The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The following topics are dealt with: port and airport security; communication security and privacy; computer systems security and privacy; security systems; command and control systems; biometrics; information security; sensor and detection technology; poster session.
The aim of this paper is to highlight the central role of the human in aviation security. This means that appropriate competencies are essential for this service to achieve its objective of protecting civil aviation from illegal acts. However, with the advent of automation, and coupled with enhanced awareness to costs, competency requirements have changed significantly. This paper also seeks to identify...
This document concentrates on how aviation security can be largely improved by selecting the right people for the x-ray screening task. X-ray images dispose of a different colour range, single objects superimpose each other independently of whether they are in front or behind of each other, and the single objects look very different from what they look like under natural light. Therefore, individual...
This article discusses different ways to enhance human-machine interaction in x-ray screening, especially regarding x-ray image display technology. It represents a summary of the studies conducted as work package 4 of the EU funded VIA project (www.viaproject.eu). First, important theoretical issues regarding the interpretation of x-ray images are discussed. We then explain how to measure x-ray image...
The competency of an aviation security screener to detect prohibited items in X-ray images quickly and reliably is important for any airport security system. This paper details the requirements and principles for reliable, valid, and standardized competency assessment as well as different methods that can be applied for this purpose. First, the concepts of reliability, validity and standardization...
With the advances in the processing capabilities of wireless devices such as smart phones and laptops, the demand for staying connected to the Internet has steadily increased. This demand is strengthened further by the introduction of Internet connectivity within the airplanes. Mobile IP is one of the protocols that have been proposed to support user/network mobility. Mobile IP introduces new entities...
Due to rapid advance of the RFID systems, there is sufficient computing power to implement the encryption and decryption required for the authentication during transactions nowadays. In addition, RFID tags have enough capacity to store the corresponding information. Therefore, RFID enabled credit card can be used to improve the potential security issues occurred while using the traditional credit...
This paper discusses covert testing data and key human factors. First, different reasons why airport security screeners sometimes fail to detect threats when covert tests are conducted at airports are discussed. Key human factors are identified and analyzed with regard to covert test results. It is explained that pre-employment selection and training are indispensable prerequisites for good operational...
Threat Image Projection (TIP) is a software system that is used at airports to project images of threat items amongst the passenger baggage being screened by X-ray. The use of TIP is becoming more widespread and is increasingly being included as part of security regulation. This is due to its purported benefits of improved attention and vigilance, and increased exposure to threat items that are linked...
The nature of the daily security business at airports (e.g. fast changing regulations) demands more and more flexible training and communication solutions for security officers at airports. Classical classroom training is a proven way for (re-training, but alternative tools, in particular e-solutions, could be taken into account more often to support the classical method of training. In this paper,...
The impact of leadership structure and behavior on team or crew performance is well known and has been demonstrated in various studies (see e.g. Guzzo & Dickson, 1996; Zaccaro, Rittmann, & Marks, 2001). However, as far as we know, there is no empirical study available on leadership structures and crew performance in the applied setting of airport security control. This study compares the structure...
Currently, the number of users accessing to the network is significantly increasing which requires a tightly control based on the organization policy. Network access control (NAC) is an essential tool focuses on checking and granting permission. In general, NAC requires specific network devices which may not work with the existing devices. In this paper, a Policy-Based Network Access Control framework...
Managing high workload and concurrent accesses are challenging tasks for captive portal. The large number of clients generally creates high workload to the system. Furthermore, some worm or Trojan infected clients create a lot more traffic by spreading themselves through the network via HTTP protocol. Such stateful traffic typically leads to network attack, especially a SYN-Flooding. Additionally,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.