The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper we introduce DIORAMA based interactive visual analytics tools that enable forensic analysis of mass casualty incidents. Using visualization tools we can get an overview of data collections as well as zoom into interesting details and filter datasets by comparing the data items based on some attribute values (e.g. display all the red patients, display the motion of a specific responder)...
Terrorism is a complex and evolving phenomenon, and terrorist groups are highly dynamic in terms of cooperation and locality. Terrorism data collection organizations such as the study of terrorism and response to terrorism (START) release terrorism incident data on a yearly basis. Such data is valuable for historical terrorism incident analysis. However, it is crucial that researchers have access...
Within the process of system development and implementation, programs assemble hundreds of different metrics for tracking and monitoring software such as budgets, costs and schedules, contracts, and compliance reports. Each contributes, directly or indirectly, toward the cybersecurity assurance of the results. The Software Engineering Institute has detailed size, defect, and process data on over 100...
An active non-destructive detection system for special nuclear materials (SNMs) such as 235U has been developed for container inspection at sea ports. The SNMs can be detected by using nuclear resonance fluorescence (NRF) with a quasimonochromatic gamma-ray beam provided from a laser Compton Scattering (LCS) source. We have studied the optimum geometry for the detector array by Monte Carlo simulation...
Creating reproducible experiments in a realistic cyber environment is a non-trivial challenge [1] [2]. Utilizing the STEPfwd platform, we have developed a system for easily delivering high-fidelity cyber environments to research participants anywhere in the world. In this paper we outline the operation method of the STEPfwd platform. Special focus will be given to realism enhancing capabilities offered...
The impact of pupil dilation on the matching accuracy of iris recognition algorithms has been demonstrated in the biometrics literature. However, the current literature does not model the various states of pupil behavior with respect to the underlying dynamics. Consequently, most existing work on this topic is empirical in nature. Our work uses concepts of transition processes and limiting distributions...
The safety, security, and resilience of international postal, shipping, and transportation critical infrastructure are vital to the global supply chain that enables worldwide commerce and communications. But security on an international scale continues to fail in the face of new threats, such as the discovery by Panamanian authorities of suspected components of a surface-to-air missile system aboard...
With the widespread adoption of electronic data collection and sharing technologies, data theft has gained prominence as a major problem. The convenience of services enabled by information technology is generally appreciated. However, improper handling of data can expose government agencies, corporate entities, and individuals to various forms of financial and identity fraud. Moreover, it is unclear...
In order to enhance the supply chain security at airports, the German federal ministry of education and research has initiated the project ESECLOG (enhanced security in the air cargo chain) which has the goal to improve the threat detection accuracy using one-sided access methods. In this paper, we present a new X-ray backscatter technology for non-intrusive imaging of suspicious objects (mainly low-Z...
Critical infrastructure (CI) systems form an interdependent network where failures in one system may quickly affect the state of other linked systems. Real-time modelling and analysis of CI systems gives valuable time-critical insight on the situational status during incidents and standard operation. Obtaining real-time quantitative measurements about the state of CI systems is necessary for situational...
Security images transmitted over network or wireless mediums are subjected to a variety of transmission errors and non-eccentricity pattern noise. Some of these errors are due to hardware limitations that can result in lower quality images caused by quantization noise. Currently, there are no quantitative metrics to evaluate the visual quality of images containing transmission errors based on human...
In this ubiquitous IoT (Internet of Things) era, web services have become a vital part of today's critical national and public sector infrastructure.With the industry wide adaptation of service-oriented architecture (SOA), web services have become an integral component of enterprise software eco-system, resulting in new security challenges. Web services are strategic components used by wide variety...
Improved detection of weapons of mass destruction is one of the Science and Technology priorities of the Secretary of Defense for Fiscal Years 2013–2017. Unfortunately, the remote detection of special nuclear materials is difficult because the materials are not very radioactive, the radiation signatures decrease rapidly with distance, and faint sources of radiation can be obscured by naturally occurring...
Protection of the national infrastructure is a high priority for cybersecurity of the homeland. Critical infrastructure such as the national power grid, commercial financial networks, and communications networks have been successfully invaded and re-invaded from foreign and domestic attackers. The ability to re-establish authentication and confidentiality of the network participants via secure channels...
Malware forensics analysts confront one of our biggest homeland security challenges - a continuing flood of new malware variants released by adaptable adversaries seeking new targets in cyberspace, exploiting new technologies, and bypassing existing security mechanisms. Reverse engineering new samples, understanding their capabilities, and ascertaining provenance is time-intensive and requires considerable...
Under the Department of Homeland Security-sponsored Sensor-smart Affordable Autonomous Robotic Platforms (SAARP) project, Robotic Research, LLC is developing an affordable and adaptable method to provide disaster response robots developed with 3D printer technology. The SAARP Store contains a library of robots, a developer storefront, and a user storefront. The SAARP Store allows the user to select,...
The recent crisis in the immigration system caused by the increasing influx of unaccompanied alien children (UAC) creates a serious humanitarian problem in the United States. After apprehension, UAC are prepared for shelter placement through a prescreen, which includes health and background checks. A transition center is a facility intended to fulfill these screening responsibilities. With over 100,000...
In WMD events or natural disasters, identifying bio-chemicals and microorganisms rapidly is crucial. Metagenomics is the study of microorganisms collected directly from natural environments using whole genome shotgun (WGS) sequencing. Metagenomics methods allow sequencing of organism genomes which cannot be cultured in a laboratory. Grouping random fragments obtained from whole shotgun genome data...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.