首页 > 最新文献

2016 IEEE International Carnahan Conference on Security Technology (ICCST)最新文献

英文 中文
Tamper evident tape integrity analyzer 篡改明显磁带完整性分析仪
Pub Date : 2016-10-01 DOI: 10.1109/CCST.2016.7815715
E. Rao, J. Remer
The Cargo Supply Chain Integrity Technology (CSIT) Research, Development, Test and Evaluation project, jointly managed by the Transportation Security Administration (TSA) and the Department of Homeland Security's (DHS) Science and Technology (S&T) Directorate develops standards and certifies systems to mitigate threats posed by the potential introduction of improvised explosive devices into cargo carried by passenger aircraft. At the direction of Congress, Public Law 110-53, “Implementing the Recommendations of the 9/11 Commission Act of 2007”, mandates that all 100% of all cargo shipped via passenger aircraft be screened.
货物供应链完整性技术(CSIT)研究、开发、测试和评估项目由运输安全管理局(TSA)和国土安全部(DHS)科学技术局(S&T)联合管理,开发标准和认证系统,以减轻可能引入简易爆炸装置的威胁。根据国会的指示,公法110-53“实施2007年9/11委员会法案的建议”要求对所有通过客机运输的货物进行100%的检查。
{"title":"Tamper evident tape integrity analyzer","authors":"E. Rao, J. Remer","doi":"10.1109/CCST.2016.7815715","DOIUrl":"https://doi.org/10.1109/CCST.2016.7815715","url":null,"abstract":"The Cargo Supply Chain Integrity Technology (CSIT) Research, Development, Test and Evaluation project, jointly managed by the Transportation Security Administration (TSA) and the Department of Homeland Security's (DHS) Science and Technology (S&T) Directorate develops standards and certifies systems to mitigate threats posed by the potential introduction of improvised explosive devices into cargo carried by passenger aircraft. At the direction of Congress, Public Law 110-53, “Implementing the Recommendations of the 9/11 Commission Act of 2007”, mandates that all 100% of all cargo shipped via passenger aircraft be screened.","PeriodicalId":6510,"journal":{"name":"2016 IEEE International Carnahan Conference on Security Technology (ICCST)","volume":"11 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87000356","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Underwater threat detection and tracking using multiple sensors and advanced processing 水下威胁检测和跟踪使用多个传感器和先进的处理
Pub Date : 2016-10-01 DOI: 10.1109/CCST.2016.7815723
A. Meecham, T. Acker
The vulnerability of military installations and critical infrastructure sites from underwater threats is now well accepted and, in order to combat these security weaknesses, there has been growing interest in - and adoption of - sonar technology. Greater availability of Autonomous/Unmanned Underwater Vehicles (A/UUVs) to both adversary nations and terrorists/saboteurs is also a cause of increasing concern. The small size and low acoustic target strength/signature of these vehicles presents significant challenges for sonar systems. The well-known challenges of the underwater environment, particularly in a harbor or port setting, can lead to a Nuisance Alarm Rate (NAR) that is higher than that of traditional security sensors (e.g. CCTV). This, in turn, can lead to a lack of confidence from end users and a possibility that `real' alerts are incorrectly dism issed. In the past this has been addressed by increasing the capability of individual sensors, leading to ever-increasing sensor complexity, however, the relationship between sensor performance and complexity/cost is highly non-linear. Even with the most complex and capable sensors, the fundamental limit to performance is often limited by acoustics, not sensor capability. In this paper we describe an alternative approach to reducing NAR and improving detection of difficult targets (e.g. UUVs), through intelligent combination and fusion of outputs from multiple sensors and data/signal processing algorithms. We describe the statistical basis for this approach, as well as techniques, methodologies and architectures for implementation. We describe the approach taken in our prototype algorithms/system, as well as quantitative and qualitative results from testing in a real-world environment. These results show a significant reduction in NAR and increase in classiflcation/alert range. Finally, we describe current focus areas for algorithmic and system development in both the short and medium term, as well as future extensions of these techniques to more classes of sensors, so that more challenging problems can be addressed.
