Toward a comprehensive disclosure control framework for shared data (Englisch)
- Neue Suche nach: Coull, Scott E.
- Neue Suche nach: Kenneally, Erin
- Neue Suche nach: Coull, Scott E.
- Neue Suche nach: Kenneally, Erin
- Aufsatz (Konferenz) / Elektronische Ressource
-
Titel:Toward a comprehensive disclosure control framework for shared data
-
Beteiligte:Coull, Scott E. ( Autor:in ) / Kenneally, Erin ( Autor:in )
-
Erschienen in:
-
Verlag:
- Neue Suche nach: IEEE
-
Erscheinungsdatum:01.11.2013
-
Format / Umfang:803695 byte
-
ISBN:
-
DOI:
-
Medientyp:Aufsatz (Konferenz)
-
Format:Elektronische Ressource
-
Sprache:Englisch
-
Datenquelle:
Inhaltsverzeichnis Konferenzband
Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.
- 1
-
Organizational committee| 2013
- 1
-
Track chairs| 2013
- 1
-
Welcome message from the conference chair| 2013
- 1
-
Thank you to our sponsors and exhibitors| 2013
- 1
-
Cyber security for service oriented architectures in a Web 2.0 world: An overview of SOA vulnerabilities in financial servicesMasood, Adnan et al. | 2013
- 1
-
Copyrite page| 2013
- 1
-
Author index| 2013
- 1
-
Plenary SpeakerGerstein, Daniel M. / Linskey, Daniel P. / Rice, L. Scott / Woodbury, Donald / Davidson, Bruce B. et al. | 2013
- 1
-
Table of contents| 2013
- 7
-
Intended effects of cyber resiliency techniques on adversary activitiesBodeau, Deborah / Graubart, Richard et al. | 2013
- 12
-
Towards a web tracking profiling algorithmHuba, William / Yuan, Bo / Pan, Yin / Mishra, Sumita et al. | 2013
- 18
-
A customized modeling and Simulation Tool for port and airport evacuation and recovery: An integrated tool for enhancing preparedness and responseBelella, Paul A. / Rooney, Bethann et al. | 2013
- 19
-
An algorithm to prioritize road network restoration after a regional eventFiondella, Lance et al. | 2013
- 26
-
Generic incident model for use in large-scale evacuation simulationsCollins, Andrew J. / Robinson, R. Michael / Jordan, Craig A. / Foytik, Peter / Ezell, Barry C. et al. | 2013
- 32
-
Interacting with trapped victims using robotsMurphy, Robin R. / Srinivasan, Vasant / Henkel, Zachary / Suarez, Jesus / Minson, Matthew / Straus, J C / Hempstead, Stanley / Valdez, Tim / Egawa, Shinichi et al. | 2013
- 38
-
Protecting our Nation's ports with the Port Security Risk Analysis and Resource Allocation System (PortSec 3.0)Orosz, Michael / Chen, Jennifer / Maya, Isaac / Salazar, Daniel / Chatterjee, Samrat / Wei, Dan et al. | 2013
- 43
-
Open border CONOPS simulationLemley, Sara / Sandoval, Juan / Sapankevych, Nicholas et al. | 2013
- 48
-
RIPTIDE: Learning violation prediction models from boarding activity dataChalupsky, Hans / Hovy, Eduard et al. | 2013
- 54
-
Methodological insights on restoring face photos of multinational passportsBourlai, T. / Clark, A. D. / Best-Rowden, L. S. et al. | 2013
- 61
-
Securing multimodal biometric data through watermarking and steganographyWhitelam, Cameron / Osia, Nnamdi / Bourlai, Thirimachos et al. | 2013
- 67
-
What is biometric information and how to measure it?Sutcu, Yagiz / Tabassi, Elham / Sencar, Husrev T. / Memon, Nasir et al. | 2013
- 73
-
CyberVis: Visualizing the potential impact of cyber attacks on the wider enterpriseCreese, Sadie / Goldsmith, Michael / Moffat, Nick / Happa, Jassim / Agrafiotis, Ioannis et al. | 2013
- 80
-
Towards a multiscale approach to cybersecurity modelingHogan, Emilie / Hui, Peter / Choudhury, Sutanay / Halappanavar, Mahantesh / Oler, Kiri / Joslyn, Cliff et al. | 2013
