Characterizing sex trafficking in Pennsylvania for law enforcement (English)
- New search for: Giacobe, Nicklaus A.
- New search for: Altmire, Jesse B.
- New search for: Forster, Andrea E.
- New search for: Jackson, Addie C.
- New search for: Raibick, Erik W.
- New search for: Reep, James A.
- New search for: Tsang, Rebecca Y.
- New search for: Forster, Peter K.
- New search for: Giacobe, Nicklaus A.
- New search for: Altmire, Jesse B.
- New search for: Forster, Andrea E.
- New search for: Jackson, Addie C.
- New search for: Raibick, Erik W.
- New search for: Reep, James A.
- New search for: Tsang, Rebecca Y.
- New search for: Forster, Peter K.
In:
2016 IEEE Symposium on Technologies for Homeland Security (HST)
;
1-5
;
2016
-
ISBN:
- Conference paper / Electronic Resource
-
Title:Characterizing sex trafficking in Pennsylvania for law enforcement
-
Contributors:Giacobe, Nicklaus A. ( author ) / Altmire, Jesse B. ( author ) / Forster, Andrea E. ( author ) / Jackson, Addie C. ( author ) / Raibick, Erik W. ( author ) / Reep, James A. ( author ) / Tsang, Rebecca Y. ( author ) / Forster, Peter K. ( author )
-
Published in:
-
Publisher:
- New search for: IEEE
-
Publication date:2016-05-01
-
Size:668838 byte
-
ISBN:
-
DOI:
-
Type of media:Conference paper
-
Type of material:Electronic Resource
-
Language:English
-
Source:
Table of contents conference proceedings
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 1
-
Technical ProgramAkinyemi, Joseph Damilola / Onifade, Olufade F.W. et al. | 2016
- 1
-
Title page| 2016
- 1
-
Human CODIS STR loci profiling from HTS dataRicke, Darrell O. / Petrovick, Martha / Bobrow, Johanna / Boettcher, Tara / Zook, Christina / Harper, James / Wack, Edward / Schwoebel, Eric et al. | 2016
- 1
-
Feedback-based social media filtering tool for improved situational awarenessThornton, Jason / DeAngelus, Marianne / Miller, Benjamin A. et al. | 2016
- 1
-
KinLinks: Software Toolkit for kinship analysis and pedigree generation from HTS datasetsShcherbina, Anna / Ricke, Darrell O. / Schwoebel, Eric / Boettcher, Tara / Zook, Christina / Bobrow, Johanna / Petrovick, Martha / Wack, Edward et al. | 2016
- 1
-
Location-aware wireless emergency alertsKumar, Sumeet / Erdogmus, Hakan / Diogo Falcao, Joao / Griss, Martin / Iannucci, Bob et al. | 2016
- 1
-
Real time big data analytics for predicting terrorist incidentsToure, Ibrahim / Gangopadhyay, Aryya et al. | 2016
- 1
-
Priority service for CSfC secure mobile communication over LTE networks for national security and emergency preparednessEverett, Jared S. / Kim, H. Warren / Al-Chalabi, Muayyad / Yang, Yongwen et al. | 2016
- 1
-
Countering improvised explosive devices with adaptive sensor networksBuenfil, Jorge R. / Ramirez-Marquez, Jose et al. | 2016
- 1
-
Ultrafast blur evaluation in ocular biometricsDoynov, Plamen / Tankasala, Sriram Pavan et al. | 2016
- 1
-
I can detect you: Using intrusion checkers to resist malicious firmware attacksShila, Devu Manikantan / Geng, Penghe / Lovett, Teems et al. | 2016
- 1
-
Automated malware detection using artifacts in forensic memory imagesMosli, Rayan / Li, Rui / Yuan, Bo / Pan, Yin et al. | 2016
- 1
-
Applying the scientific method to cybersecurity researchTardiff, Mark F. / Bonheyo, George T. / Cort, Katherine A. / Edgar, Thomas W. / Hess, Nancy J. / Hutton, William J. / Miller, Erin A. / Nowak, Kathleen E. / Oehmen, Christopher S. / Purvine, Emilie A. H. et al. | 2016
- 1
-
Learning to rank for alert triageBierma, Michael / Doak, J D Justin E. / Hudson, Corey et al. | 2016
- 1
-
Infrastructure-less and calibration-free RFID-based localization algorithm for victim tracking in mass casualty incidentsYang, Zhuorui / Ganz, Aura et al. | 2016
- 1
-
Spatiotemporal digital forensic toolkit for mass casualty incidents: Interactive incident playback and anomaly detectionTang, Jingyan / Schafer, James / Yang, Zhuorui / Ganz, Aura et al. | 2016
- 1
-
Copyright information| 2016
- 1
-
The Houston and Chicago DTV datacasting pilots including a datacast concept of operationsDesourdis, Robert I. / O'Brien, Mark / Rosamilia, Peter J. et al. | 2016
