2015 IEEE International Symposium on

Technologies for Homeland Security

14-16 April 2015, Westin Hotel, Waltham, MA

no seeum

2015 IEEE HST Symposium Peer Selected Paper Program

NOTE: This page is from the last conference. It is kept here for reference only. It will be updated later.

Tuesday November 12, 2013
4:00 PM
5:30 PM
Cyber Security Session 1: Attack Modeling I

Cyber Security in the Web 2.0 World – An Overview of SOA Infrastructure Vulnerabilities in Nation’s Public-Sector Financial Services

Adnan Masood*, Nova Southeastern University

Intended Effects of Cyber Resiliency Techniques on Adversary Activities

Deborah Bodeau*, The MITRE Corporation; Richard Graubart, The MITRE Corporation

Towards a Web Tracking Profiling Algorithm

William Huba, Hiveary Inc.; Bo Yuan, Rochester Institute of Technology; Yin Pan, Rochester Institute of Technology; Sumita Mishra*, Rochester Institute of Technology

Attack and Disaster Preparation, Recovery, and Response Session 1:

A Customized Modeling and Simulation Tool for Port and Airport Evacuation and Recovery

Paul Belella*, Delcan Corporation; BethAnn Rooney, Port Authority of New York & New Jersey

An Algorithm to Prioritize Road Network Restoration following a Regional Event

Lance Fiondella*, University of Massachusetts Dartmouth

Generic Incident Model for Use in Large-Scale Evacuation Simulations

Andrew Collins*, VMASC; Mike Robinson, VMASC; Craig Jordan, VMASC; Peter Foytik, VMASC; Barry Ezell, VMASC

Interacting with Trapped Victims Using Robots

Robin Murphy*, Texas A&M; Matthew Minson, Texas Task Force 1; Tim Valdez, Texas Task Force 1; Vasant Srinivasan, Texas A&M; Zachary Henkel, Texas A&M; Jesus Suarez, Texas A&M; Stanley Hempstead, Texas Task Force 1; J. Strauss, Texas Task Force 1; Shinichi Egawa, Tohoku University

Land and Maritime Border Security Session 1: Command, Control & Operations

Protecting our Nation’s Ports with the Port Security Risk Analysis and Resource Allocation System (PortSec 3.0)

Michael Orosz, ; Isaac Maya*, USC/CREATE; Daniel Salazar, Samrat Chatterjee, Dan Wei, Jennifer Chen

Open Border CONOPS Simulation

Sara Lemley*, Raytheon; Juan Sandoval, Nicholas Sapankevych

RIPTIDE - Learning Violation Prediction Models from Boarding Activity Data

Hans Chalupsky*, Information Sciences Institute; Eduard Hovy, CMU Language Technologies Institute

Biometrics & Forensics Session 1: Quality & Multimodal

Methodological Insights on Restoring Face Photos of Multinational Passports

Antwan Clark, Univ. of MD (LPS); Thirimachos Bourlai*, West Virginia University

Securing Multimodal Biometric Data through Watermarking and Steganography

Cameron Whitelam*, WVU; Nnamdi Osia, West Virginia University; Thirimachos Bourlai, West Virginia University

What is Biometric Information and How to Measure It?

Yagiz Sutcu*, Polytechnic Institute of NYU; Elham Tabassi; Nasir Memon; Taha Sencar

Business Track Session 1

The Lion’s Den

Join us to watch CEOs….Enter the Lion's Den. Modeled after the popular television program, Shark Tank, IEEE is proud to feature a plenary session with a number of Lion's in the security and technology industry to ask aspiring technology CEOs pointed questions about the business side of their technology company and uncover whether that company is really prepared, business savvy and ready to take their company to the next level.

Confirmed as our lead lion is Admiral Jay Cohen, Principal at the Chertoff Group and former Under Secretary for the Science & Technology Directorate of the U.S. Department of Homeland Security. Other lions include Jay Batson, founding CEO of Acquia, Robert Buderi, Founder and Editor in Chief of Xconomy, and Dave Oliver, who recently retired from EADS North America where he served as CEO of the Defense Company and Chief Operating Officer.