- 86
-
Detecting threatening insiders with lightweight media forensicsGarfinkel, Simson L. / Beebe, Nicole / Liu, Lishu / Maasberg, Michele et al. | 2013
- 93
-
Toward a comprehensive disclosure control framework for shared dataCoull, Scott E. / Kenneally, Erin et al. | 2013
- 99
-
Structural and functional vulnerability analysis for survivability of Smart Grid and SCADA network under severe emergencies and WMD attacksChopade, Pravin / Bikdash, Marwan et al. | 2013
- 106
-
National security and Emergency Preparedness communications: Next generation priority servicesNolan, David / Wainberg, Stan / Wullert, John R. / Ephrath, Arye R. et al. | 2013
- 113
-
Information management and decision support in critical infrastructure emergencies at the local levelRomanowski, Carol J. / Mishra, Sumita / Raj, Rajendra K. / Howles, Trudy / Schneider, Jennifer et al. | 2013
- 119
-
Resilience management through use of CERT-RMM & associated success storiesMehravari, Nader et al. | 2013
- 126
-
Development of dual leaky coaxial cable for intruder detection sensorTsujita, Wataru / Inomata, Kenji / Hirai, Takashi et al. | 2013
- 130
-
Geophysical and Operational System Performance Tool for the detection of clandestine tunnels: Enhancement and case studiesChristou, Carol / Crager, J. Casey / Kuklinski, Walter / Lebsack, Eliot / Masters, David / Munson, Mark / Shi, Weiqun et al. | 2013
- 136
-
Geo-pointing and threat location techniques for airborne border surveillanceStich, Eric J. et al. | 2013
- 141
-
Acoustic detection, tracking and classification of Low Flying AircraftSutin, Alexander / Salloum, Hady / Sedunov, Alexander / Sedunov, Nikolay et al. | 2013
- 147
-
A novel method for touch-less finger print authenticationRavi, Hareesh / Sivanath, Sabarish Kuduwa et al. | 2013
- 154
-
Touch panel with integrated fingerprint sensors based user identity managementFeng, Tao / Prakash, Varun / Shi, Weidong et al. | 2013
- 165
-
Point based features for contact-less palmprint imagesParihar, Anil Singh / Kumar, Amoiy / Verma, Om Prakash / Gupta, Ankita / Mukherjee, Prerana / Vatsa, Deepika et al. | 2013
- 171
-
A random-forest-based efficient comparative machine learning predictive DNA-codon metagenomics binning technique for WMD events & applicationsSaghir, Helal / Megherbi, Dalila B. et al. | 2013
- 178
-
Recognition, segmentation and retrieval of gang graffiti images on a mobile deviceParra, Albert / Zhao, Bin / Kim, Joonsoo / Delp, Edward J. et al. | 2013
- 189
-
SCUBA diver detection and classification in active and passive sonars — A unified approachSharma, Nabin S. / Yakubovskiy, Alexander M. / Zimmerman, Matthew J. et al. | 2013
- 195
-
Stevens Passive Acoustic system for surface and underwater threat detectionSutin, Alexander / Salloum, Hady / DeLorme, Michael / Sedunov, Nikolay / Sedunov, Alexander / Tsionskiy, Mikhail et al. | 2013
- 201
-
Bio-inspired topology control mechanism for autonomous underwater vehicles used in maritime surveillanceZou, Jianmin / Gundry, Stephen / Kusyk, Janusz / Sahin, Cem Safak / Uyar, M. Umit et al. | 2013
- 207
-
Rapid triage of diverse media devices: Boston marathon bombings: An operational case study of time critical responseMerlino, Andrew / Berg, Jared S. / Dahi, Bahram et al. | 2013
- 212
-
To change or not to change: That is the questionDancer, F. Chevonne Thomas / Skelton, Gordon W. et al. | 2013