- 1
-
A multi-biometric feature-fusion framework for improved uni-modal and multi-modal human identificationBrown, Dane / Bradshaw, Karen et al. | 2016
- 1
-
Modeling cybersecurity risks: Proof of concept of a holistic approach for integrated risk quantificationHenshel, Diane / Alexeev, Alexander / Cains, Mariana / Rowe, Jeff / Cam, Hasan / Hoffman, Blaine / Neamtiu, Iulian et al. | 2016
- 1
-
A facial recognition system for matching computerized composite sketches to facial photos using human visual system algorithmsWan, Qianwen / Panetta, Karen et al. | 2016
- 1
-
Automatic and manual tattoo localizationKim, Joonsoo / Li, He / Yue, Jiaju / Ribera, Javier / Delp, Edward J. / Huffman, Landis et al. | 2016
- 1
-
Producing and evaluating crowdsourced computer security attack treesBogaard, Dan / Goel, Sanjay / Kandari, Shreshth / Johnson, Daryl / Markowsky, George / Stackpole, Bill et al. | 2016
- 1
-
Security analysis and improvement of USB technologyNoyes, Daniel / Liu, Hong / Fortier, Paul et al. | 2016
- 1
-
Contrast enhancement for color images using discrete cosine transform coefficient scalingSamani, Arash / Panetta, Karen / Agaian, Sos et al. | 2016
- 1
-
Meaningful and meaningless statements using metrics for the border conditionRoberts, Fred S. et al. | 2016
- 1
-
Measuring efficacy of a classroom training week for a cybersecurity training exerciseDeckard, Gary M. / Camp, L. Jean et al. | 2016
- 1
-
Secure mobile technologies for proactive critical infrastructure situational awarenessSalles-Loustau, Gabriel / Sadhu, Vidyasagar / Pompili, Dario / Zonouz, Saman / Sritapan, Vincent et al. | 2016
- 1
-
Human collaboration in Homeland security: Collaboration planning for day-to-day and hastily formed networksDesourdis, Robert I. / Collins, Kuan H. / Rosamilia, Peter J. et al. | 2016
- 1
-
Profiling hoax callersSingh, Rita / Keshet, Joseph / Hovy, Eduard et al. | 2016
- 1
-
Acoustic methods of invasive species detection in agriculture shipmentsFlynn, Timothy / Salloum, Hady / Hull-Sanders, Helen / Sedunov, Alexander / Sedunov, Nikolay / Sinelnikov, Yegor / Sutin, Alexander / Masters, David et al. | 2016
- 1
-
Electroencephalogram (EEG) based authentication leveraging visual evoked potentials (VEP) resulting from exposure to emotionally significant imagesRodriguez, Ricardo J. et al. | 2016
- 1
-
Wireless communication supported by contactless fingerprintsMil'shtein, Sam / Buzawa, Carl et al. | 2016
- 1
-
A cognitive forensic framework to study and mitigate human observer biasKretz, Donald R. / Granderson, Charles W. et al. | 2016
- 1
-
Gathering threat intelligence through computer network deceptionUrias, Vincent E. / Stout, William M. S. / Lin, Han W. et al. | 2016
- 1
-
Mixed media tattoo image matching using transformed edge alignmentHuffman, Landis / McDonald, Jacob et al. | 2016
- 1
-
Person re-identification with spatial appearance group featureWei, Li / Shah, Shishir K. et al. | 2016
- 1
-
Experimental security surveillance system for an Island-based facilityCortese, Frank / Flynn, Timothy / Francis, Christopher / Salloum, Hady / Sedunov, Alexander / Sedunov, Nikolay / Sutin, Alexander / Yakubovskiy, Alexander et al. | 2016
- 1
-
Two-factor authentication through near field communicationCrossman, Matthew A. / Liu, Hong et al. | 2016
- 1
-
A multi-faceted approach to user authentication for mobile devices — Using human movement, usage, and location patternsShila, Devu Manikantan / Srivastava, Kunal / O'Neill, Paul / Reddy, Kishore / Sritapan, Vincent et al. | 2016
- 1
-
Secured formation control for multi-agent systems under DoS attacksAmullen, Esther M. / Shetty, Sachin / Keel, Lee H. et al. | 2016
- 1
-
Adaptive visual sort and summary of micrographic images of nanoparticles for forensic analysisJurrus, Elizabeth / Hodas, Nathan / Baker, Nathan / Marrinan, Tim / Hoover, Mark D. et al. | 2016
- 1
-
Dynamic rule generation for SCADA intrusion detectionNivethan, Jeyasingam / Papa, Mauricio et al. | 2016
- 1
-
