1109/CCST.2005.1594875","url":null,"abstract":"In this study, we developed a first computational model for estimating image difficulty of X-ray images of passenger bags. Based on Schwaninger (2003) three image-based factors are proposed as predictors of image difficulty; view difficulty of the threat item, superposition by other objects, and bag complexity (i.e. clutter and transparency of the bag). First, these factors were validated using detection experiments. We then developed computer-based algorithms to estimate the image-based factors automatically. Finally, we could show that our computational model can better explain human performance than human ratings of the image-based factors","PeriodicalId":411051,"journal":{"name":"Proceedings 39th Annual 2005 International Carnahan Conference on Security Technology","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127832925","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Protection of distributed internetworked computers 保护分布式联网计算机
L. Pierson, P. Robertson, J. Van Randwyk, T. Toole
Current methods of enforcing security policy depend on security patches, anti-virus protections, and configuration control, all updated in the end user's computer at ever decreasing intervals. This research is producing a method of hardening the corporate computer infrastructure by prototyping a mixed hardware and software architecture that enforces policies by pushing distributed security functions closer to the end user's computer, but without modifying, relying on or reconfiguring the end user's computer itself. Previous research has developed highly secure network components. Because it is impractical to replace our entire infrastructure with secure, trusted components, this paper investigates how to improve the security of a heterogeneous infrastructure composed of both trusted and untrusted components.
当前执行安全策略的方法依赖于安全补丁、反病毒保护和配置控制,所有这些都在最终用户的计算机中以越来越短的间隔更新。这项研究产生了一种强化企业计算机基础设施的方法,通过原型设计一个混合的硬件和软件架构,通过推动分布式安全功能更接近最终用户的计算机来执行策略,但不修改、依赖或重新配置最终用户的计算机本身。以前的研究已经开发出高度安全的网络组件。由于用安全、可信的组件替换我们的整个基础设施是不切实际的,因此本文研究了如何提高由可信和不可信组件组成的异构基础设施的安全性。
{"title":"Protection of distributed internetworked computers","authors":"L. Pierson, P. Robertson, J. Van Randwyk, T. Toole","doi":"10.1109/CCST.2005.1594882","DOIUrl":"https://doi.org/10.1109/CCST.2005.1594882","url":null,"abstract":"Current methods of enforcing security policy depend on security patches, anti-virus protections, and configuration control, all updated in the end user's computer at ever decreasing intervals. This research is producing a method of hardening the corporate computer infrastructure by prototyping a mixed hardware and software architecture that enforces policies by pushing distributed security functions closer to the end user's computer, but without modifying, relying on or reconfiguring the end user's computer itself. Previous research has developed highly secure network components. Because it is impractical to replace our entire infrastructure with secure, trusted components, this paper investigates how to improve the security of a heterogeneous infrastructure composed of both trusted and untrusted components.","PeriodicalId":411051,"journal":{"name":"Proceedings 39th Annual 2005 International Carnahan Conference on Security Technology","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126722669","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Between detection and neutralization 在检测和中和之间
D. G. Adams, M. Snell, M.W. Green, D. Pritchard
Security system analytical performance analysis is generally based on the probability of system effectiveness. The probability of effectiveness is a function of the probabilities of interruption and neutralization. Interruption occurs if the response forces are notified in sufficient time to engage the adversary. Neutralization occurs if the adversary attack is defeated after the security forces have actively engaged the adversary. Both depend upon communications of data. This paper explores details of embedded communications functions that are often assumed to be inconsequential. It is the intent of the authors to bring focus to an issue in security system modeling that, if not well understood, has the potential to be a deciding factor in the overall system failure or effectiveness
安全系统分析性能分析一般基于系统有效性的概率。有效性的概率是中断概率和中和概率的函数。如果在足够的时间内通知响应部队与对手交战,则发生中断。如果在安全部队积极与对手交战后,对手的攻击被击败,就会发生中立。两者都依赖于数据通信。本文探讨了嵌入式通信功能的细节,这些功能通常被认为是无关紧要的。作者的目的是将重点放在安全系统建模中的一个问题上,如果没有很好地理解,这个问题有可能成为整个系统故障或有效性的决定性因素
{"title":"Between detection and neutralization","authors":"D. G. Adams, M. Snell, M.W. Green, D. Pritchard","doi":"10.1109/CCST.2005.1594846","DOIUrl":"https://doi.org/10.1109/CCST.2005.1594846","url":null,"abstract":"Security system analytical performance analysis is generally based on the probability of system effectiveness. The probability of effectiveness is a function of the probabilities of interruption and neutralization. Interruption occurs if the response forces are notified in sufficient time to engage the adversary. Neutralization occurs if the adversary attack is defeated after the security forces have actively engaged the adversary. Both depend upon communications of data. This paper explores details of embedded communications functions that are often assumed to be inconsequential. It is the intent of the authors to bring focus to an issue in security system modeling that, if not well understood, has the potential to be a deciding factor in the overall system failure or effectiveness","PeriodicalId":411051,"journal":{"name":"Proceedings 39th Annual 2005 International Carnahan Conference on Security Technology","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126852970","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
期刊
Proceedings 39th Annual 2005 International Carnahan Conference on Security Technology
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1