- 217
-
Applying a Digital forensic readiness framework: Three case studiesMouhtaropoulos, Antonis / Dimotikalis, Panagiotis / Li, Chang-Tsun et al. | 2013
- 224
-
A model of certifier and accreditor risk calculation for multi-level systemsLoughry, Joe et al. | 2013
- 230
-
A dynamic capability maturity model for improving cyber securityAdler, Richard M. et al. | 2013
- 236
-
The CERT assessment tool: Increasing a security incident responder's ability to assess riskConnell, Anne / Waits, Todd et al. | 2013
- 241
-
Cerebro: A platform for collaborative incident response and investigationConnell, Anne / Palko, Tim / Yasar, Hasan et al. | 2013
- 246
-
Crisis management and social media: Assuring effective information governance for long term social sustainabilityBunker, Deborah / Ehnis, Christian / Seltsikas, Philip / Levine, Linda et al. | 2013
- 252
-
A Survivable Social NetworkIannucci, Bob / Cali, Jonida / Caney, Ryan / Kennedy, Stuart et al. | 2013
- 259
-
A community sensing framework for threat detection in metropolitan areaQian, Lijun / Fuller, John / Simpson, Cheslan et al. | 2013
- 265
-
Transform domain measure of enhancement — TDME — For security imaging applicationsSamani, Arash / Panetta, Karen / Agaian, Sos et al. | 2013
- 271
-
Fast dynamic video content explorationGallo, Nick / Thornton, Jason et al. | 2013
- 284
-
Camera field coverage estimation through common event sensingNaimark, Leonid / Shnidman, Nathan et al. | 2013
- 290
-
Effective threat detection for surveillanceGelernter, Judith et al. | 2013
- 297
-
Automated pollen identification system for forensic geo-historical location applicationsHwang, Grace M. / Riley, Kim C. / Christou, Carol T. / Jacyna, Garry M. / Woodard, Jeffrey P. / Ryan, Regina M. / Bush, Mark B. / Valencia, Bryan G. / McMichael, Crystal N. H. / Punyasena, Surangi W. et al. | 2013
- 304
-
Assessing performance and tradeoffs of bioforensic signature systemsWatkins, Daniel M. / Sego, Landon H. / Holmes, Aimee E. / Webb-Robertson, Bobbie-Jo M. / Whiten, Amanda M. / Wunschen, David S. / Kreuzer, Helen W. / Corley, Courtney D. / Tardiff, Mark F. et al. | 2013
- 310
-
Using dynamic risk estimation & social network analysis to detect money laundering evolutionMehmet, Murad / Wijesekera, Duminda et al. | 2013
- 316
-
Meeting lawful interception requirements for selected IP traffic offload and local IP access trafficCartmell, John et al. | 2013
- 322
-
Replay of malicious traffic in network testbedsHussain, Alefiya / Pradkin, Yuri / Heidemann, John et al. | 2013
- 328
-
Characterizing vulnerability to IP hijack attemptsGersch, Joseph / Massey, Dan et al. | 2013
- 334
-
Analyzing terror attacks using latent semantic indexingToure, Ibrahim / Gangopadhyay, Aryya et al. | 2013
- 338
-
Using transaction-level simulation to prepare for and recover from supply-chain disastersAxelrod, C. Warren et al. | 2013
- 344
-
Improved strategic decision making during disasters using a dual mode risk based three dimensional triage process — #25Cogliandro, John et al. | 2013
- 350
-
A roadmap for the adoption of unmanned systems into public safetyMurphy, Robin R. et al. | 2013
- 354
-
Field study identifying barriers and delays in data-to-decision with small unmanned aerial systemsDuncan, Brittany A. / Murphy, Robin R. et al. | 2013
- 360
-
