Integrated PMR-broadband-IP network for secure realtime multimedia information sharing (Englisch)
- Neue Suche nach: Subik, S.
- Neue Suche nach: Wietfeld, C.
- Neue Suche nach: Subik, S.
- Neue Suche nach: Wietfeld, C.
- Aufsatz (Konferenz) / Elektronische Ressource
-
Titel:Integrated PMR-broadband-IP network for secure realtime multimedia information sharing
-
Beteiligte:Subik, S. ( Autor:in ) / Wietfeld, C. ( Autor:in )
-
Erschienen in:
-
Verlag:
- Neue Suche nach: IEEE
-
Erscheinungsdatum:01.11.2011
-
Format / Umfang:1381285 byte
-
ISBN:
-
DOI:
-
Medientyp:Aufsatz (Konferenz)
-
Format:Elektronische Ressource
-
Sprache:Englisch
-
Datenquelle:
Inhaltsverzeichnis Konferenzband
Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.
- 1
-
Table of contents| 2011
- 1
-
Thank you to our sponsors and exhibitors| 2011
- 1
-
Author index| 2011
- 1
-
Separating the baby from the bathwater: Toward a generic and practical framework for anonymizationShapiro, S. S. et al. | 2011
- 1
-
Welcome message from the conference chair| 2011
- 1
-
Organizational Committee| 2011
- 1
-
[Copyright notice]| 2011
- 6
-
Towards a privacy management framework for distributed cybersecurity in the new data ecologyBreaux, T. D. / Lotrionte, C. B. et al. | 2011
- 13
-
Quantum cryptography: An emerging technology in network securitySharbaf, M. S. et al. | 2011
- 20
-
Integrated PMR-broadband-IP network for secure realtime multimedia information sharingSubik, S. / Wietfeld, C. et al. | 2011
- 26
-
Information sharing for situational understanding and command coordination in emergency management and disaster responseDesourdis, R. I. / Contestabile, J. M. et al. | 2011
- 33
-
Digital televison for homeland security: Broadband datacast for situational awareness and command coordinationDesourdis, Robert I. / Vest, K. F. / O'Brien, M. / Mulholland, D. J. et al. | 2011
- 43
-
Modeling and simulation in support of understanding maritime security and defense capabilities and requirements (The maritime timeline and analysis requirements toolset (M-TART))Carson, N. et al. | 2011
- 49
-
Visual analytics for maritime domain awarenessLavigne, V. / Gouin, D. / Davenport, M. et al. | 2011
- 55
-
Person attribute search for large-area video surveillanceThornton, J. / Baran-Gale, J. / Butler, D. / Chan, M. / Zwahlen, H. et al. | 2011
- 62
-
Assuring software and hardware security and integrity throughout the supply chainAxelrod, C. W. et al. | 2011
- 69
-
Biometrics assisted secure network transactionsKunnil, V. O. / Pillai, A. / Milshtein, S. et al. | 2011
- 75
-
An integrated machine learning and control theoretic model for mining concept-drifting data streamsShetty, S. / Mukkavilli, S. K. / Keel, L. H. et al. | 2011
- 81
-
Visualization, modeling and predictive analysis of cyber security attacks against cyber infrastructure-oriented systemsWalker, J. J. / Jones, T. / Blount, R. et al. | 2011
- 86
-
Common framework to evaluate modern embedded systems against side-channel attacksSouissi, Y. / Guilley, S. / Bhasin, S. / Danger, J-L et al. | 2011
- 92
-
Constrained classification for infrastructure threat assessmentLennox, K. P. / Glascoe, L. et al. | 2011
- 98
-
Risk based screening and explosive detection at the passenger screening checkpointMook, D. / Scheinman, E. D. et al. | 2011
- 104
-
Validation of HADES-based simulations of radiographic experimentsHaiyin Chen, / Aufderheide, M. B. / White, W. T. / Roberson, G. P. / Glascoe, L. G. et al. | 2011
