Preface |
|
xv | |
|
The Homeland Security Scenario |
|
|
1 | (14) |
|
|
1 | (4) |
|
Composing Expertise and Technologies |
|
|
5 | (1) |
|
System of System General Architecture |
|
|
6 | (4) |
|
|
10 | (1) |
|
System of System Engineering |
|
|
10 | (2) |
|
|
12 | (3) |
|
Embedded Wireless Sensor Networks |
|
|
15 | (32) |
|
|
15 | (1) |
|
Sensor Network Design Drivers: Resource Constraints and Autonomy |
|
|
16 | (1) |
|
|
17 | (5) |
|
In-Network Processing for Computing, Storage, and Communication Energy Trade-Offs |
|
|
19 | (1) |
|
Time Is Energy: Sleep Optimization Via Time Uncertainty Management |
|
|
19 | (3) |
|
|
22 | (7) |
|
Self-Configuration: Localizing Nodes in Space and Time |
|
|
23 | (4) |
|
|
27 | (2) |
|
|
29 | (11) |
|
Beyond Smart Dust to Heterogeneous Sensor Ecologies |
|
|
29 | (1) |
|
Incorporating the Human Tier |
|
|
30 | (1) |
|
To Sense or Not to Sense: Optimizing the Sampling Energy |
|
|
31 | (3) |
|
Mobility as a Performance Amplifier |
|
|
34 | (2) |
|
Monitoring the Monitors: Sensor Data Integrity |
|
|
36 | (4) |
|
Future Directions: Participatory Sensing |
|
|
40 | (1) |
|
|
41 | (1) |
|
|
42 | (1) |
|
|
42 | (5) |
|
Visual Detection and Classification of Humans, Their Pose, and Their Motion |
|
|
47 | (26) |
|
|
47 | (2) |
|
|
49 | (10) |
|
|
49 | (1) |
|
|
50 | (9) |
|
|
59 | (1) |
|
Tracking as Transition Between Key Frames |
|
|
59 | (1) |
|
Continuous Temporal Models |
|
|
59 | (1) |
|
Classification and Recognition of Human Motion |
|
|
60 | (7) |
|
|
60 | (1) |
|
Global Measures of Similarity |
|
|
61 | (1) |
|
|
61 | (4) |
|
|
65 | (2) |
|
|
67 | (1) |
|
|
68 | (5) |
|
Cyber Security Basic Defenses and Attack Trends |
|
|
73 | (30) |
|
|
73 | (2) |
|
|
75 | (2) |
|
|
75 | (1) |
|
|
76 | (1) |
|
|
76 | (1) |
|
|
77 | (5) |
|
|
77 | (1) |
|
Secret-Key and Public-Key Cryptography |
|
|
78 | (2) |
|
|
80 | (1) |
|
|
81 | (1) |
|
|
81 | (1) |
|
|
82 | (4) |
|
Firewalls, IDSs, and Honeypots |
|
|
84 | (2) |
|
|
86 | (4) |
|
|
86 | (2) |
|
|
88 | (1) |
|
|
88 | (2) |
|
Cyber Attack Trends, Threats, and Homeland Security |
|
|
90 | (7) |
|
|
91 | (1) |
|
|
92 | (1) |
|
DDoS Attacks, Estonia, and Hacktivism |
|
|
93 | (2) |
|
Cyber Espionage and the Athens Affair |
|
|
95 | (1) |
|
Critical Infrastructure and Cyber Security |
|
|
96 | (1) |
|
|
97 | (1) |
|
|
98 | (1) |
|
|
98 | (5) |
|
Mining Databases and Data Streams |
|
|
103 | (40) |
|
Introduction and Historical Perspective |
|
|
103 | (3) |
|
Examples of DM Methods and Applications |
|
|
104 | (2) |
|
|
106 | (16) |
|
Taxonomy of Data Mining Methods |
|
|
106 | (1) |
|
Classification and Prediction |
|
|
106 | (6) |
|
|
112 | (4) |
|
|
116 | (2) |
|
|
118 | (1) |
|
|
119 | (3) |
|
Web Mining and New Applications |
|
|
122 | (7) |
|
|
122 | (3) |
|
|
125 | (3) |
|
Privacy-Preserving Data Mining |
|
|
128 | (1) |
|
|
129 | (10) |
|
Intrusion Detection and Network Monitoring |
|
|
129 | (1) |
|
|
130 | (3) |
|
|
133 | (1) |
|
Stream Mill: An Inductive DSMS |
|
|
133 | (3) |
|
Data Stream Mining Algorithms |
|
|
136 | (3) |
|
|
139 | (1) |
|
|
139 | (4) |
|
Private Information Retrieval: Single-Database Techniques and Applications |
|
|
143 | (34) |
|
|
143 | (1) |
|
Single-Database Private Information Retrieval |
|
|
144 | (5) |
|
Amortizing Database Work in PIR |
|
|
145 | (1) |
|
Connections: Single-Database PIR and OT |