Maritime detection of radiological/nuclear threats with hybrid imaging systemHutcheson, Anthony L. / Phlips, Bernard F. / Wulf, Eric A. / Mitchell, Lee J. / Johnson, W. Neil / Leas, Byron E. et al. | 2013
- 364
-
BIOSwimmer: Enabling technology for port securityConry, Michael / Keefe, Andrew / Ober, Willard / Rufo, Michael / Shane, David et al. | 2013
- 369
-
Maritime automated targets recognition algorithm test bed for high resolution ISAR imageryCross, Patrick L. et al. | 2013
- 375
-
User generic model for writer verification using multiband image scannerOkawa, Manabu / Yoshida, Kenichi et al. | 2013
- 381
-
Redeye Text Analysis Workbench: Actionable intelligence from non-actionable dataMcKenzie, Amber / Gillen, Rob / Logasa Bogen, Paul et al. | 2013
- 386
-
Multi-lingual author identification and linguistic feature extraction — A machine learning approachAlam, Hassan / Kumar, Aman et al. | 2013
- 390
-
An architecture for a resilient cloud computing infrastructureBaron, Joshua / Defrawy, Karim El / Nogin, Aleksey / Ostrovsky, Rafail et al. | 2013
- 396
-
Diversity in cloud systems through runtime and compile-time relocationKanter, Morgon / Taylor, Stephen et al. | 2013
- 403
-
Accountable cloudsGehani, Ashish / Ciocarlie, Gabriela F. / Shankar, Natarajan et al. | 2013
- 408
-
Simulation of emergency response operations for a static chemical spill within a building using an opportunistic resource utilization networkLilien, Leszek T. / Elbes, Mohammed W. / ben Othmane, Lotfi / Salih, Raed M. et al. | 2013
- 414
-
Developing a GIS based plume rose for industrial chemical incident preparedness and responseDas, Abhik Kumar / Debnath, Subhrajit / Asundi, Jai et al. | 2013
- 418
-
Protecting communities from chemical warfare agentsBeriwal, Madhu / Cochran, Barbara et al. | 2013
- 423
-
The muon portal project: A dedicated muon detector for the inspection of shipping containersBecciani, U. / Antonuccio, V. / Bandieramonte, M. / Belluomo, F. / Belluso, M. / Billotta, S. / Bonanno, D. L. / Bonanno, G. / Costa, A. / Fallica, G. et al. | 2013
- 429
-
Selective activation with all-laser-driven Thomson γ-raysSilano, J. / Karwowski, H. J. / Clarke, S. / Pozzi, S. / Banerjee, S. / Haden, D. / Golovin, G. / Chen, S. / Ghebregziabher, I. / Liu, C. et al. | 2013
- 435
-
The MAC-TMFD: Novel multi-armed Centrifugally Tensioned Metastable Fluid Detector (Gamma-Blind) — Neutron-alpha recoil spectrometerHume, N. / Webster, J. A. / Grimes, T. F. / Hagen, A. / Taleyarkhan, R. P. / Archambault, B. C. et al. | 2013
- 441
-
A new mobile biometric based upon usage contextBassu, Devasis / Cochinwala, Munir / Jain, Ashish et al. | 2013
- 447
-
Recent developments in voice biometrics: Robustness and high accuracyScheffer, Nicolas / Ferrer, Luciana / Lawson, Aaron / Lei, Yun / McLaren, Mitchell et al. | 2013
- 453
-
With vaulted voice verification my voice is my keyJohnson, R. C. / Boult, Terrance E. et al. | 2013
- 460
-
An architecture methodology for secure video conferencingLal, Reshma / Pappachan, Pradeep M. et al. | 2013
- 467
-
Analysis of data-leak hardware Trojans in AES cryptographic circuitsReece, Trey / Robinson, William H. et al. | 2013
- 473
-
A network-based approach to counterfeit detectionSathyanarayana, Supreeth / Robinson, William H. / Beyah, Raheem A. et al. | 2013
- 480
-
Anti-counterfeit Integrated Circuits using fuse and tamper-resistant time-stamp circuitryDesai, Avinash R. / Ganta, Dinesh / Hsiao, Michael S. / Nazhandali, Leyla / Wang, Chao / Hall, Simin et al. | 2013