- 110
-
A stochastic game model on container securityBakir, N. O. / Kardes, E. et al. | 2011
- 117
-
Local reconfiguration for simultaneous coverage and tracking in a large scale camera networkLemon, B. / Kulathumani, V. et al. | 2011
- 123
-
Non-lethal ballistic system with point accuracy for facility and border securityWidder, J. / Rascoe, J. / Perhala, C. et al. | 2011
- 129
-
MIST: An operational ground surveillance cameraWilhelm, J. P. / Gautam, M. / Ronen, S. et al. | 2011
- 136
-
Integrated aviation security for defense-in-depth of next generation air transportation systemLi, W. / Kamal, P. et al. | 2011
- 143
-
Next generation RASR TALONTM A remote robotic rapid area sensitive site reconnaissance platformWells, P. / America, Q. / Lobb, T. / LaValley, H. / Rezac, J. / Chyba, T. H. et al. | 2011
- 150
-
HOMEbaseTM: An operational concept for collaborative disaster responseHitt, P. C. / Zollinger, K. et al. | 2011
- 156
-
Managed attributes, not standards, lead to interoperabilityConnell, Thomas W. et al. | 2011
- 161
-
CHANNELS: An information flow modeling system to support planning and interoperabilityCloutier, J. / Kamien, D. / Desourdis, R. I. et al. | 2011
- 167
-
Automated computer network defence technology demonstration project (ARMOUR TDP): Concept of operations, architecture, and integration frameworkSawilla, R. E. / Wiemer, D. J. et al. | 2011
- 173
-
The community cyber security maturity modelWhite, G. B. et al. | 2011
- 179
-
Hazard Mitigation, Materiel and Equipment Restoration (HaMMER) Advanced Technology Demonstration (ATD)Saxon, M. / Rossman, R. / Yontosh, K. / Merboth, G. et al. | 2011
- 185
-
A counter-IED preparedness methodology for large event planningPayne, P. W. / Koch, D. B. et al. | 2011
- 190
-
Improvised nuclear device case study: An analytic framework for disaster managementBuddemeier, B. / Suski, N. et al. | 2011
- 196
-
Polarization-cum-energy metric for footstep detection using vector-sensorVenkatraman, D. / Reddy, V. V. / Khong, A. W. H. / Ng, B. P. et al. | 2011
- 202
-
Aggregating seismic, acoustic and vibration sensor outputs for enhancing threat detection performance and estimating threat-levelYousefi, A. / Dibazar, A. A. / Berger, T. W. et al. | 2011
- 208
-
CSharp: Surreptitious standoff tagging and tracking system using passive nanotechnical transponders: A spiral research, development, test, engineering (RDTE) and production programLeibholz, S. W. / Maston, M. J. et al. | 2011
- 213
-
Criterra automatic location planningCassenti, L. / Leed, P. E. Peter et al. | 2011
- 219
-
IntentFinder: A system for discovering significant information implicit in large, heterogeneous document collections and computationally mapping social networks and command nodesUngar, L. / Leibholz, S. / Chaski, C. et al. | 2011
- 224
-
System-aware security for nuclear power systemsJones, R. A. / Nguyen, T. V. / Horowitz, B. M. et al. | 2011
- 230
-
Measuring the human factor of cyber securityBowen, B. M. / Devarajan, R. / Stolfo, S. et al. | 2011
- 236
-
Cyber resilience for mission assuranceGoldman, H. / McQuaid, R. / Picciotto, J. et al. | 2011
- 242
-
A calibration free hybrid RF and video surveillance system for reliable tracking and identificationXunyi Yu, / Ganz, A. et al. | 2011
- 248
-
Systems engineering approach to chemical biological and radiological detection system designRisser, J. / Saxon, M. et al. | 2011