Business - Lion's Den (Description & Invitation pdf)



Wednesday November 13, 2013
8:00 AM
10:00 AM
Cyber Security Session 2:

Attack Modeling II

CyberVis: Visualising the Potential Impact of Cyber Attacks on the Wider Enterprise

Sadie Creese*, University of Oxford; Michael Goldsmith, University of Oxford; Nick Moffat, University of Oxford; Jassim Happa, University of Oxford; Ioannis Agrafiotis, University of Oxford

Towards a Multiscale Approach to Cybersecurity Modeling

Emilie Hogan, Pacific Northwest National Laboratory; Peter Hui*, Pacific Northwest National Lab; Sutanay Choudhury, Pacific Northwest National Laboratory; Mahantesh Halappanavar, PNNL; Kiri Oler, Pacific Northwest National Laboratory

Insider Threat

Detecting Threatening Insiders with Lightweight Media Forensics in Cyber Security

Simson Garfinkel*, NPS; Nicole Beebe, University of Texas San Antonio, USA; Lishu Liu, UTSA; Michele Maasberg

Data Sharing

Toward a Comprehensive Disclosure Control Framework for Shared Data

Scott Coull*, RedJack; Erin Kenneally, Elchemy, Inc.

Attack and Disaster Preparation, Recovery, and Response Session 2:

Structural and Functional Vulnerability Analysis for Survivability of Smart Grid and SCADA Network Under Severe Emergencies and WMD Attacks

Pravin Chopade*, North Carolina A&T State Unive; Dr. Marwan Bikdash, Computational Science and Engineering Dept. North Carolina A&T State University

National Security and Emergency Preparedness Communications: Next Generation Priority Services

David Nolan, DHS/OEC; Frank Suraci, DHS/OEC; John Wullert, Applied Communication Sciences; Arye Ephrath*, Mythology, Inc.

Information Management and Decision Support in Critical Infrastructure Emergencies at the Local Level

Carol Romanowski*, RIT; Sumita Mishra, Rochester Institute of Technol; Rajendra Raj, Rochester Institute of Technol; Trudy Howles, Rochester Institute of Technology; Jennifer Schneider, RIT

Resilience Management through Use of CERT-RMM & Associated Success Stories

Nader Mehravari*, Carnegie Mellon University

Land and Maritime Border Security Session 2: Ground and Perimeter

Development of Dual Leaky Coaxial Cables for Intruder Detection System

Wataru Tsujita*, Mitsubishi Electric Corp.; Kenji Inomata, Mitsubishi Electric Corp; Takashi Hirai, Mitsubishi Electric Corp

Geophysical and Operational System Performance Tool for the Detection of Clandestine Tunnels: Enhancement and Case Studies

Weiqun Shi*, The MITRE Corporation; David Masters, Walter Kuklinski, ; Casey Crager, Eliot Lebsack, Mark Munson, Carol Christou,

Geo-Pointing and Threat Location Techniques for Airborne Border Surveillance

Eric Stich*, Raytheon

Acoustic Detection, Tracking, and Classification of Low Flying Aircraft

Alexander Sutin*, Stevens Institute of Techn; Hady Salloum, Stevens Tech; Nikolay Sedunov, Stevens Tech; Alexander Sedunov, Stevens Tech

Biometrics & Forensics Session 2: Hand, Finger, Palm

A Novel method for Touch-Less Finger Print Authentication

Hareesh Ravi*, Anna University; Sabarish Kuduwa Sivanath, Anna University

Touch Panel with Integrated Fingerprint Sensors Based User Identity Management

Tao Feng*, University of Houston; Varun Prakash, University of Houston; Wanjun Zhang, University of Houston; Larry Shi, University of Houston

Thermal Hand Vein Pattern Recognition

Carlos Cabrera*, Miami Dade College

Point-Based Features for Contact-less Palm Print Images

Anil Parihar*, Delhi Technological University; Amioy Kumar, IITD; Om Prakash Verma, Delhi Technological University; Ankita Gupta, Delhi Technological University; Deepika Vatsa, Delhi Technological University; Prerana Mukherjee, Delhi Technological University

10:30 AM
Cyber Security Session 3: Panel

Cybersecurity and Critical Infrastructure Policy: Changing the Landscape in 2013 and Beyond

Facing both physical and cyber threats to our Nation that could disrupt our power, water, communication and other critical systems, the President in February 2013 issued Executive Order 13636 (the EO) on Improving Critical Infrastructure Cybersecurity and Presidential Policy Directive 21 (the PPD) on Critical Infrastructure Security and Resilience. These policies reinforce the need for holistic thinking about security and risk management. Implementation of the EO and PPD will drive action toward system and network security and resiliency, and will also enhance the efficiency and effectiveness of the U.S. government’s work to secure critical infrastructure and make it more resilient. Key participants in the work stemming from the EO and PPD will present the latest developments and their perspectives on the path ahead.