军事设施和关键基础设施易受水下威胁的脆弱性现在已被广泛接受,为了打击这些安全弱点,人们对声纳技术的兴趣和采用日益增加。自动/无人水下航行器(A/ uuv)对敌对国家和恐怖分子/破坏分子的更大可用性也引起了越来越多的关注。这些车辆的小尺寸和低声学目标强度/特征对声纳系统提出了重大挑战。众所周知,水下环境的挑战,特别是在港口或港口设置中,可能导致比传统安全传感器(例如CCTV)更高的滋扰报警率(NAR)。反过来,这可能导致最终用户缺乏信心,并有可能错误地发出“真实”警报。在过去,这是通过增加单个传感器的能力来解决的,导致传感器的复杂性不断增加,然而,传感器性能与复杂性/成本之间的关系是高度非线性的。即使是最复杂和功能最强大的传感器,其性能的基本限制往往是由声学限制,而不是传感器的能力。在本文中,我们描述了一种替代方法,通过智能组合和融合来自多个传感器和数据/信号处理算法的输出来减少NAR和提高对困难目标(例如uuv)的检测。我们描述了这种方法的统计基础,以及实现的技术、方法和体系结构。我们描述了我们在原型算法/系统中采用的方法,以及在现实环境中测试的定量和定性结果。这些结果显示NAR显著减少,分类/警报范围增加。最后,我们描述了短期和中期算法和系统开发的当前重点领域,以及这些技术未来扩展到更多类别的传感器,以便解决更具挑战性的问题。
{"title":"Underwater threat detection and tracking using multiple sensors and advanced processing","authors":"A. Meecham, T. Acker","doi":"10.1109/CCST.2016.7815723","DOIUrl":"https://doi.org/10.1109/CCST.2016.7815723","url":null,"abstract":"The vulnerability of military installations and critical infrastructure sites from underwater threats is now well accepted and, in order to combat these security weaknesses, there has been growing interest in - and adoption of - sonar technology. Greater availability of Autonomous/Unmanned Underwater Vehicles (A/UUVs) to both adversary nations and terrorists/saboteurs is also a cause of increasing concern. The small size and low acoustic target strength/signature of these vehicles presents significant challenges for sonar systems. The well-known challenges of the underwater environment, particularly in a harbor or port setting, can lead to a Nuisance Alarm Rate (NAR) that is higher than that of traditional security sensors (e.g. CCTV). This, in turn, can lead to a lack of confidence from end users and a possibility that `real' alerts are incorrectly dism issed. In the past this has been addressed by increasing the capability of individual sensors, leading to ever-increasing sensor complexity, however, the relationship between sensor performance and complexity/cost is highly non-linear. Even with the most complex and capable sensors, the fundamental limit to performance is often limited by acoustics, not sensor capability. In this paper we describe an alternative approach to reducing NAR and improving detection of difficult targets (e.g. UUVs), through intelligent combination and fusion of outputs from multiple sensors and data/signal processing algorithms. We describe the statistical basis for this approach, as well as techniques, methodologies and architectures for implementation. We describe the approach taken in our prototype algorithms/system, as well as quantitative and qualitative results from testing in a real-world environment. These results show a significant reduction in NAR and increase in classiflcation/alert range. Finally, we describe current focus areas for algorithmic and system development in both the short and medium term, as well as future extensions of these techniques to more classes of sensors, so that more challenging problems can be addressed.","PeriodicalId":6510,"journal":{"name":"2016 IEEE International Carnahan Conference on Security Technology (ICCST)","volume":"C-35 1","pages":"1-7"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84452086","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
RSA based biometric encryption system using FPGA for increased security 基于RSA的生物识别加密系统采用FPGA,提高了安全性
Pub Date : 2016-10-01 DOI: 10.1109/CCST.2016.7815699
Michael Bourg, Pramod Govindan
The biometric encryption system is a significant addition in the areas of privacy, security and convenience among its users. The intent of this research is to propose an RSA based biometric encryption system which can be realized on field programmable gate arrays (FPGAs) using hardware-software co-design methods. Due to the high number of hackers that stand to profit from sub-par security methods, the proposed design will serve as a high level of security. This implementation can be applied in many areas of life including but not limited to password replacement, building and equipment access, and payroll and timekeeping procedures.
生物识别加密系统在隐私、安全性和便利性方面对用户来说是一个重要的补充。本研究的目的是提出一种基于RSA的生物特征加密系统,该系统可以使用硬件软件协同设计方法在现场可编程门阵列(fpga)上实现。由于大量黑客会从低于标准的安全方法中获利,因此所建议的设计将作为高级别安全性。这种实现可以应用于生活的许多领域,包括但不限于密码替换、建筑物和设备访问、工资和计时程序。
{"title":"RSA based biometric encryption system using FPGA for increased security","authors":"Michael Bourg, Pramod Govindan","doi":"10.1109/CCST.2016.7815699","DOIUrl":"https://doi.org/10.1109/CCST.2016.7815699","url":null,"abstract":"The biometric encryption system is a significant addition in the areas of privacy, security and convenience among its users. The intent of this research is to propose an RSA based biometric encryption system which can be realized on field programmable gate arrays (FPGAs) using hardware-software co-design methods. Due to the high number of hackers that stand to profit from sub-par security methods, the proposed design will serve as a high level of security. This implementation can be applied in many areas of life including but not limited to password replacement, building and equipment access, and payroll and timekeeping procedures.","PeriodicalId":6510,"journal":{"name":"2016 IEEE International Carnahan Conference on Security Technology (ICCST)","volume":"20 1","pages":"1-4"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84905886","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
On the application of symbolic regression and genetic programming for cryptanalysis of symmetric encryption algorithm 符号回归和遗传规划在对称加密算法密码分析中的应用
Pub Date : 2016-10-01 DOI: 10.1109/CCST.2016.7815720
Tomas Smetka, I. Homoliak, P. Hanáček
The aim of the paper is to show different point of view on the problem of cryptanalysis of symmetric encryption algorithms. Our dissimilar approach, compared to the existing methods, lies in the use of the power of evolutionary principles which are in our cryptanalytic system applied with leveraging of the genetic programming (GP) in order to perform known plaintext attack (KPA). Our expected result is to find a program (i.e. function) that models the behavior of a symmetric encryption algorithm DES instantiated by specific key. If such a program would exist, then it could be possible to decipher new messages that have been encrypted by unknown secret key. The GP is employed as the basis of this work. GP is an evolutionary algorithm-based methodology inspired by biological evolution which is capable of creating computer programs solving a corresponding problem. The symbolic regression (SR) method is employed as the application of GP in practical problem. The SR method builds functions from predefined set of terminal blocks in the process of the GP evolution; and these functions approximate a list of input value pairs. The evolution of GP is controlled by a fitness function which evaluates the goal of a corresponding problem. The Hamming distance, a difference between a current individual value and a reference one, is chosen as the fitness function for our cryptanalysis problem. The results of our experiments did not confirmed initial expectation. The number of encryption rounds did not influence the quality of the best individual, however, its quality was influenced by the cardinality of a training set. The elimination of the initial and final permutations had no influence on the quality of the results in the process of evolution. These results showed that our KPA GP solution is not capable of revealing internal structure of the DES algorithm's behavior.