- 486
-
Optimization of emergency response using higher order learning and clustering of 911 text messagesNelson, Christie / Pottenger, William M. et al. | 2013
- 492
-
Optimizing hauling vehicle mix for debris removal: A queueing theory approachBrooks, James D. / Mendonca, David et al. | 2013
- 498
-
Decision making to support local emergency preparation, response, and recoverySchneider, Jennifer / Romanowski, Carol J. / Stein, Kent et al. | 2013
- 504
-
Dynamic allocation of entities in closed queueing networks: An application to debris removalBrooks, James D. / Kar, Koushik / Mendonca, David et al. | 2013
- 511
-
Material characterization using a millimeter wave portal-based imaging system for security screeningAlvarez, Yuri / Las-Heras, Fernando / Gonzalez-Valdes, Borja / Martinez-Lorenzo, Jose Angel / Rappaport, Carey M. et al. | 2013
- 517
-
Automated object recognition and visualization techniques for muon tomography data analysisBandieramonte, Marilena / Delogu, Vincenzo Antonuccio / Becciani, Ugo / Costa, Alessandro / Massimino, Piero / Pistagna, Costantino / Riggi, Simone / Sciacca, Eva / Vitello, Fabio / Rocca, Paola La et al. | 2013
- 523
-
Nuisance alarm reduction using PVT: Land and maritime border securityDermody, G. / Ramsden, D. / Morgan, B. / Dallimore, M. / Brenker, K. et al. | 2013
- 529
-
Automated detection of anomalous shipping manifests to identify illicit tradeSanfilippo, Antonio / Chikkagoudar, Satish et al. | 2013
- 535
-
A framework of configurable multi-engine systems based on performance matrices for face recognitionHe, Hongmei / Guest, Richard M et al. | 2013
- 541
-
Analysis of the effects of image transformation, template selection, and partial information on face recognition with time-varying expressions for homeland security applicationsVoynichka, Iliana V. / Megherbi, Dalila B. et al. | 2013
- 547
-
Silhouette based gait recognition based on the area features using both model free and model based approachesKochhar, Arihant / Gupta, Divyesh / Hanmandlu, Madasu / Vasikarla, Shantaram et al. | 2013
- 552
-
3D face reconstruction and multimodal person identification from video captured using smartphone cameraRaghavendra, R. / Raja, Kiran B. / Pflug, Anika / Yang, Bian / Busch, Christoph et al. | 2013
- 558
-
Tools for understanding identityCreese, Sadie / Gibson-Robinson, Thomas / Goldsmith, Michael / Hodges, Duncan / Kim, Dee / Love, Oriana / Nurse, Jason R. C. / Pike, Bill / Scholtz, Jean et al. | 2013
- 564
-
Transitioning Linked Data accountable systems to the real world with identity, credential, and access management (ICAM) architecturesJacobi, Ian / Miao, Daniela / Waterman, K. Krasnow / Kagal, Lalana et al. | 2013
- 570
-
SAFE: A clean-slate architecture for secure systemsChiricescu, Silviu / DeHon, Andre / Demange, Delphine / Iyer, Suraj / Kliger, Aleksey / Morrisett, Greg / Pierce, Benjamin C. / Reubenstein, Howard / Smith, Jonathan M. / Sullivan, Gregory T. et al. | 2013
- 577
-
Towards a theory of autonomous reconstitution of compromised cyber-systemsRamuhalli, Pradeep / Halappanavar, Mahantesh / Coble, Jamie / Dixit, Mukul et al. | 2013
- 584
-
Priority capabilities in LTE supporting national security and emergency preparedness next generation network priority servicesTaylor, Carol-Lyn / Nolan, David / Wainberg, Stan et al. | 2013
- 589
-
