|
CYBER INFRASTRUCTURE ARCHITECTURE AND EXPERIENCE |
|
|
|
Design and Analysis of High Availability Networks |
|
|
1 | (6) |
|
|
|
Auditing Cyber Security Configuration for Control System Applications |
|
|
7 | (7) |
|
|
One Size Does Not Fit All: 10 Years of Applying Context-Aware Security |
|
|
14 | (8) |
|
|
|
|
Communication Pattern Anomaly Detection in Process Control Systems |
|
|
22 | (8) |
|
|
|
PHYSICAL INFRASTRUCTURE PROTECTION |
|
|
|
Mobile System for Fingerprinting and Mapping of Blood-Vessels across a Finger |
|
|
30 | (5) |
|
|
|
|
|
Perimeter Security at San Fransisco International Airport: Leveraging Independent, Existing Systems to Form an Integrated Solution |
|
|
35 | (8) |
|
|
|
|
Evaluating Drinking Water Early Warning Systems |
|
|
43 | (8) |
|
|
|
Demonstration of Swarming Control of Unmanned Ground and Air Systems in Surveillance and Infrastructure Protection |
|
|
51 | (8) |
|
|
|
|
|
|
|
Secure Sensor Networks for Public Safety Command and Control System |
|
|
59 | (8) |
|
|
|
|
Application of Adaptive Wireless Sensor Organizations to Secure Spatial Domains |
|
|
67 | (6) |
|
|
|
|
WIDE AREA PERSISTENT SURVEILLANCE |
|
|
|
PARSEC, an Application of Probabilistic Case Based Reasoning to Maritime Surveillance |
|
|
73 | (7) |
|
|
|
|
|
|
|
|
CoyoteUGSTM Sensor System - A Mutable Persistent Surveillance System for Diverse and Adapting Border Threats |
|
|
80 | (7) |
|
|
|
Surveillance of the 200 Nautical Mile EEZ Using HFSWR in Association with a Spaced-Based AIS Interceptor |
|
|
87 | (6) |
|
|
|
|
Ground Moving Personnel Indication and Tracking from Airborne Platforms |
|
|
93 | (8) |
|
|
Accoustic Detection of Low Flying Aircraft |
|
|
101 | (6) |
|
|
FUNDAMENTALS AND ASSURANCE IN TRACE DETECTION |
|
|
|
The Internal Fluid Mechanics of Explosive Trace Detectors using Computational Fluid Dynamics |
|
|
107 | (7) |
|
|
|
|
Portable Vapor Generator for the Calibration and Test of Explosive Detectors |
|
|
114 | (7) |
|
|
|
|
|
|
|
NUCLEAR STANDOFF/PORTABLE DETECTION, DIAGNOSTIC AND FORENSIC TECHNOLOGIES: GAMMA EMPHASIS |
|
|
|
A Stand-Off Imager for the Location and Identification of Nuclear Threat Materials |
|
|
121 | (6) |
|
|
|
|
|
VIDEO ANALYTICS AND ANALYSIS AND PREVENTION OF CASCADING CONSEQUENCES |
|
|
|
An Assesment of the Video Analytics Technology Gap for Transportation Facilities |
|
|
127 | (8) |
|
|
|
|
VIAssist: Visual Analytics for Cyber Defense |
|
|
135 | (8) |
|
|
|
Metro Boston Public Safety Network (PSnet) |
|
|
143 | (8) |
|
|
|
Mitigating Blackout along the Cascading Pathways |
|
|
151 | (6) |
|
|
|
|
Analyzing Cascading Effects within Infrastructure Sectors for Consequence Reduction |
|
|
157 | (6) |
|
|
|
INTEROPERABILITY AND FIELD DEPLOYABLE EMERGENCY COMMUNICATIONS |
|
|
|
MASCOT: Manycast Architecture for Service-Oriented Tactical Applications |
|
|
163 | (6) |
|
|
|
Ramprasad Balasubramanian |
|
|
|
APCO Project 25 Wireless Data Services for Smaller Public Safety Agencies |