本文的目的是对对称加密算法的密码分析问题给出不同的观点。与现有方法相比,我们的不同方法在于使用我们的密码分析系统中的进化原理的力量,利用遗传编程(GP)来执行已知的明文攻击(KPA)。我们期望的结果是找到一个程序(即函数)来模拟由特定密钥实例化的对称加密算法DES的行为。如果存在这样的程序,那么就有可能破译由未知密钥加密的新消息。GP被用作这项工作的基础。GP是一种基于进化算法的方法论,它受到生物进化的启发,能够创建解决相应问题的计算机程序。采用符号回归(SR)方法作为GP在实际问题中的应用。SR方法在GP演化过程中从预定义的一组终端块中构建函数;这些函数近似于输入值对的列表。GP的演化由一个适应度函数控制,适应度函数用来评价相应问题的目标。选择汉明距离,即当前个体值与参考值之间的差值,作为我们的密码分析问题的适应度函数。我们的实验结果没有证实最初的预期。加密轮数不影响最佳个体的质量,但其质量受到训练集基数的影响。在进化过程中,消除初始和最终排列对结果的质量没有影响。这些结果表明,我们的KPA GP解不能揭示DES算法行为的内部结构。
{"title":"On the application of symbolic regression and genetic programming for cryptanalysis of symmetric encryption algorithm","authors":"Tomas Smetka, I. Homoliak, P. Hanáček","doi":"10.1109/CCST.2016.7815720","DOIUrl":"https://doi.org/10.1109/CCST.2016.7815720","url":null,"abstract":"The aim of the paper is to show different point of view on the problem of cryptanalysis of symmetric encryption algorithms. Our dissimilar approach, compared to the existing methods, lies in the use of the power of evolutionary principles which are in our cryptanalytic system applied with leveraging of the genetic programming (GP) in order to perform known plaintext attack (KPA). Our expected result is to find a program (i.e. function) that models the behavior of a symmetric encryption algorithm DES instantiated by specific key. If such a program would exist, then it could be possible to decipher new messages that have been encrypted by unknown secret key. The GP is employed as the basis of this work. GP is an evolutionary algorithm-based methodology inspired by biological evolution which is capable of creating computer programs solving a corresponding problem. The symbolic regression (SR) method is employed as the application of GP in practical problem. The SR method builds functions from predefined set of terminal blocks in the process of the GP evolution; and these functions approximate a list of input value pairs. The evolution of GP is controlled by a fitness function which evaluates the goal of a corresponding problem. The Hamming distance, a difference between a current individual value and a reference one, is chosen as the fitness function for our cryptanalysis problem. The results of our experiments did not confirmed initial expectation. The number of encryption rounds did not influence the quality of the best individual, however, its quality was influenced by the cardinality of a training set. The elimination of the initial and final permutations had no influence on the quality of the results in the process of evolution. These results showed that our KPA GP solution is not capable of revealing internal structure of the DES algorithm's behavior.","PeriodicalId":6510,"journal":{"name":"2016 IEEE International Carnahan Conference on Security Technology (ICCST)","volume":"69 1","pages":"1-8"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81804012","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Extending abstraction-refinement methods for compliance checking of inter-organizational business processes with incomplete information 扩展抽象细化方法,用于使用不完整信息检查组织间业务流程的遵从性
Pub Date : 2016-10-01 DOI: 10.1109/CCST.2016.7815703
A. C. D'Iddio, C. Schunck, F. Arcieri, M. Talamo
Conformance checking is a crucial challenge for modern inter-organizational business processes when critical security, privacy and workflow constraints must be satisfied to ensure the reliability of multi-party business procedures. Many of these constraints can be expressed in terms of causal dependencies, and verifying such dependencies can be fundamental to determine the correctness of transactions. But often the information required to check causal dependencies is incomplete, coarse or imprecise due to several reasons, like low maturity of event logs, corrupted data, local timestamping and privacy requirements of each organization. In previous work we presented a solution to address these issues based on abstraction, over-approximation and under-approximation of the causal dependencies, to model unavailable data and maintain the ability to prove correctness or to find anomalies in inter-organizational transactions. In that paper we made some assumptions about the structure of business processes which are reasonable for security sensitive business processes but cannot be applied in all circumstances. In this paper we relax the assumptions made in that previous work and we discuss how this affects the applicability of the theorems. We find that while some notions need to be redefined, in most cases the same techniques, especially the ones based on underapproximation, remain applicable to investigate the correctness of business processes and to find anomalies for post-mortem investigation or online operational support.
