摘要 :
This paper surveys remarkable incidents that were related to the Homeland Security and Defense such as terrors, disasters and cyber-attacks and overviews the existing projects given by the department of Homeland Security and Defen...
展开
This paper surveys remarkable incidents that were related to the Homeland Security and Defense such as terrors, disasters and cyber-attacks and overviews the existing projects given by the department of Homeland Security and Defense of the US government. Through the overview, technological foundations in the projects are extracted and discussed. Additionally, this paper introduces a common framework, as an example, supporting the delivery service for RFID Tracking, Sensor Network, Video Surveillance and Image Screening, which are the major technological foundations in the Homeland Security and Defense. As providing an outline of the technological aspects of the Homeland Security and Defense, this paper is expected a reference for initiators of the related projects.
收起
摘要 :
This paper surveys remarkable incidents that were related to the Homeland Security and Defense such as terrors, disasters and cyber-attacks and overviews the existing projects given by the department of Homeland Security and Defen...
展开
This paper surveys remarkable incidents that were related to the Homeland Security and Defense such as terrors, disasters and cyber-attacks and overviews the existing projects given by the department of Homeland Security and Defense of the US government. Through the overview, technological foundations in the projects are extracted and discussed. Additionally, this paper introduces a common framework, as an example, supporting the delivery service for RFID Tracking, Sensor Network, Video Surveillance and Image Screening, which are the major technological foundations in the Homeland Security and Defense. As providing an outline of the technological aspects of the Homeland Security and Defense, this paper is expected a reference for initiators of the related projects.
收起
摘要 :
One of topical tasks of policy-based security management is checking that the security policy stated in organization corresponds to its implementation in the computer network. The paper considers an approach to proactive monitorin...
展开
One of topical tasks of policy-based security management is checking that the security policy stated in organization corresponds to its implementation in the computer network. The paper considers an approach to proactive monitoring of security policy performance and security mechanisms functioning. This approach is based on different strategies of automatic imitation of possible users' actions in the computer network, including exhaustive search, express-analysis and generating the optimized test sequences. It is applicable to different security policies. The paper describes stages, generalized algorithms and main peculiarities of the suggested approach and formal methods used to fulfill the test sequence optimization. We consider the generalized architecture of the proactive monitoring system "Proactive security scanner" (PSC) developed and its implementation.
收起
摘要 :
One of topical tasks of policy-based security management is checking that the security policy stated in organization corresponds to its implementation in the computer network. The paper considers an approach to proactive monitorin...
展开
One of topical tasks of policy-based security management is checking that the security policy stated in organization corresponds to its implementation in the computer network. The paper considers an approach to proactive monitoring of security policy performance and security mechanisms functioning. This approach is based on different strategies of automatic imitation of possible users'' actions in the computer network, including exhaustive search, express-analysis and generating the optimized test sequences. It is applicable to different security policies. The paper describes stages, generalized algorithms and main peculiarities of the suggested approach and formal methods used to fulfill the test sequence optimization. We consider the generalized architecture of the proactive monitoring system “Proactive security scanner” (PSC) developed and its implementation.
收起
摘要 :
This paper discusses the detection and management of a soybean rust outbreak in the context of agricultural homeland security. An Event-Trigger-Rule system is used for event registration, filtering and notification, and for proces...
展开
This paper discusses the detection and management of a soybean rust outbreak in the context of agricultural homeland security. An Event-Trigger-Rule system is used for event registration, filtering and notification, and for process coordination and enforcement of agencies' policies, constraints, regulations and data integrity/security/privacy. A 'Response and Action Plan' for combating the disease proposed by one of the 12 member states of the Southern Plant Diagnostic Network is used in a prototypeimplementation to demonstrate the utility of the system.
收起
摘要 :
This paper presents a two-stage approach for solving the medication distribution problem. The problem addresses a critical issue in emergency preparedness. Public health officials must plan the logistics for distributing medicatio...