|
|
169 | (5) |
|
|
|
|
Unified Incident Command and Decision Support (UICDS): A Department of Homeland Security Initiative in Information Sharing |
|
|
174 | (6) |
|
|
|
|
|
Secure Satellite Communication & Beacon Tracking Device |
|
|
180 | (5) |
|
|
|
Establishing a Reliable Communication Link Between Military and Public Safety Officals |
|
|
185 | (6) |
|
|
|
NONINTRUSIVE CONTRABAND AND WMD DETECTION |
|
|
|
Ultrasonic, Non-Invasive Classification/Discrimination of Liquid Explosives (LEs) and Threat Liquids from Non-Threat Liquids in Sealed Containers |
|
|
191 | (7) |
|
|
|
|
|
|
Decision-level Information Fusion to Asses Threat Likelihood in Shipped Containers |
|
|
198 | (8) |
|
|
|
|
A Wireless Sensor Data Fusion Framework for contaminant Detection |
|
|
206 | (7) |
|
|
|
Harbor Shield: A New Technique for Inspection of Vessels below the Waterline |
|
|
213 | (6) |
|
|
|
|
|
|
|
Improved Heartbeat Detector System for Non-Intrusive Concealed Passenger Detection |
|
|
219 | (7) |
|
|
|
|
|
|
|
|
|
|
Digital Image Correlation: A Measurement Tool for the Study of Explosive Effects |
|
|
226 | (8) |
|
|
|
Potential IED Threat Systems (PITS) |
|
|
234 | (8) |
|
|
|
|
Securing Infasturcture from High Explosive Threats |
|
|
242 | (6) |
|
|
|
|
|
|
A Next-Generation Countermeasure Architecture to Prevent Explosives Attacks at Large Public Events |
|
|
248 | (7) |
|
|
|
|
|
|
|
|
|
Signatures Analysis Systems Prototype (SASP) |
|
|
255 | (6) |
|
|
|
|
NUCLEAR STANDOFF/PORTABLE DETECTION, DIAGNOSTIC AND FORENSIC TECHNOLOGIES: NEUTRON EMPHASIS |
|
|
|
Comparison of Two Solid-State-Photomultiplier-Based Scintillation Gamma-Ray Detector Configuration |
|
|
261 | (5) |
|
|
|
|
|
|
Imaging and Spectroscopy of Fission Neutrons with the FNIT Experiment |
|
|
266 | (8) |
|
|
|
|
|
|
|
|
|
|
|
|
274 | (5) |
|
|
|
|
|
|
|
Advanced Active Interrogation Sources for Remote Detection of Special Nuclear Material |
|
|
279 | (8) |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Novel Fast Neutron Counting Technology for Efficient Detection of Special Nuclear Materials |
|
|
287 | (7) |
|
|
|
|
|
|
|
|
|
|
|
A Compton Telescope for Remote Location and Identification of Radioactive Material |
|
|
294 | (6) |
|
|
|
|
|
|
|
Tensioned Metastable Fluid Detectors for Optimal Active Interrogation of Special Nuclear Materials |
|
|
300 | (8) |
|
|
|
|
|
|
Toxic Plume Source Localization in Urban Environments Using collaborating Robots |
|
|
308 | (3) |
|
|
|
|
|
|
|
|
Novel Fluorescent Polymer for Trace Explosive Detection |
|
|
311 | (4) |
|
|
|
|
Multi-Layer Simulation for Analyzing IED Threats |
|
|
315 | (8) |
|
|
|
|
DISASTER RESPONSE POSTERS |
|
|
|
A Prototype National Emergency Deployment System |
|
|
323 | (8) |
|
|
|
Second Generation Hazmat Cam Wireless Tactical video System for Hazardous Response |
|
|
331 | (8) |
|
|
Defining People Interoperability to Create a Nation Prepared |