当必须满足关键的安全性、隐私性和工作流约束以确保多方业务流程的可靠性时,一致性检查是现代组织间业务流程的一个关键挑战。这些约束中的许多都可以用因果依赖关系来表示,验证这些依赖关系对于确定事务的正确性至关重要。但是,由于事件日志成熟度低、数据损坏、本地时间戳和每个组织的隐私要求等原因,检查因果关系所需的信息通常是不完整、粗糙或不精确的。在之前的工作中,我们提出了一个解决方案来解决这些问题,该解决方案基于抽象、因果依赖关系的过度近似和不足近似、对不可用数据进行建模,并保持证明正确性或发现组织间事务异常的能力。在那篇论文中,我们对业务流程的结构做了一些假设,这些假设对于安全敏感的业务流程是合理的,但不能应用于所有情况。在本文中,我们放宽了在以前的工作中所做的假设,并讨论了这如何影响定理的适用性。我们发现,虽然有些概念需要重新定义,但在大多数情况下,相同的技术,特别是基于欠近似的技术,仍然适用于调查业务流程的正确性,并为事后调查或在线操作支持发现异常。
{"title":"Extending abstraction-refinement methods for compliance checking of inter-organizational business processes with incomplete information","authors":"A. C. D'Iddio, C. Schunck, F. Arcieri, M. Talamo","doi":"10.1109/CCST.2016.7815703","DOIUrl":"https://doi.org/10.1109/CCST.2016.7815703","url":null,"abstract":"Conformance checking is a crucial challenge for modern inter-organizational business processes when critical security, privacy and workflow constraints must be satisfied to ensure the reliability of multi-party business procedures. Many of these constraints can be expressed in terms of causal dependencies, and verifying such dependencies can be fundamental to determine the correctness of transactions. But often the information required to check causal dependencies is incomplete, coarse or imprecise due to several reasons, like low maturity of event logs, corrupted data, local timestamping and privacy requirements of each organization. In previous work we presented a solution to address these issues based on abstraction, over-approximation and under-approximation of the causal dependencies, to model unavailable data and maintain the ability to prove correctness or to find anomalies in inter-organizational transactions. In that paper we made some assumptions about the structure of business processes which are reasonable for security sensitive business processes but cannot be applied in all circumstances. In this paper we relax the assumptions made in that previous work and we discuss how this affects the applicability of the theorems. We find that while some notions need to be redefined, in most cases the same techniques, especially the ones based on underapproximation, remain applicable to investigate the correctness of business processes and to find anomalies for post-mortem investigation or online operational support.","PeriodicalId":6510,"journal":{"name":"2016 IEEE International Carnahan Conference on Security Technology (ICCST)","volume":"11 1","pages":"1-7"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83802333","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The Internet of Everything based integrated security system of the World War One Commemorative Museum of Fogliano Redipuglia in Italy 意大利Fogliano Redipuglia一战纪念博物馆基于万物互联的综合安防系统
Pub Date : 2016-10-01 DOI: 10.1109/CCST.2016.7815683
F. Garzia, L. Sant'Andrea
The purpose of this paper is to illustrate the Internet of Everything based integrated security system designed for World War One commemorative Museum of Fogliano Redipuglia in Italy, capable of ensuring visitors security, cultural heritage préservâtion/protection and great usability for visitors, with particular reference to visitors with disabilities. Genetic Algorithms (GAs) have been used to design the integrated security system, in particular for wired network to ensure a reduction of final costs and a high level of reliability and resilience of the system itself, keeping, into consideration, the typical vincula and restrictions of already existing Museums. The proposed system, together with the GAs based optimization technique, thanks to its flexibility, can be used in any kind of museum or any kind of cultural site by means of a proper adaption.