|
|
145 | (1) |
|
Connections: PIR and Collision-Resistant Hashing |
|
|
146 | (1) |
|
Connections: PIR and Function-Hiding PKE |
|
|
147 | (1) |
|
Connections: PIR and Complexity Theory |
|
|
147 | (1) |
|
Public-Key Encryption That Supports PIR Read and Write |
|
|
148 | (1) |
|
Organization of the Rest of the Chapter |
|
|
148 | (1) |
|
Background and Preliminaries |
|
|
149 | (6) |
|
|
149 | (3) |
|
Private Information Retrieval |
|
|
152 | (1) |
|
Balancing the Communication Between Sender and Receiver |
|
|
153 | (2) |
|
Semantically Secure Homomorphic Encryption Schemes: Examples |
|
|
155 | (6) |
|
Encryption Based on Quadratic Residues |
|
|
155 | (2) |
|
|
157 | (1) |
|
The Paillier Cryptosystem |
|
|
158 | (3) |
|
PIR Based on Group-Homomorphic Encryption |
|
|
161 | (6) |
|
Basic Protocols From Homomorphic Encryption |
|
|
163 | (1) |
|
Optimizing Via an Integer Map |
|
|
164 | (1) |
|
Further Improvements: Length-Flexible Cryptosystems |
|
|
165 | (2) |
|
Private Information Retrieval Based on the Φ-Hiding Assumption |
|
|
167 | (4) |
|
|
167 | (1) |
|
A Brief Description of the Protocol |
|
|
168 | (2) |
|
Generalizations: Smooth Subgroups |
|
|
170 | (1) |
|
Private Information Retrieval from Any Trapdoor Permutation |
|
|
171 | (2) |
|
|
171 | (1) |
|
|
171 | (1) |
|
|
172 | (1) |
|
|
173 | (4) |
|
|
173 | (4) |
|
Tapping Vehicle Sensors for Homeland Security |
|
|
177 | (30) |
|
|
177 | (3) |
|
|
180 | (3) |
|
|
180 | (1) |
|
Opportunistic Sensor Networking |
|
|
181 | (2) |
|
|
183 | (1) |
|
MObEyes Diffusion/Harvesting Processor |
|
|
184 | (8) |
|
MDHP Protocol Design Principles |
|
|
185 | (1) |
|
|
186 | (2) |
|
|
188 | (4) |
|
MobEyes Performance Evaluation |
|
|
192 | (7) |
|
|
192 | (2) |
|
|
194 | (2) |
|
|
196 | (1) |
|
Border Effects and Turnover |
|
|
197 | (2) |
|
MobEyes Privacy and Security |
|
|
199 | (3) |
|
|
202 | (1) |
|
|
203 | (4) |
|
Modeling and Analysis of Wireless Networked Systems |
|
|
207 | (34) |
|
|
207 | (2) |
|
Wireless Networked Systems for Critical Infrastructure |
|
|
209 | (9) |
|
Real-Time Measurement Systems |
|
|
210 | (1) |
|
Real-Time Control Systems |
|
|
211 | (2) |
|
Theory of Networked Control Systems |
|
|
213 | (5) |
|
|
218 | (17) |
|
|
219 | (1) |
|
Modeling Unicast Path Diversity |
|
|
220 | (5) |
|
Modeling Directed Staged Flooding |
|
|
225 | (6) |
|
Using the Network Metrics |
|
|
231 | (4) |
|
Limitations of the Models and Future Work |
|
|
235 | (1) |
|
|
235 | (1) |
|
|
236 | (1) |
|
|
236 | (3) |
|
Appendix 8A Proof Sketch for Theorems 8.1 and 8.3 |
|
|
239 | (2) |
|
Large Systems Modeling and Simulation |
|
|
241 | (38) |
|
|
241 | (1) |
|
The Challenge of Homeland Protection |
|
|
242 | (3) |
|
Definitions and Background |
|
|
245 | (1) |
|
The Role of Modeling and Simulation |
|
|
246 | (2) |
|
Reductionist Approaches to the Modeling of Large Systems |
|
|
248 | (2) |
|
|
248 | (1) |
|
|
249 | (1) |
|
Simulation Architecture for Performance Evaluation |
|
|
250 | (6) |
|
|
251 | (1) |
|
Medium Grain Accuracy Level |
|
|
252 | (2) |
|
Fine Grain Accuracy Level |
|
|
254 | (2) |
|
|
256 | (18) |
|
End-to-End Simulation of a Maritime Border Control System |
|
|
257 | (6) |
|
Multisensor Fusion for Naval Threat |
|
|
263 | (11) |
|
|
274 | (1) |
|
|
274 | (1) |
|
|
275 | (4) |
About the Authors |
|
279 | (6) |
Index |
|
285 | |