|
|
339 | (4) |
|
|
CRITICAL INFRASTRUCTURE PROTECTION POSTERS |
|
|
|
Modeling and Simulating Blast Effects on Electric Substations |
|
|
343 | (7) |
|
|
|
|
|
|
Responsibility and Decision Making Transfer in Public Safety and Security Emergencies-A Case Study of School Shootings |
|
|
350 | (8) |
|
|
|
|
THREAT/RISK/CONSEQUENCE ASSESSMENT |
|
|
|
All Hazards Approach for Assessing Readiness of Critical Infrastructure |
|
|
358 | (7) |
|
|
|
Impact of Intelligence on Target-Hardening Decisions |
|
|
365 | (8) |
|
|
|
Counter Terrorism Functions to Enhance Critical Infrastructure Resilience Against CBRNe Terrorism |
|
|
373 | (4) |
|
|
|
AZALIA: an A to Z Assesment of the Likelihood of Insider Attack |
|
|
377 | (8) |
|
|
|
|
|
State/Local CIP Risk Analysis: First Results and Emerging Trends in the Data |
|
|
385 | (8) |
|
|
|
INCIDENT MANAGEMENT SYSTEMS |
|
|
|
Federation of Authoritative Disaster Models with Incident Management Constructive Simulation |
|
|
393 | (8) |
|
|
|
|
Project Responder: Requirements for Homeland Security Technologies |
|
|
401 | (8) |
|
|
|
|
Real-Time Data Fusion and Visulization in support of Emergency Response Operations |
|
|
409 | (8) |
|
|
|
|
|
|
A Distributed Efficient Face Image Screening and Retrieval with Affine Transformations, Disguised and Varying Facial Exressions |
|
|
417 | (8) |
|
|
|
Biometric Sensor Image Fusion for Identity Verification: A Case Study with Wavelet-Based Fusion Rules and Graph Matching |
|
|
425 | (7) |
|
|
|
|
|
Active Millimeter-Wave Standoff and Portal Imaging Techniques for Personnel Screening |
|
|
432 | (8) |
|
|
|
|
|
Use of Embedded Modeling, Simulation, and Learning Management Capabilities for ImprovedReadiness, Adaptability, and Decision Support for Border Security and First Responders |
|
|
440 | (8) |
|
|
|
|
STAND-OFF DETECTION TECHNOLOGIES |
|
|
|
Experimental Results for Standoff Detection of Concealed Body-Worn Explosives Using Millimeter-Wave Radar and Limited View ISAR Processing |
|
|
448 | (5) |
|
|
|
|
|
Terahertz Air Photonics for Standoff Explosive Detection |
|
|
453 | (4) |
|
|
|
|
Stand-Off Detection of Trace Explosives by Infrared Photo-Thermal Imaging |
|
|
457 | (7) |
|
|
|
|
|
|
|
|
|
Self-Channeling of Femtosecond Laser Pulses for Rapid and Efficient Standoff Detection of Energetic Materials |
|
|
464 | (5) |
|
|
|
|
|
|
Detecting Infectious and Biological Contaminants on Aircraft-Is it Feasible? |
|
|
469 | (8) |
|
|
|
|
|
|
Analysis of Detection Systems for Outdoor Chemical or Biological Attacks |
|
|
477 | (8) |
|
|
|
|
|
Information Fusion for CB Defense Applications: Challenge and Opportunity |
|
|
485 | (10) |
|
|
|
|
|
|
CYBER-INFRASTRUCTURE PROTECTION |
|
|
|
Generating Configuration for Missing Traffic Detector and Security Measures in IndustrialControl Systems based on the System Description Files |
|
|
495 | (8) |
|
|
|
|
|
Identifying Network Attacks from a Social Perspective |