- 254
-
A framework for real-time monitoring of acoustic events using a wireless sensor networkDhawan, A. / Balasubramanian, R. / Vokkarane, V. et al. | 2011
- 262
-
Use of small imaging sonars for diver identificationCrawford, A. / Percival, A. / Crowe, V. et al. | 2011
- 267
-
Submerged explosives detection platforms using immunosensing technologyVeitch, S. P. / Kusterbeck, A. W. / Fratantonio, R. J. / Charles, P. T. / Egli, P. J. / Deschamps, J. R. / Hanson, A. K. / Adams, A. A. et al. | 2011
- 273
-
Harbor shield program update: Underwater acoustic imaging of moving vesselsGranger, R. / Faulkner, L. / Rabe, E. / Steinbrecher, D. et al. | 2011
- 276
-
The development of an aerodynamic shoe sampling systemStaymates, M. / Grandner, J. / Gillen, Greg / Lukow, Stefan et al. | 2011
- 282
-
Tunable, self-curing polymers for the forensic collection of latent signatures from within porous materialsChipuk, J. E. / Mazzitelli, C. L. / Kendall, J. K. / Straight, S. D. / Reaves, M. A. / Chamberlin, S. C. et al. | 2011
- 287
-
Operationalizing the coordinated incident handling modelDaley, R. / Millar, T. / Osorno, M. et al. | 2011
- 295
-
Pervasive readiness: Pipedream or possible? A practical approach for measuring public saftey readinessVidali, A. A. / Hutchens, J. D. / Javidi, M. et al. | 2011
- 306
-
Modeling attacker-technology system interaction in transportation networks: P2I3-modelTolba, S. / Fiondella, L. / Ammar, R. / Lownes, N. / Rajasekaran, S. / Ivan, J. / Qixing Wang, et al. | 2011
- 313
-
Airborne spectrometry: Extraction of low energy γ-rays using two or three spectral windowsMartin-Burtart, N. / Guillot, L. / Nourreddine, A-M et al. | 2011
- 319
-
Nuclear detection using higher order learningNelson, C. / Pottenger, W. M. et al. | 2011
- 325
-
Probabilistic Effectiveness Methodology: A holistic approach on risk assessment of nuclear smugglingCuellar, L. / Cleland, T. / Kubicek, D. / Kelton, T. / Mathis, M. / Roach, F. / Roberts, R. / Stroud, P. / Saeger, K. J. / Smith, J. P. et al. | 2011
- 332
-
Scanning White Light Interferometry, — A new 3D forensics toolHeikkinen, V. / Kassamakov, I. / Haggstrom, E. / Lehto, S. / Kiljunen, J. / Reinikainen, T. / Aaltonen, J. et al. | 2011
- 338
-
Behavior-based network traffic synthesisYingbo Song, / Stolfo, S. J. / Jebara, T. et al. | 2011
- 345
-
Attribution requirements for next generation InternetsHunker, J. / Gates, C. / Bishop, M. et al. | 2011
- 351
-
Integrating equilibrium assignment in game-theoretic approach to measure many-to-many transportation network vulnerabilityQixing Wang, / Fiondella, L. / Lownes, N. / Ivan, J. / Ammar, R. / Rajasekaran, S. / Tolba, S. et al. | 2011
- 358
-
Real-time Online Game-based Use-case Engine for Validation of Interagency Doctrine in Emergency Operations: Research exploring the use of synthetic environments to augment disaster planning, preparation, response, and recoveryWalsh, W. / Blais, C. / Englehorn, L. / McDowell, P. et al. | 2011
- 365
-
Low cost, pervasive detection of radiation threatsDrukier, G. A. / Rubenstein, E. P. / Solomon, P. R. / Wojtowicz, M. A. / Serio, M. A. et al. | 2011
- 372
-
Beyond He-3 nuclear sensors — TMFDs for real-time SNM monitoring with directionalityWebster, J. A. / Grimes, T. F. / Archambault, B. / Fischer, K. / Kostry, N. / Lentner, A. / Lapinskas, J. / Taleyarkhan, R. P. et al. | 2011
- 379
-