本文旨在阐述为意大利Fogliano Redipuglia第一次世界大战纪念博物馆设计的基于万物互联的综合安保系统,该系统能够确保游客的安全,保护文化遗产,并为游客提供良好的可用性,特别是残疾人游客。遗传算法(GAs)已被用于设计综合安全系统,特别是有线网络,以确保降低最终成本和系统本身的高水平可靠性和弹性,同时考虑到现有博物馆的典型范围和限制。该系统与基于GAs的优化技术相结合,由于其灵活性,可以通过适当的调整用于任何类型的博物馆或任何类型的文化遗址。
{"title":"The Internet of Everything based integrated security system of the World War One Commemorative Museum of Fogliano Redipuglia in Italy","authors":"F. Garzia, L. Sant'Andrea","doi":"10.1109/CCST.2016.7815683","DOIUrl":"https://doi.org/10.1109/CCST.2016.7815683","url":null,"abstract":"The purpose of this paper is to illustrate the Internet of Everything based integrated security system designed for World War One commemorative Museum of Fogliano Redipuglia in Italy, capable of ensuring visitors security, cultural heritage préservâtion/protection and great usability for visitors, with particular reference to visitors with disabilities. Genetic Algorithms (GAs) have been used to design the integrated security system, in particular for wired network to ensure a reduction of final costs and a high level of reliability and resilience of the system itself, keeping, into consideration, the typical vincula and restrictions of already existing Museums. The proposed system, together with the GAs based optimization technique, thanks to its flexibility, can be used in any kind of museum or any kind of cultural site by means of a proper adaption.","PeriodicalId":6510,"journal":{"name":"2016 IEEE International Carnahan Conference on Security Technology (ICCST)","volume":"7 1","pages":"1-8"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82500203","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Base camp quality of life standardization and improvement 大本营生活质量标准化和提高
Pub Date : 2016-10-01 DOI: 10.1109/ccst.2016.7815688
Patrick K. Kuiper, S. Kolitz, V. Tarokh
The United States (US) Army has over 66,000 soldiers engaged in contingency operations across the world. Current budgetary constraints and an uncertain global security environment require these operations to be executed as efficiently as possible. Base camps are the secured areas where soldiers live when deployed to contingency operations. Base camps impose a significant financial and tactical burden during contingency operations and sub-optimal soldier quality of life decisions have significantly contributed to costs. Quality of life (QOL) refers to the non-security and non-mission related services that directly sustain the mission effectiveness of soldiers. Current US Army base camp tactics, techniques, and procedures (TTPs) do not sufficiently specify QOL services, and more detailed doctrine should be developed to support combat units executing contingency operations. In this investigation we employ quantitative methods to select decisions that improve QOL and inform doctrine. We leverage a QOL function and resource consumption data developed by US Army Natick Soldier Research, Development and Engineering Center's (Natick Labs) to build a model that improves QOL under the constraints of four fundamental resources: fuel, water, waste water, and solid waste. We employ a mixed integer linear program modeling approach and execute sensitivity analysis to evaluate the strength of our results. Our final model is formulated as a chance constraint optimization to address the uncertainty associated with resource availability in contingency operations. Our results provide QOL decisions that reduce resource consumption while maintaining an equivalent QOL level when compared to current TTPs. The model provides quantitative rigor, informing decision makers of specific base camp design principles for the development of doctrine.
美国陆军有超过66,000名士兵在世界各地参与应急行动。目前的预算限制和不确定的全球安全环境要求尽可能有效地执行这些行动。基地营地是士兵被部署到应急行动时居住的安全区域。在应急行动期间,基地营造成了重大的财政和战术负担,士兵生活质量欠佳的决定大大增加了成本。生活质量(Quality of life, QOL)是指直接维持士兵执行任务效能的与安全、任务无关的服务。目前的美国陆军大本营战术、技术和程序(TTPs)没有充分说明QOL服务,应该制定更详细的理论来支持作战单位执行应急行动。在这项调查中,我们采用定量方法来选择决策,提高生活质量和通知学说。我们利用美国陆军纳蒂克士兵研究、发展和工程中心(纳蒂克实验室)开发的生活质量函数和资源消耗数据,建立了一个模型,在燃料、水、废水和固体废物四种基本资源的约束下提高生活质量。我们采用混合整数线性规划建模方法,并执行敏感性分析来评估我们的结果的强度。我们的最终模型是一个机会约束优化,以解决应急操作中与资源可用性相关的不确定性。我们的结果提供的QOL决策减少了资源消耗,同时与当前的ttp相比保持了等效的QOL水平。该模型提供了定量的严谨性,为理论发展提供了具体大本营设计原则的信息。
{"title":"Base camp quality of life standardization and improvement","authors":"Patrick K. Kuiper, S. Kolitz, V. Tarokh","doi":"10.1109/ccst.2016.7815688","DOIUrl":"https://doi.org/10.1109/ccst.2016.7815688","url":null,"abstract":"The United States (US) Army has over 66,000 soldiers engaged in contingency operations across the world. Current budgetary constraints and an uncertain global security environment require these operations to be executed as efficiently as possible. Base camps are the secured areas where soldiers live when deployed to contingency operations. Base camps impose a significant financial and tactical burden during contingency operations and sub-optimal soldier quality of life decisions have significantly contributed to costs. Quality of life (QOL) refers to the non-security and non-mission related services that directly sustain the mission effectiveness of soldiers. Current US Army base camp tactics, techniques, and procedures (TTPs) do not sufficiently specify QOL services, and more detailed doctrine should be developed to support combat units executing contingency operations. In this investigation we employ quantitative