Bob Kolasky, Senior Adviser, DHS NPPD Infrastructure Protection
Scott Tousley, Deputy Director, DHS S&T Cyber Security Division
Kristin Wyckoff, Deputy Director, DHS S&T Resilient Systems Division
Tom Finan, Senior Cyber Security Strategist and Counsel, DHS NPPD Office of Strategy and Policy
Tony Cheesebrough, Senior Economist, DHS NPPD
Larry Clinton, CEO, Internet Security Alliance
Adam Sedgewick, Senior Information Technology Policy Advisor, NIST (invited)

Attack and Disaster Preparation, Recovery, and Response Session 3:

A Random-Forest-based Efficient Comparative Machine Learning Predictive-DNA-Metagenomics Binning Technique For WMD Events Applications

Dalila Megherbi*, University of Massachusetts, L; Helal Saghir, CMINDS, University of Massachusettes, Lowell

Recognition, Segmentation and Retrieval of Gang Graffiti Images on a Mobile Device

Albert Parra Pozo*, Purdue University; Bin Zhao, Purdue University; Joonsoo Kim, Purdue University; Edward Delp, Purdue University

Resilient Visual Situational Awareness During Disasters and Recovery: Lessons from Real-World Case-Studies and Applicability to FirstNet

Baruch Altman*, LiveU

Land and Maritime Border Security Session 3: Port & Maritime I

SCUBA Diver Detection and Classification in Active and Passive Sonars - A Unified Approach

Alexander Yakubovskiy*, Farsounder; Matthew Zimmerman, Farsounder; Nabin Sharma, FarSounder, Inc.

Stevens Passive Acoustic System for Surface and Underwater Threat Detection

Alexander Sutin*, Stevens Institute of Techn; Hady Salloum, Stevens Tech; Michael DeLorme, Stevens Tech; Nikolay Sedunov, Stevens Tech; Alexander Sedunov, Stevens Tech; Mikhail Tsionskiy, Stevens Tech

Bio-Inspired Topology Control Mechanism for Autonomous Underwater Vehicles Used in Maritime Surveillance

Jianmin Zou*, City College Of New York; Stephen Gundry, ; M.Umit Uyar, ; Janusz Kusyk, ; Cem  Sahin

Biometrics & Forensics Session 3: Digital Forensics

Rapid Triage of Diverse Media Devices

Andrew Merlino*, Pixel Forensics; Jared Berg, Pixel Forensics; Bahram Dahi, Pixel Forensics

To Change or Not to Change: That is the Question

F. Chevonne Dancer*, Jackson State University; Gordon Skelton, Jackson State University

Applying a Digital Forensic Readiness Framework: Three Case Studies

Antonis Mouhtaropoulos*, University of Warwick

Business Track Session 3

Leveraging Private Sector Funding for the Commercialization of Federally Funded Research

Technology innovation in the U.S. is facing internal challenges from disruptions in government funding, as well as rapid growth from international emerging markets. There are opportunities to leverage private sector funding to commercialize federally funded intellectual property held within Universities, FFRDCs, prime contractors and small businesses. This panel features distinguished speakers collaborating with Corporate R&D, Private Equity, Venture Capitalists, and other non-government funding sources to accelerate the commercialization of federally funded research.


Dan Espinal, Allied Minds Federal Innovations, US Private Equity Corporation
Karen Krause (KK) Bencal, CEO, K2C Associates LLC
Michael Pozmantier, DHS Homeland Security Advanced Research Agency (invited)

1:00 PM
3:00 PM
Cyber Security Session 4:

Risk Assessment

A Model of Certifier and Accreditor Risk Calculation for Multi-Level Systems

Joe Loughry*, Oxford University

A Dynamic Capability Maturity Model for Improving Cyber Security

Richard Adler*, DecisionPath, Inc.