|
|
503 | (5) |
|
|
|
|
Audio and Video Processing to Enhance Homeland Security |
|
|
508 | (8) |
|
|
SITUATIONAL AWARENESS (PERSONNEL, RESOURCES, PHYSICAL SITUATION) |
|
|
|
Situational Awareness for First Responders: Evaluation of the BIMS Field Trial |
|
|
516 | (5) |
|
|
|
|
|
Information Interoperability and Provenance for Emergency Preparedness and Response |
|
|
521 | (8) |
|
|
|
|
|
|
Dynamic Decision Support for Emergency Responders |
|
|
529 | (8) |
|
|
|
|
|
Probablistic Attack Reconstruction and Resource Estimation in "Reload" Scenarios |
|
|
537 | (8) |
|
|
|
|
DATA FUSION, THREAT CHARACTERIZATION, INFORMATION COLLECTION AND DECISION SUPPORT TECHNOLOGY |
|
|
|
GeoSpatial Data Analysis for DHS Programs |
|
|
545 | (8) |
|
|
|
|
|
|
|
|
ConfluenceTM: Knowledge-based Decision Support in Complex Missions |
|
|
553 | (8) |
|
|
|
|
An Edge-Based Approach to Image Fusion of Images via Reconstruction Estimation |
|
|
561 | (7) |
|
|
|
|
International Border Management Systems: Analyst Tools |
|
|
568 | (8) |
|
|
|
GIS-Enabled Maritime Awareness System (GMAS) |
|
|
576 | (7) |
|
|
|
|
ADVANCED IT SUPPORT AND RISK/CONSEQUENCE ANALYSIS |
|
|
|
Weapons of Mass Destruction Technology Evaluation and Training Range |
|
|
583 | (8) |
|
|
A Network Control Theory Approach to Virus-Spread Mitigation |
|
|
591 | (8) |
|
|
|
|
CYBER-INFRASTRUCTURE PROTECTION: THE BIG PICTURE |
|
|
|
Evaluating the Risk of Cyber Attacks on SCADA Systems via Petri Net Analysis with Application to Hazardous Liquid Loading Operations |
|
|
599 | (8) |
|
|
|
|
|
Comparing Apples and Oranges How to Select the Most Probable Targets |
|
|
607 | (6) |
|
|
Text Analytics for Homeland Security Technology Development |
|
|
613 | (7) |
|
|
|
MODELING SIMULATION AND TRAINING TOOLS |
|
|
|
Emergency Relocation: Population Response Model to Disasters |
|
|
620 | (8) |
|
|
|
|
|
Modeling and Simulation Techniques for Maritime Security |
|
|
628 | (7) |
|
|
|
|
Employing Modeling and Simulation for Disaster Response Scenario Analysis |
|
|
635 | (5) |
|
|
Improving Emergency Responder Situational Awareness for Incident Command Systems (ICS) Using Critical Information Management, Simulation, and Analysis |
|
|
640 | (7) |
|
|
Rapid Scenario Building and Optimization for Simulation-Based Exercises |
|
|
647 | (6) |
|
|
|
|
|
Unmanned Tunnel Exploitation |
|
|
653 | (8) |
|
|
|
|
|
|
|
Creation of Robot for Subsurface Void Detection |
|
|
661 | (8) |
|
|
|
|
|
Tunnel and Subsurface Void Detection and Range to Target Measurement |
|
|
669 | (8) |
|
|
CARGO SCREENING AND SECURITY |
|
|
|
Monte Carlo Analysis of Pulse Neutron Based Cargo Interrogation System |
|
|
677 | (5) |
|
|
|
|
The Handling of K-Edge effects in the Multiple Isotope Material Basis Set (MIMBS) Method of Isotope Identification |
|
|
682 | (8) |
|
|
|
Radition Scanning Methods for Ship-to-Rail Intermodal Cargo Containers |
|
|
690 | |
|
|
|
|
|
Author Index |
|