展开
This paper presents a two-stage approach for solving the medication distribution problem. The problem addresses a critical issue in emergency preparedness. Public health officials must plan the logistics for distributing medication to points of dispensing (PODs), which will give medication to the public in case of a bioterrorist attack such as anthrax. We consider the problem at the state and local levels. Our approach separates the problem into two subproblems: (1) the "routing problem" assigns PODs to vehicles and creates routes for each vehicle, and (2) the "scheduling problem" determines when the vehicles should start these routes and how much material should be delivered on each trip. This paper describes the approach and presents the results of using this approach to construct solutions for two scenarios.
收起
摘要 :
This paper presents a two-stage approach for solving the medication distribution problem. The problem addresses a critical issue in emergency preparedness. Public health officials must plan the logistics for distributing medicatio...
展开
This paper presents a two-stage approach for solving the medication distribution problem. The problem addresses a critical issue in emergency preparedness. Public health officials must plan the logistics for distributing medication to points of dispensing (PODs), which will give medication to the public in case of a bioterrorist attack such as anthrax. We consider the problem at the state and local levels. Our approach separates the problem into two subproblems: (1) the "routing problem" assigns PODs to vehicles and creates routes for each vehicle, and (2) the "scheduling problem" determines when the vehicles should start these routes and how much material should be delivered on each trip. This paper describes the approach and presents the results of using this approach to construct solutions for two scenarios.
收起
摘要 :
This paper considers the problem of planning the logistics of distributing medication to points of dispensing (PODs), which will give medication to the public. Previous work on a two-stage routing and scheduling approach showed th...
展开
This paper considers the problem of planning the logistics of distributing medication to points of dispensing (PODs), which will give medication to the public. Previous work on a two-stage routing and scheduling approach showed that it can generate solutions with reasonable minimum slack. This paper presents a delivery volume improvement algorithm that can increase the minimum slack of a given solution.
收起
摘要 :
Information pervades today's human activities, essentially making every sector of society an information environment. Due to the ubiquity of technological innovations and their interconnectivity, there is no aspect of lives of ind...
展开
Information pervades today's human activities, essentially making every sector of society an information environment. Due to the ubiquity of technological innovations and their interconnectivity, there is no aspect of lives of individuals that has not been affected. Individuals & organizations use multiple devices and networking platforms to interact with each other, businesses, and governments, as well as to search, retrieve, and consume information. Adoption and use of information and communication technologies (ICTs) and the nature of information in general and its management and use have been topics of discussion at events such as the ASIS&T Annual Meeting. However, what is often lacking, if not missing, is a broader discussion about information and ICTs, in applied areas such as emergency management, homeland security, and cybersecurity.
收起
摘要 :
General Sensing Systems (GSS) has been developing seismic sensors for different security and military applications for the past several years. Research and development in this area does not have a single-value purpose as security ...
展开
General Sensing Systems (GSS) has been developing seismic sensors for different security and military applications for the past several years. Research and development in this area does not have a single-value purpose as security and military applications are of a broad variety. Many of the requirements for seismic sensors are well known. Herein we describe additional requirements for seismic sensors that are not at the center of common attention and associated with high performance seismic sensors. We find that the hard issues related to "remote" deployment/installation methods can be solved, given the seismic sensor does not have the usual single-axis sensitivity, but sensitivity to arbitrary oriented impact/vibrations. Our results show that such a sensor can be designed, in particular based on electret materials. We report that traditional frequency response curve linearity is not always the appropriate goal. Such issues as useful signal frequency band and an interference immunity should be directly taken into account. In addition, the mechanical oscillator of the seismic sensor should have a very broad dynamic range about 120dB, or an adjustable sensitivity for use in various tactical applications. We find that increasing sensitivity is not so much needed as is reducing of the seismic sensor sensitivity threshold. The lower sensitivity threshold in higher target detection range can be obtained in low noise environmental conditions. We will also show that the attempt to design and manufacture a universal seismic sensor for every possible application seems unreasonable. In every respect it makes sense to design a seismic sensor set, which can fit and satisfy all plurality of the applications and multi objective requirements.
收起