methods to select decisions that improve QOL and inform doctrine. We leverage a QOL function and resource consumption data developed by US Army Natick Soldier Research, Development and Engineering Center's (Natick Labs) to build a model that improves QOL under the constraints of four fundamental resources: fuel, water, waste water, and solid waste. We employ a mixed integer linear program modeling approach and execute sensitivity analysis to evaluate the strength of our results. Our final model is formulated as a chance constraint optimization to address the uncertainty associated with resource availability in contingency operations. Our results provide QOL decisions that reduce resource consumption while maintaining an equivalent QOL level when compared to current TTPs. The model provides quantitative rigor, informing decision makers of specific base camp design principles for the development of doctrine.","PeriodicalId":6510,"journal":{"name":"2016 IEEE International Carnahan Conference on Security Technology (ICCST)","volume":"47 1","pages":"1-8"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82618900","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Field trial results using a novel integration of unique millimeterwave Doppler radar for high performance non-obtrusive life sign (breathing and heart beating) monitoring of high suicide risk prisonner in observation cell 现场试验结果使用新颖集成的独特毫米波多普勒雷达对观察牢房中高自杀风险囚犯进行高性能非突发性生命体征(呼吸和心跳)监测
Pub Date : 2016-10-01 DOI: 10.1109/CCST.2016.7815682
A. Gagnon
This paper presents the fields results in non-obtrusive life sign monitoring performed using a low emission, compact high frequency Doppler radar, which can detect body movements associated with breathing and the heart beating. Such a system is particularly useful where attaching sensors to the body is undesirable; for example, monitoring detainees in a prison who are at risk of suicide, self-harm, and medical complications due to drugs or alcohol. This method of monitoring can aid greatly in situations where it can be difficult to ascertain a person's status, such as a person who is sleeping under a blanket. While a breathing and cardiac signal is visible in the Doppler radar signal, it can be corrupted by noise and interference by so-called nuisance signals (e.g., movements associated with fans, water flowing from faucets and toilets, door micro-motion, light fixture ballast vibration and other body movements). This work is part of a three-year project that involves four organizations; CSC (end-user), KG Spectrum (radar-based perimeter intrusion detection systems), Carleton-University (bio-medical) and Ottawa-University (signal processing). The final goal is to develop a robust system for detection of attempted suicide events in prisons in time to allow for lifesaving interventions. This has been done in a novel way by installing one high range (75cm) spacial resolution, scanning antenna and high frequency (24.125GHz) radars in prison cells and by processing signals extracted from the radars in real-time. This unique radar architecture allows the usage of novel signal processing and pattern recognition algorithms to locate the subject and removing interference and reliably estimate breathing and heartbeat signals, even when the subject is non-stationary and then to produce an alarm when these signals cannot be observed or significant changes, in breathing pattern or heart rate pattern, representing abnormal behavior have been detected within the observation cell. This research project is performing time, frequency and pattern domain analysis on the radar data and explores signal processing approaches for the robust and accurate detection and estimation of the respiratory with heartbeat rate. Outcome of this research will be useful in mitigating the risks associated with detainees by providing a life sign monitoring approach that can help enable timely responses. Such a system can also find application in smart health homes for monitoring people at risk, such as the elderly or infants, as well as in psychological institution. In addition to presenting the results of filed trial, this paper covers the innovative engineering aspects of using high frequency, high range resolution and high sampling rate as a mean to geo-localize the source of movement within the prison cells, thereby increasing the efficiency of the signal processing eliminating the need to process on overall volume wise integrated Doppler signal. The use of geo-localization provide
本文介绍了使用低发射,紧凑的高频多普勒雷达进行非突发性生命体征监测的领域结果,该雷达可以检测与呼吸和心脏跳动相关的身体运动。这种系统在不希望将传感器附加到身体上的情况下特别有用;例如,监测监狱中因吸毒或酗酒而有自杀、自残和并发症风险的被拘留者。这种监测方法可以在难以确定一个人的状态的情况下提供很大的帮助,例如一个人睡在毯子下。虽然呼吸和心脏信号在多普勒雷达信号中是可见的,但它可能会被噪音和所谓的干扰信号(例如,与风扇相关的运动、水龙头和厕所的水流、门的微运动、灯具镇流器的振动和其他身体运动)所破坏。这项工作是一个涉及四个组织的三年项目的一部分;CSC(终端用户),KG Spectrum(基于雷达的外围入侵检测系统),卡尔顿大学(生物医学)和渥太华大学(信号处理)。最终目标是建立一个强有力的系统,及时发现监狱中的自杀未遂事件,以便采取挽救生命的干预措施。通过在监狱牢房中安装一个高距离(75厘米)空间分辨率的扫描天线和高频(24.125GHz)雷达,并实时处理从雷达中提取的信号,以一种新颖的方式实现了这一目标。这种独特的雷达架构允许使用新颖的信号处理和模式识别算法来定位受试者,消除干扰,并可靠地估计呼吸和心跳信号,即使受试者是非静止的,然后当这些信号不能被观察到或在呼吸模式或心率模式中发生重大变化时产生警报,代表在观察单元内检测到异常行为。本研究项目对雷达数据进行时间、频率和模式域分析,探索信号处理方法,以鲁棒准确地检测和估计呼吸与心率。这项研究的结果将有助于减少与被拘留者有关的风险,因为它提供了一种生命迹象监测方法,有助于及时作出反应。这种系统还可以应用于智能健康之家,用于监测高危人群,如老年人或婴儿,以及心理机构。除了介绍现场试验的结果外,本文还涵盖了使用高频、高范围分辨率和高采样率作为对监狱牢房内运动源进行地理定位的手段的创新工程方面,从而提高了信号处理的效率,消除了对整体体积的集成多普勒信号进行处理的需要。地理定位的使用提供了对滋扰源的自然辨别,允许信号处理器专注于囚犯心跳和呼吸反应产生的多普勒信号。