The CERT Assessment Tool: Increasing a Security Incident Responder's Ability to Assess Risk

Anne Connell*, CMU SEI; Barbora Batokova, CMU SEI

Collaborative Response

Cerebro: A Platform for Collaborative Incident Response and Investigation

Anne Connell*, CMU SEI; Tim Palko, CMU SEI

Attack and Disaster Preparation, Recovery and Response Session 4:

Crisis Management and Social Media: Assuring Effective Information Governance for Long Term Social Sustainability

Deborah Bunker*, University of Sydney Business ; Christian Ehnis, University of Sydney Business School; Philip Seltsikas, University of Sydney Business School

A Survivable Social Network

Robert Iannucci*, Carnegie Mellon University; Jonida Cali, Carnegie Mellon University; Ryan Caney, Carnegie Mellon University; Stuart Kennedy, Carnegie Mellon University

Emergency Alerts to People on the Go via Terrestrial Broadcasting - The M-EAS System

Wayne Luplow*, Zenith Electronics LLC; Jim Kutazner, PBS

A Community Sensing Framework for Threat Detection in Metropolitan Area

Lijun Qian*, Prairie View A&M University; John Fuller, PVAMU; Cheslan Simpson, Los Alamos National Laboratory

Land and Maritime Border Security Session 4: Imaging & Video

Transform Domain Measure of Enhancement – TDME – for Security Imaging Applications

Arash Samani*, Tufts University; Karen Panetta, Tufts University; Sos Agaian, University of Texas at San Antonio

Dynamic Video Content Exploration

Nick Gallo*, MIT Lincoln Lab; Jason Thornton, MIT Lincoln Lab

Joint Ship Classification and Learning

Katia Estabridis*, NAWCWD

Camera Field Coverage Estimation through Common Event Sensing

Leonid Naimark*, BAE Systems; Nathan Shnidman, BAE Systems

Biometrics & Forensics Session 4: Forensics

Challenges of Small-Scale Safety and Thermal Testing of Improvised Explosives: Results from the Integrated Data Collection Analysis Program (IDCA) Proficiency Test

Jose Reyes, ARA Tyndall AFB; Mary Sandstrom, LANL; Geoffrey Brown, LANL; Kirstin Warner, kirstin.warner@navy.mil; Jason Phillips, SNL NM; Timothy Shelley, ATF Huntsville; Peter Hsu, LLNL; John Reynolds*, Lawrence Livermore Lab

Automated Pollen Identification System for Forensic Geolocation Applications

Grace Hwang*, The MI

Assessing Performance and Tradeoffs of Bioforensic Signature Analysis

Daniel Watkins, PNNL; Aimee Holmes, PNNL; Landon Sego*, Pacific Northwest National Lab; Bobbie-Jo Webb-Robertson, PNNL; Amanda White, PNNL; David Wunschel, PNNL; Helen Kreuzer, PNNL; Courtney Corley, PNNL; Mark Tardiff, PNNL

Using Dynamic Risk Estimation & Social Network Analysis to Detect Money Laundering Evolution

Murad Mehmet*, George Mason University; Duminda Wijesekera, George Mason University

Business Track Session 4

Legal Dos and Don’ts – Protecting Your Legal Position for Business Development

From Intellectual Property claims to compliance with Export Control regulations, this panel of distinguished attorneys will go over all the legal implications you need to consider to develop and commercialize your technology here and abroad.


Jesse Erlich, partner, Burns & Levinson, LLP
Kerry Scarlott, Director, Goulston & Storrs

3:30 PM
5:00 PM
Cyber Security Session 5: Network Security

Meeting Lawful Interception Requirements for Selected IP Traffic Offload and Local IP Access Traffic

John Cartmell*, InterDigital

Replay of Malicious Traffic in Network Testbeds

Alefiya Hussain*, USC/ISI; John Heidemann, USC/ISI

Characterizing Vulnerability to IP Hijack Attempts

Joseph Gersch*, Secure64 Software Corporation; Christos Papadopoulos, Colorado State University; Dan Massey, Colorado State University

Attack and Disaster Preparation, Recovery, and Response Session 5: (Poster / Short Presentations)