Database of high-Z signatures in cargoBentley, R. et al. | 2011
- 384
-
Anomalous spectrum usage attack detection in cognitive radio wireless networksSorrells, C. / Potier, P. / Lijun Qian, / Xiangfang Li, et al. | 2011
- 390
-
Data intensive architecture for scalable cyber analyticsOlsen, B. / Johnson, J. R. / Critchlow, T. et al. | 2011
- 396
-
Defining malware families based on analyst insightsGennari, J. / French, D. et al. | 2011
- 402
-
Secure scalable disaster electronic medical record and tracking systemDeMers, G. / Kahn, C. / Buono, C. / Chan, T. / Blair, P. / Griswold, W. / Johansson, P. / Chipara, O. / Plymoth, A. N. et al. | 2011
- 407
-
Real-time scalable resource tracking framework (DIORAMA): System description and experimentationGanz, A. / Xunyi Yu, / Schafer, J. / Lord, G. et al. | 2011
- 413
-
Dense radar networks for low-flyer surveillancePepyne, D. / McLaughlin, D. / Westbrook, D. / Lyons, E. / Knapp, E. / Frasier, S. / Zink, M. et al. | 2011
- 419
-
Asynchronous and self-organizing radiolocation system — AEGIRAmbroziak, S. J. / Katulski, R. J. / Sadowski, J. / Siwicki, W. / Stefanski, J. et al. | 2011
- 426
-
Multi-agent distributed dynamic scheduling for large distributed Critical Key Infrastructures and Resources (CKIR) surveillance and monitoringMegherbi, D. B. / DongChao Xu, et al. | 2011
- 434
-
A texture-based method for identificaiton of retinal vasculatureGottemukkula, V. / Saripalle, S. / Derakshani, R. / Tankasala, S. P. et al. | 2011
- 440
-
Predicting ethnicity and gender from iris textureLagree, S. / Bowyer, K. W. et al. | 2011
- 446
-
New technologies and processes for the Homeland Security Exercise and Evaluation Program toolkitJohn, C. J. / Pancerella, C. M. / Yang, L. / Mahrous, K. / Elkin, G. R. / Norige, A. S. / Holtermann, K. / Mapar, J. et al. | 2011
- 451
-
Modeling & Simulation Capability for Consequence ManagementBaker, V. et al. | 2011
- 457
-
Smart Container Management: Creating value from real-time container security device dataCarn, J. et al. | 2011
- 466
-
Phenomenological scattering analysis of an RF Area Secure PerimeterRappaport, C. / Rodriguez-Vaqueiro, Y. / Martinez-Lorenzo, J. A. / Gonzalez-Valdes, B. / Beaty, J. / Morgenthaler, A. / Naqvi, W. et al. | 2011
- 470
-
Avoiding the closure of ports during a national emergencyBottan, G. L. et al. | 2011
- 475
-
Face recognition despite missing informationDagli, C. K. / Brady, K. J. / Halbert, D. C. et al. | 2011
- 481
-
Technology transition of network defense visual analytics: Lessons learned from case studiesO'Brien, B. F. / D'Amico, A. / Larkin, M. E. et al. | 2011
- 487
-
Self-organizing resilient network sensing (SornS) with very large scale anomaly detectionDove, R. et al. | 2011
- 494
-
Integrating physical and cyber security resources to detect wireless threats to critical infrastructureD'Amico, A. / Verderosa, C. / Horn, C. / Imhof, T. et al. | 2011
- 501
-
A rapid method for detecting geographically disconnected areas after disastersLing-Jyh Chen, / Chia-Wei Li, / Yu-Te Huang, / Chi-Sheng Shih, et al. | 2011
- 507
-
Development of the adaptable, GIS-based, multi-threat detection systemMcClintock, J. / Saxon, M. / Forsythe, J. / Rascoe, J. / Risser, J. et al. | 2011
- 512
-
Enabling distributed command and control with standards-based geospatial collaborationDi Ciaccio, R. / Pullen, J. / Breimyer, P. et al. | 2011
- i
-
Westin hotel room layout| 2011