{"title":"Field trial results using a novel integration of unique millimeterwave Doppler radar for high performance non-obtrusive life sign (breathing and heart beating) monitoring of high suicide risk prisonner in observation cell","authors":"A. Gagnon","doi":"10.1109/CCST.2016.7815682","DOIUrl":"https://doi.org/10.1109/CCST.2016.7815682","url":null,"abstract":"This paper presents the fields results in non-obtrusive life sign monitoring performed using a low emission, compact high frequency Doppler radar, which can detect body movements associated with breathing and the heart beating. Such a system is particularly useful where attaching sensors to the body is undesirable; for example, monitoring detainees in a prison who are at risk of suicide, self-harm, and medical complications due to drugs or alcohol. This method of monitoring can aid greatly in situations where it can be difficult to ascertain a person's status, such as a person who is sleeping under a blanket. While a breathing and cardiac signal is visible in the Doppler radar signal, it can be corrupted by noise and interference by so-called nuisance signals (e.g., movements associated with fans, water flowing from faucets and toilets, door micro-motion, light fixture ballast vibration and other body movements). This work is part of a three-year project that involves four organizations; CSC (end-user), KG Spectrum (radar-based perimeter intrusion detection systems), Carleton-University (bio-medical) and Ottawa-University (signal processing). The final goal is to develop a robust system for detection of attempted suicide events in prisons in time to allow for lifesaving interventions. This has been done in a novel way by installing one high range (75cm) spacial resolution, scanning antenna and high frequency (24.125GHz) radars in prison cells and by processing signals extracted from the radars in real-time. This unique radar architecture allows the usage of novel signal processing and pattern recognition algorithms to locate the subject and removing interference and reliably estimate breathing and heartbeat signals, even when the subject is non-stationary and then to produce an alarm when these signals cannot be observed or significant changes, in breathing pattern or heart rate pattern, representing abnormal behavior have been detected within the observation cell. This research project is performing time, frequency and pattern domain analysis on the radar data and explores signal processing approaches for the robust and accurate detection and estimation of the respiratory with heartbeat rate. Outcome of this research will be useful in mitigating the risks associated with detainees by providing a life sign monitoring approach that can help enable timely responses. Such a system can also find application in smart health homes for monitoring people at risk, such as the elderly or infants, as well as in psychological institution. In addition to presenting the results of filed trial, this paper covers the innovative engineering aspects of using high frequency, high range resolution and high sampling rate as a mean to geo-localize the source of movement within the prison cells, thereby increasing the efficiency of the signal processing eliminating the need to process on overall volume wise integrated Doppler signal. The use of geo-localization provide","PeriodicalId":6510,"journal":{"name":"2016 IEEE International Carnahan Conference on Security Technology (ICCST)","volume":"25 1","pages":"1-9"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75230766","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Architecture of instant messaging systems for secure data transmision 用于安全数据传输的即时消息系统的体系结构
Pub Date : 2016-10-01 DOI: 10.1109/CCST.2016.7815685
Jimmy Anderson Florez Zuluaga, R. C. Logreira, Mario Muñoz, J. Vargas-Bonilla
The use of online messaging systems to exchange information has changed due to the ability to share text, video and pictures almost immediately. Also it has become an excellent alternative for transmitting data with certain reserve levels in places or where voice signals and other forms of communication are not of high quality and/or availability, creating gaps in critical information security systems. This article describes the inherent risk of use messaging apphcations for transmission of classified information, based on user needs, but with a concept of organizational use. The analyzed elements are usability, privacy of contacts and content, data security, safe storage of information, traceability of messages, lifespan of the message, information storage encryption protocols and channel codification. Because of this, in this project, a survey has been conducted in regards to acceptable requirements applicable to these technologies in the work sector. This has led to the design of a set of applications from a usability standpoint while ensuring adequate and flexible security levels. Work completed in this research included aspects of design and architecture of a XMPP messaging system, privacy of information, use of local databases and storage of information according to relevant corporate security policies and agreements, biometric recognition systems for authentication encryption protocols.