RADAR: An automated system for near real-time detection and diversion of malicious network trafficJamous, Ziad El / Soltani, Sohraab / Sagduyu, Yalin / Li, Jason et al. | 2016
- 1
-
Analysis of the effect of selecting statistically significant registered image pixels on individual face physiognomy recognition accuracyVoynichka, Iliana V. / Megherbi, Alila B. et al. | 2016
- 1
-
Overview of the principles and practice of biodosimetrySwartz, Harold M. / Flood, Ann Barry / Williams, Benjamin B. et al. | 2016
- 1
-
A survey of homeland security biometrics and forensics researchNagaraju, Vidhyashree / Fiondella, Lance et al. | 2016
- 1
-
Drone classification and identification system by phenome analysis using data mining techniquesNijim, Mais / Mantrawadi, Nikhil et al. | 2016
- 1
-
Covert ground and port surveillance using Hyperbox®: Rayleigh backscattering from fiber opticsOdhner, Jefferson E. et al. | 2016
- 1
-
Simulation modeling of a statistical fire spread to respond fire accident in buildingsKim, Jeongwan / Dietz, J. Eric / Matson, Eric T et al. | 2016
- 1
-
Identifying vulnerabilities and hardening attack graphs for networked systemsSaha, Sudip / Vullikanti, Anil Kumar S. / Halappanavar, Mahantesh / Chatterjee, Samrat et al. | 2016
- 1
-
Improving traditional Android MDMs with non-traditional meansJohnson, Ryan / Stavrou, Angelos / Sritapan, Vincent et al. | 2016
- 1
-
Minimizing expected maximum risk from cyber-attacks with probabilistic attack successBhuiyan, Tanveer Hossain / Nandi, Apurba K. / Medal, Hugh / Halappanavar, Mahantesh et al. | 2016
- 1
-
Response and recovery: A quantitative approach to emergency managementRomanowski, Carol / Schneider, Jennifer / Mishra, Sumita / Raj, Rajendra / Rosario, Rossi / Stein, Kent / Solanki, Bhargav et al. | 2016
- 1
-
Common information space for collaborative emergency managementPottebaum, Jens / Schafer, Christina / Kuhnert, Maike / Behnke, Daniel / Wietfeld, Christian / Buscher, Monika / Petersen, Katrina et al. | 2016
- 1
-
Micro-Community detection and vulnerability identification for large critical networksChopade, Pravin / Zhan, Justin / Bikdash, Marwan et al. | 2016
- 1
-
Network security via biometric recognition of patterns of gene expressionShaw, Harry C et al. | 2016
- 1
-
Mapping a community resilience management system: Building operational knowledgeSchneider, Jennifer / Romanowski, Carol / Raj, Rajendra / Mishra, Sumita / Aleckna, Jonathan / Wang, Kaiyue et al. | 2016
- 1
-
Augmented reality based mass casualty incident training systemDong, Hao / Schafer, James / Ganz, Aura et al. | 2016
- 1
-
Active shooter mitigation for gun-free zonesKirby, Adam / Anklam, Charles E. / Dietz, J. Eric et al. | 2016
- 1
-
New biometrics Ear-Eye Pitch (E2P)Naimark, Leonid / Briggs, Paul et al. | 2016
- 1
-
Using scenario planning to predict/prevent future terror attacksChasteen, Larry et al. | 2016
- 1
-
Border crossing data acquisition, analysis, and useLese, William / Rawat, Pramud et al. | 2016
- 1
-
Aerial precision 3-D ground surveillance and localization using a network of inexpensive, disposable, image-based sensorsDavis, Almir / Vincent, Colin / Otenti, Nathan / Parolin, Adam et al. | 2016
- 1
-
Battelle barricade: A nondestructive electronic component authentication and counterfeit detection technologyBergman, Thomas D. / Manager, Cyber Program / Liszewski, Katie T. et al. | 2016
- 1
-
Security tenets for life critical embedded systemsCox, Ann et al. | 2016
- 1
-
Evaluation of ‘non-traditional’ fingerprint sensor performanceLazarick, Rick / Wolfhope, Patricia et al. | 2016
- 1
-
Neuromorphic and early warning behavior-based authentication for mobile devicesPhillips, Matthew E. / Stepp, Nigel D. / Cruz-Albrecht, Jose / De Sapio, Vincent / Lu, Tsai-Ching / Sritapan, Vincent et al. | 2016
- 1
-
Propagating mixed uncertainties in cyber attacker payoffs: Exploration of two-phase Monte Carlo sampling and probability bounds analysisChatterjee, Samrat / Tipireddy, Ramakrishna / Oster, Matthew / Halappanavar, Mahantesh et al. | 2016
- 1
-
The ethics of hacking backHolzer, Corey T. / Lerums, James E. et al. | 2016