The status and importance of robustness in the process of critical infrastructure resilience evaluationMartin, Hromada / Ludek, Lukas et al. | 2013
- 595
-
Autonomous and fault tolerant vehicular self deployment mechanisms in MANETsGundry, Stephen / Zou, Jianmin / Sahin, Cem Safak / Kusyk, Janusz / Uyar, M. Umit et al. | 2013
- 601
-
Muons scanner to detect radioactive source hidden in scrap metal containers: Mu-steel EU projectFurlan, M. / Rigoni, A. / Vanini, S. / Viesti, G. / Zumerle, G. / Bonomi, G. / Cambiaghi, D. / Dassa, L. / Donzella, A. / Subieta, M. et al. | 2013
- 607
-
Combined, solid-state molecular property and gamma spectrometers for CBRN&E detectionRogers, Ben / Malekos, Steven / Deal, Lee / Whitten, Ralph / Adams, Jesse et al. | 2013
- 613
-
Integration of Inertial Measurement data for improved localization and tracking of radiation sourcesCooper, Daniel A. / Ledoux, Robert J. / Kamieniecki, Krzysztof / Korbly, Stephen E. / Thompson, Jeffrey / Batcheler, James / Costales, James et al. | 2013
- 618
-
Utilization of advanced clutter suppression algorithms for improved spectroscopic portal capability against radionuclide threatsCosofret, Bogdan R. / Shokhirev, Kirill N. / Mulhall, Phillip A. / Payne, David / Harris, Bernard / Arsenault, Emily / Moro, Richard et al. | 2013
- 623
-
An assessment of the human performance of iris identificationGuest, Richard M / He, Hongmei / Stevenage, Sarah V / Neil, Greg J et al. | 2013
- 627
-
The effect of ethnicity, gender, eye color and wavelength on the biometric menagerieHoward, John J. / Etter, Delores et al. | 2013
- 633
-
Workload characteristics for iris matching algorithm: A case studyChang, Jed Kao-Tung / Hua, Fang / Torres, Gildo / Liu, Chen / Schuckers, Stephanie et al. | 2013
- 639
-
Application of pyramidal directional filters for biometric identification using conjunctival vasculature patternsTankasala, Sriram Pavan / Doynov, Plamen / Derakhshani, Reza et al. | 2013
- 645
-
Integrating physiological measurements with Avatars for effective identification technologiesMartin, Michael / Greff, Chris / Bourlai, Thirimachos / Cutlip, Robert G. / Pollina, Dean et al. | 2013
- 651
-
A unified authentication framework using finger nail plate biometricGarg, Shruti / Kumar, Amioy / Hanmandlu, Madasu / Vasikarla, Shantaram et al. | 2013
- 658
-
Person-of-interest detection system using cloud-supported computerized-eyewearWang, Xi / Zhao, Xi / Prakash, Varun / Gao, Zhimin / Feng, Tao / Gnawali, Omprakash / Shi, Weidong et al. | 2013
- 664
-
Utilizing automatic quality selection scheme for multi-modal biometric fusionHua, Fang / Johnson, Peter / Schuckers, Stephanie et al. | 2013
- 671
-
Performance of LaBr3(Ce) array detector system for non-destructive inspection of special nuclear material by using nuclear resonance fluorescenceOmer, Mohamed / Ohgaki, Hideaki / Negm, Hani / Daito, Izuru / Hori, Toshitada / Kii, Toshiteru / Zen, Heishun / Hajima, Ryoichi / Hayakawa, Takehito / Shizuma, Toshiyuki et al. | 2013
- 677
-
Design considerations for long-term remote photovoltaic-based power supply using non-planar photovoltaic surfacesShadmand, Mohammad B. / Balog, Robert S. et al. | 2013
- 683
-
A decision-theoretic approach to evaluate radiation detection algorithmsNobles, Mallory A. / Sego, Landon H. / Cooley, Scott K. / Gosink, Luke J. / Anderson, Richard M. / Hays, Spencer E. / Tardiff, Mark F. et al. | 2013
- 687