Analyzing Terror Attacks using Latent Semantic Indexing

Ibrahim Toure*, UMBC; Aryya Gangopadhyay, UMBC

Using Transaction-Level Simulation to Prepare for and Recover from Supply-Chain Disasters

Warren Axelrod*, Delta Risk LLC

Improved Strategic Decision Making During Disasters Using a Dual Mode Risk Based Three Dimensional Triage Process

John Cogliandro*, Raytheon IDS

A Roadmap for the Adoption of Unmanned Systems into Public Safety

Robin Murphy*, Texas A&M

Developing in Android for Public Safety

Peter Erickson, MIT Lincoln Laboratory; Matt Samperi, Pennsylvania State University; Andrew Weinert*, MIT Lincoln Laboratory; Jason Huff, Pennsylvania State University; Carlos Parra, Pennsylvania State University; Scarlett Miller, Pennsylvania State University

Field Study Identifying Barriers and Delays in Data-to-Decision with Small Unmanned Aerial Systems

Robin Murphy*, Texas A&M; Brittany Duncan, Texas A&M

Land and Maritime Border Security Session 5: Port & Maritime II

Maritime Detection of Radiological/Nuclear Threats with Hybrid Imaging System

Anthony Hutcheson*, U.S. Naval Research Laboratory; Bernard Phlips, U.S. Naval Research Laboratory; Eric Wulf, U.S. Naval Research Laboratory; Lee Mitchell, U.S. Naval Research Laboratory; W Johnson, U.S. Naval Research Laboratory

BIOSwimmer: Biologically-Inspired Underwater Vehicle for Harbor Defense, Surveillance, and Inspection

Richard Lusignea, Boston Engineering Corporation; Michael Rufo*, Boston Engineering Corporation; Andrew Keefe, Boston Engineering Corporation

Maritime High Resolution Radar Automated Target Recognition Algorithms for Homeland Security

Patrick Cross*, Raytheon

Effective Threat Detection for Surveillance

Judith Gelernter, Carnegie Mellon University, USA

Biometrics & Forensics Session 5: Writing & Text

User Generic Model for Writer Verification Using Multiband Image Scanner

Manabu OKAWA*, Metropolitan Police Department; Kenichi YOSHIDA

RedEye Text Analysis Workbench: Actionable intelligence from non-actionable data

Amber McKenzie*, Oak Ridge National Laboratory; Rob Gillen, ORNL; Paul Bogen, ORNL

Multi-Lingual Author Identification and Linguistic Feature Extraction – a Machine Learning Approach

Aman Kumar*, BCL Technologies; Hassan Alam, BCL Technologies

Business Track Session 5

Top Three Reasons Your Technology Will Fail

Join us to learn the three major reasons why technology companies with innovative, creative and necessary technologies -- FAIL. Understanding these critical points and learning to mitigate and guard against them will inform your strategy for success and assure you do not fall into one of these known pitfalls. Seasoned experts from government and the private sector will share tangible strategies for your company.


Paul Benda, Partner and Chief Technology Officer at GSIS, former Director Homeland Security Advanced Research Agency, Science & Technology Directorate, DHS;
Bill Carroll, CEO, StrikeForce Consulting;
Lisa Sobolewski, DHS SBIR Program Director, Science and Technology Directorate



Thursday November 14, 2013
10:30 AM
Cyber Security Session 6: Secure & Resilient Clouds

An Architecture for a Resilient Cloud Computing Infrastructure

Joshua Baron, HRL Laboratories, LLC; Karim El Defrawy, HRL Laboratories, LLC; Aleksey Nogin, HRL Laboratories, LLC; Rafail Ostrovsky, UCLA

Diversity in Cloud Systems through Runtime and Compile-Time Relocation

Morgon Kanter*, Dartmouth College; Stephen Taylor, Dartmouth College

Accountable Clouds

Ashish Gehani, SRI; Gabriela Ciocarlie*, SRI International; Natarajan Shankar, SRI International

Attack and Disaster Preparation, Recovery, and Response Session 6:

Simulation of Emergency Response Operations for a Static Chemical Spill within a Building using an Opportunistic Resource Utilization Network