由于能够几乎立即共享文本、视频和图片,使用在线消息系统交换信息已经发生了变化。此外,它已成为在某些地方或语音信号和其他形式的通信质量不高和/或可用性不高的地方传输具有一定储备水平的数据的绝佳替代方案,从而在关键的信息安全系统中造成空白。本文描述了基于用户需求使用消息传递应用程序传输分类信息的固有风险,但包含了组织使用的概念。分析的要素包括可用性、联系人和内容的隐私性、数据安全性、信息的安全存储、消息的可追溯性、消息的寿命、信息存储加密协议和通道编码。因此,在本项目中,对工作部门中适用于这些技术的可接受要求进行了调查。这导致从可用性的角度设计一组应用程序,同时确保充分和灵活的安全级别。本研究完成的工作包括XMPP消息传递系统的设计和架构、信息隐私、本地数据库的使用以及根据相关公司安全政策和协议存储信息、用于身份验证加密协议的生物识别系统等方面。
{"title":"Architecture of instant messaging systems for secure data transmision","authors":"Jimmy Anderson Florez Zuluaga, R. C. Logreira, Mario Muñoz, J. Vargas-Bonilla","doi":"10.1109/CCST.2016.7815685","DOIUrl":"https://doi.org/10.1109/CCST.2016.7815685","url":null,"abstract":"The use of online messaging systems to exchange information has changed due to the ability to share text, video and pictures almost immediately. Also it has become an excellent alternative for transmitting data with certain reserve levels in places or where voice signals and other forms of communication are not of high quality and/or availability, creating gaps in critical information security systems. This article describes the inherent risk of use messaging apphcations for transmission of classified information, based on user needs, but with a concept of organizational use. The analyzed elements are usability, privacy of contacts and content, data security, safe storage of information, traceability of messages, lifespan of the message, information storage encryption protocols and channel codification. Because of this, in this project, a survey has been conducted in regards to acceptable requirements applicable to these technologies in the work sector. This has led to the design of a set of applications from a usability standpoint while ensuring adequate and flexible security levels. Work completed in this research included aspects of design and architecture of a XMPP messaging system, privacy of information, use of local databases and storage of information according to relevant corporate security policies and agreements, biometric recognition systems for authentication encryption protocols.","PeriodicalId":6510,"journal":{"name":"2016 IEEE International Carnahan Conference on Security Technology (ICCST)","volume":"134 1","pages":"1-7"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80464194","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
On the evaluation of human ratings for signature recognition 关于签名识别中人类评分的评价
Pub Date : 2016-10-01 DOI: 10.1109/CCST.2016.7815681
D. Morocho, J. Hernandez-Ortega, A. Morales, Julian Fierrez, J. Ortega-Garcia
This work explores the human ability to recognize the authenticity of signatures. We use crowdsourcing to analyze the different factors affecting the performance of humans without Forensic Document Examiner experience. We present different experiments according to different scenarios in which laymen, people without Forensic Document Examiner experience, provide similarity measures related with the perceived authenticity of a given signature. The human responses are used to analyze the performance of humans according to each of the scenarios and main factors. The experiments comprise 240 signatures from BiosecurlD public database and responses from more than 400 people. The results shows the difficulties associated to these tasks, with special attention to the false acceptance of forgeries with rates ranging from 50% to 75%. The results suggest that human recognition abilities in this scenario are strongly dependent on the characteristics considered and the signature at hand. Finally the combination of human ratings clearly outperfoms the individual performance and and a state-of-the-art automatic signature verification system.
这个作品探讨了人类识别签名真实性的能力。我们使用众包来分析在没有法医文件审查员经验的情况下影响人类表现的不同因素。我们根据不同的场景提出了不同的实验,在这些场景中,外行人,没有法医文件审查员经验的人,提供了与给定签名的感知真实性相关的相似性测量。人的反应被用来根据每个场景和主要因素分析人的表现。这些实验包括来自BiosecurlD公共数据库的240个签名和400多人的回复。结果显示了与这些任务相关的困难,特别注意伪造品的错误接受率从50%到75%不等。结果表明,在这种情况下,人类的识别能力强烈依赖于所考虑的特征和手头的签名。最后,人类评分的组合明显优于个人表现和最先进的自动签名验证系统。
{"title":"On the evaluation of human ratings for signature recognition","authors":"D. Morocho, J. Hernandez-Ortega, A. Morales, Julian Fierrez, J. Ortega-Garcia","doi":"10.1109/CCST.2016.7815681","DOIUrl":"https://doi.org/10.1109/CCST.2016.7815681","url":null,"abstract":"This work explores the human ability to recognize the authenticity of signatures. We use crowdsourcing to analyze the different factors affecting the performance of humans without Forensic Document Examiner experience. We present different experiments according to different scenarios in which laymen, people without Forensic Document Examiner experience, provide similarity measures related with the perceived authenticity of a given signature. The human responses are used to analyze the performance of humans according to each of the scenarios and main factors. The experiments comprise 240 signatures from BiosecurlD public database and responses from more than 400 people. The results shows the difficulties associated to these tasks, with special attention to the false acceptance of forgeries with rates ranging from 50% to 75%. The results suggest that human recognition abilities in this scenario are strongly dependent on the characteristics considered and the signature at hand. Finally the combination of human ratings clearly outperfoms the individual performance and and a state-of-the-art automatic signature verification system.","PeriodicalId":6510,"journal":{"name":"2016 IEEE International Carnahan Conference on Security Technology (ICCST)","volume":"1 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89762001","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
期刊
2016 IEEE International Carnahan Conference on Security Technology (ICCST)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1