-
A study of collaborative distributed multi-goal & multi-agent-based systems for large Critical Key Infrastructures and Resources (CKIR) dynamic monitoring and surveillanceMegherbi, D. B. / Kim, Minsuk / Madera, Manual et al. | 2013
- 693
-
RSSI based range analysis of near-ground nodes in Wi-Fi crowded environmentsLuciani, Daniel P. / Davis, Almir et al. | 2013
- 698
-
Delivering diverse BGP data in real-time and through multi-format archivingOlschanowsky, Catherine / Weikum, M. Lawrence / Smith, Jason / Papadopoulos, Christos / Massey, Dan et al. | 2013
- 704
-
Static analysis of machine code for supply-chain risk managementAnderson, Paul / Loginov, Alexey et al. | 2013
- 710
-
A gold standard for assessing the coverage of static analyzersBush, Eric et al. | 2013
- 716
-
Reduced realistic attack plan surface for identification of prioritized attack goalsSmith, Jeffrey / Figueroa, Michael et al. | 2013
- 722
-
Unmanned aerial vehicle smart device ground control station cyber security threat modelMansfield, Katrina / Eveleigh, Timothy / Holzer, Thomas H. / Sarkani, Shahryar et al. | 2013
- 729
-
Modeling and characterization of GPS spoofingLarcom, Jonathan A. / Liu, Hong et al. | 2013
- 735
-
Secure techniques and methods for authenticating visually impaired mobile phone usersHaque, Md Munirul / Zawoad, Shams / Hasan, Ragib et al. | 2013
- 741
-
Modeling a secure supply chain integrity preservation systemKhan, Rasib / Haque, Md Munirul / Hasan, Ragib et al. | 2013
- 748
-
Cloud based passive building occupancy characterization for attack and disaster responseNyarko, Kofi / Wright-Brown, Cecelia et al. | 2013
- 754
-
Lessons from the past: Inaccurate credibility assessments made during crisis situationsLandrigan, Lauren C. / Wade, Jon P. / Milewski, Allen / Reagor, Barbara et al. | 2013
- 760
-
Social media in crisis events: Open networks and collaboration supporting disaster response and recoveryAkhgar, Babak / Fortune, Dave / Hayes, Richard E. / Guerra, Barbara / Manso, Marco et al. | 2013
- 766
-
A Precision Information Environment (PIE) for emergency responders: Providing collaborative manipulation, role-tailored visualization, and integrated access to heterogeneous dataKilgore, Ryan / Godwin, Alex / Davis, Amanda / Hogan, Chris et al. | 2013
- 772
-
Crowdsourcing, big data and homeland securityMarkowsky, George et al. | 2013
- 779
-
Emergency alerts to people on-the-go via terrestrial broadcasting: The M-EAS systemLuplow, Wayne / Kutzner, Jim et al. | 2013
- 784
-
Challenges of Small-Scale Safety and Thermal testing of improvised explosives: Results from the integrated data collection analysis (IDCA) program proficiency testReyes, Jose A. / Sandstrom, Mary M. / Brown, Geoffrey W. / Warner, Kirstin F. / Remmers, Daniel L. / Shelley, Timothy J. / Phillips, Jason J. / Hsu, Peter C. / Reynolds, John G. et al. | 2013
- 790
-
Designing public safety mobile applications for disconnected, interrupted, and low bandwidth communication environmentsErickson, Peter / Weinert, Andrew / Breimyer, Paul / Samperi, Matt / Huff, Jason / Parra, Carlos / Miller, Scarlett et al. | 2013
- 797
-
Enabling communications in disadvantage environments: An airborne remote communication (ARC) platformWeinert, Andrew / Erickson, Peter / Reis, Hilary / Breimyer, Paul / Hackett, Timothy / Samperi, Matt / Huff, Jason / Parra, Carlos / Stoekl, Erich / Zundritsch, Peter et al. | 2013