Leszek Lilien*, Western Michigan University; Mohammed Elbes, Alzaytoonah University of Jordan; Lotfi Ben Othmane, Eindhoven University of Technology; Raed Salih, Western Michigan University

Developing a GIS based Plume Rose for Industrial Chemical Incident Preparedness and Response

Abhik Das*, CSTEP ; Subhrajit Debnath, CSTEP; Jai Asundi, CSTEP, Bangalore, India

Protecting Communities from Chemical Warfare Agents

Barbara Cochran*, IEM; Madhu Beriwal, IEM

Land and Maritime Border Security Session 6: Rad Nuke I

The Muon Portal Project: A Dedicated Muon Detector for the Inspection of Shipping Containers

Simone Riggi*, INAF Catania, Italy

Selective Activation with All-Laser-Driven Thomson γ-rays

Jack Silano*, UNC Chapel Hill

The MAC-TMFD: Novel Multi-Armed Centrifugally Tensioned Metastable Fluid Detector (Gamma-Blind) – Neutron-Alpha Recoil Spectrometer

Nicholas Hume, Purdue University; Jeff Webster, Purdue University; Thomas Grimes, Purdue University; Brian Archambault, Sagamore Adams Laboratories, LLC; Alexander Hagen, Purdue University; Rusi Taleyarkhan*, Purdue University

Biometrics & Forensic Session 6: Voice

A New Mobile Biometric Modality Based Upon Usage Context

Devasis Bassu, Applied Communication Sciences; Munir Cochinwala, Applied Communication Sciences; Ashish Jain*, Applied Communication Sciences

Recent Developments in Voice Biometrics: Robustness and High Accuracy

Nicolas Scheffer*, SRI International; Aaron Lawson, SRI International; Mitchell McLaren, SRI International

With Vaulted Voice Verification My Voice Is My Key

Raoul Johnson*, University of CO, CO Springs; Terrance Boult, University of Colorado at Colorado Springs

Business Track Session 6

Understanding Acquisition at DHS in the Current Fiscal Climate

Hear from the Department of Homeland Security’s former Executive Director of the Office of Program Accountability and Risk Management on important trends to consider while pursuing technology development and deployment opportunities at DHS. Having led the maturation of the Department’s acquisition risk management process, Dr. Sims has keen insight into the DHS acquisition strategy, its priorities and plans.


Cedric Sims, Partner, Evermay Consulting Group

1:00 PM
3:00 PM
Cyber Security Session 7:

Secure Hardware

An Architecture Methodology for Secure Video Conferencing

Reshma Lal*, Intel; pradeep Pappachan, Intel Corporation

Analysis of Data-Leak Hardware Trojans in AES Cryptographic Circuits

Trey Reece*, Vanderbilt University; William Robinson, Vanderbilt University


A Network-based Approach to Counterfeit Detection

Supreeth Sathyanarayana*, Georgia Institute of Technology; William Robinson, Vanderbilt University; Raheem Beyah, Georgia Institute of Technology

Anti-counterfeit Integrated Circuits Using Fuse and Tamper-Resistant Time-stamp Circuitry

Avinash Desai*, Virginia Tech; Dinesh Ganta, Virginia Tech; Michael Hsiao, Virginia Tech; Leyla Nazhandali, Virginia Tech; Chao Wang, Virginia Tech; Simin Hall, Virginia Tech

Attack and Disaster Preparation, Recovery, and Response Session 7:

Optimization of Emergency Response

Christie Nelson*, Rutgers; William Pottenger, Rutgers

Optimizing Hauling Vehicle Mix for Debris Removal: A Queueing Theory Approach

James Brooks*, Rensselaer Polytechnic Inst.; David Mendonca, Rensselaer Polytechnic Institute

Decision Making to Support Local Emergency Preparation, Response, and Recovery

Jennifer Schneider*, RIT; Carol Romanowski, RIT; Kent Stein, RIT Graduate Student

Dynamic Allocation of Entities in Closed Queueing Networks: An Application to Debris Removal

James Brooks*, Rensselaer Polytechnic Inst.; Koushik Kar, Rensselaer Polytechnic Institute; David Mendonca, Rensselaer Polytechnic Institute

Land and Maritime Border Security Session 7: Cargo & Personnel

Material Characterization Using A Millimeter Wave Portal-Based Imaging System for Security Screening