- 1
-
Properties and use of a resilience index in disaster preparation and responseTeodorescu, Horia-Nicolai L. / Pickl, Stefan Wolfgang et al. | 2016
- 1
-
Semantic ontologies for cyber threat sharing standardsAsgarli, Elchin / Burger, Eric et al. | 2016
- 1
-
Multiple people tracking using contextual trajectory forecastingMantini, Pranav / Shah, Shishir K. et al. | 2016
- 1
-
Multitasking intelligent surveillance and first response systemNijim, Mais et al. | 2016
- 1
-
A robust scheme for iris segmentation in mobile environmentReddy, Narsi / Rattani, Ajita / Derakhshani, Reza et al. | 2016
- 1
-
A study on the privacy and security of police body cameras deploymentsCochrane, Claire M. / Tan, Chiu C. et al. | 2016
- 1
-
A Linux-based firewall for the DNP3 protocolNivethan, Jeyasingam / Papa, Mauricio et al. | 2016
- 1
-
Digital forensics research on cloud computing: An investigation of cloud forensics solutionsMorioka, Emi / Sharbaf, Mehrdad S. et al. | 2016
- 1
-
A novel centrality measure for network-wide cyber vulnerability assessmentSathanur, Arun V. / Haglin, David J. et al. | 2016
- 1
-
Robust and interoperable fingerprint spoof detection via convolutional neural networksMarasco, Emanuela / Wild, Peter / Cukic, Bojan et al. | 2016
- 1
-
Improved Fingercode alignment for accurate and compact fingerprint recognitionBrown, Dane / Bradshaw, Karen et al. | 2016
- 1
-
Hazmat dispersion modeling in support of urban emergency response for the fire brigade in Hamburg, GermanyBerbekar, E. / Harms, F. / Leitl, B. / Boris, J. / Moses, A. / Obenschain, K. / Patnaik, G. / Fischer, S. / Storm, K. et al. | 2016
- 1
-
Tattoo image retrieval for region of interestKim, Joonsoo / Li, He / Yue, Jiaju / Delp, Edward J. et al. | 2016
- 1
-
Modeling of a multi-robot energy saving system to increase operating time of a firefighting robotKim, Jeongwan / Dietz, J. Eric / Matson, Eric T et al. | 2016
- 1
-
Optimized NCC-information theoretic metric for noisy wavelength band specific similarity measuresVakil, Mohammad I. / Megherbi, Dalila B. / Malas, John A. et al. | 2016
- 1
-
Programming language support for analyzing non-persistent dataLu, Yung-Hsiang / Kulkarni, Milind / Jaber, Nouraldin / Zhu, Jerry Xiaojin et al. | 2016
- 1
-
Visual analytics for investigative analysis of hoax distress calls using social mediaChae, Junghoon / Zhang, Jiawei / Ko, Sungahn / Malik, Abish / Connell, Heather / Ebert, David S. et al. | 2016
- 1
-
Improve safety using public network camerasKoh, Youngsol / Mohan, Anup / Wang, Guizhen / Xu, Hanye / Malik, Abish / Lu, Yung-Hsiang / Ebert, David S. et al. | 2016
- 1
-
Turning security monitoring into an engaging high performance taskDcosta, Malcolm / Shastri, Dvijesh / Tsiamyrtzis, Panagiotis / Pavlidis, Ioannis et al. | 2016
- 1
-
Adapting NIEM input for automated privacy policy reasoningYuan, Ben Z. et al. | 2016
- 1
-
Modeling urban fires in Mediterranean and Middle-Eastern citiesShaham, Yonatan / Benenson, Itzhak et al. | 2016
- 1
-
Design and experimental validation of UAV-assisted radiological and nuclear sensingBehnke, Daniel / Rohde, Sebastian / Wietfeld, Christian et al. | 2016
- 1
-
Message authentication in driverless carsAbueh, Yeka Joseph / Liu, Hong et al. | 2016
- 1
-
None invasive biometrie for patient information satisfying patient's security concernsNwosu, Kingsley C. / Igbonagwam, Okey et al. | 2016
- 1
-
Characterizing sex trafficking in Pennsylvania for law enforcementGiacobe, Nicklaus A. / Altmire, Jesse B. / Forster, Andrea E. / Jackson, Addie C. / Raibick, Erik W. / Reep, James A. / Tsang, Rebecca Y. / Forster, Peter K. et al. | 2016
- 1
-
Enduring Vigilance (EV)Petrella, Anthony J. / Dyer, John W. et al. | 2016
- 1
-
On a taxonomy of ear featuresEl-Naggar, Susan / Abaza, Ayman / Bourlai, Thirimachos et al. | 2016
- 1
-
Critical infrastructure protection for substations and transformersSinisi, John P. et al. | 2016
- 1
-
Walk-through metal detectors for stadium securityNelson, Christie / Chaudhary, Vijay / Edman, John / Kantor, Paul et al. | 2016