Yuri Alvarez Lopez*, Universidad de Oviedo; Borja Gonzalez Valdez, Northeastern University; Jose Angel Martinez Lorenzo, Northeastern University; Fernando Las-Heras Andres, Universidad de Oviedo; Carey Rappaport, Northeastern University

Automated Object Recognition and Visualization Techniques for Muon Tomography Data Analysis

Marilena Bandieramonte*, UniCt - INAF, OACT; Vincenzo Antonuccio Delogu, INAF – Catania Astrophysical Observatory; Ugo Becciani, INAF – Catania Astrophysical Observatory; Alessandro Costa, INAF – Catania Astrophysical Observatory; Paola La Rocca, Dept. of Physics and Astronomy - University of Catania - Italy.; Piero Massimino, INAF – Catania Astrophysical Observatory; Cati Petta, Dept. of Physics and Astronomy - University of Catania - Italy.; Costantino Pistagna, INAF – Catania Astrophysical Observatory; Francesco Riggi, Dept. of Physics and Astronomy - University of Catania - Italy.; Simone Riggi, INAF – Catania Astrophysical Observatory; Eva Sciacca, INAF – Catania Astrophysical Observatory; Fabio Vitello, INAF – Catania Astrophysical Observatory

Nuisance Alarm Reduction with PVT

Geraint Dermody*, Symetyrica; Matthew Dallimore, Symetrica Inc.; Kevin Brenker, Symetrica Inc.

Automated Detection of Anomalous Shipping Manifests to Identify Illicit Trade

Antonio Sanfilippo*, Pacific Northwest National Lab; Satish Chikkagoudar, Pacific Northwest National Laboratory

Biometrics & Forensics Session 7: Face & Gait

A Framework of Configurable Multi-Engine Systems Based on Performance Matrices for Face Recognition

Hongmei HE*, University of Kent; Richard Guest, University of Kent

Analysis of the Effects of Image Transformation, Template Selection, and Partial Information on Face Recognition with Time-Varying Expressions For Homeland Security Applications

Dalila Megherbi*, University of Massachusetts, L; Iliana Voynichka, CMINDS, ECE, University of Massachusetts, Lowell

Silhouette Based Gait Recognition Based on the Area Features using Both Model Free and Model Based Approaches

Shantaram Vasikarla*, California State University; Arihant Kochhar, N. S. Institute of Technology New Delhi, India; Divyesh Gupta , N. S. Institute of Technology New Delhi, India; Hanmandlu Madasu, Indian Institute of Technology New Delhi, India

3D Face Reconstruction and Multimodal Person Identification from Video Captured Using a Smartphone Camera

R Raghavendra*, Norwegian Biometrics Lab; BB Kiran, Norwegian Biometric Laboratory; Anika Pflug, Norwegian Biometric Laboratory; Bian Yang, Norwegian Biometric Laboratory; Christoph Busch, Norwegian Biometric Laboratory

3:30 PM
5:30 PM

Cyber Security Session 8:

Trusted Identity

Tools for Understanding Identity in Cyberspace

Sadie Creese*, University of Oxford; Thomas Gibson-Robinson, University of Oxford; Michael  Goldsmith, University of Oxford; Duncan Hodges, University of Oxford; Oriana Love, PNNL; William Pike, PNNL

Transitioning Linked Data Accountable Systems to the Real-World with Identity, Credential, and Access Management (ICAM) Architectures

K Waterman*, MIT; Lalana Kagal, MIT; Ian Jacobi, MIT; Daniela Miao, MIT

Secure & Resilient Cyber Systems

SAFE - A Clean Slate Secure Computing Platform

Gregory Sullivan*, BAE Systems; Howard Reubenstein, BAE Systems; Andre DeHon, University of Pennsylvania; Benjamin Pierce, University of Pennsylvania; Jonathan Smith, University of Pennsylvania; Gregory Morrisett, Harvard University; Olin Shivers, Northeastern University; Udit Dhawan, University of Pennsylvania; Albert Kwon, University of Pennsylvania; Ben Karel, University of Pennsylvania

Towards A Theory of Autonomous Reconstitution of Compromised Cyber-Systems

Pradeep Ramuhalli*, Pacific Northwest National Lab; Mahantesh Halappanavar, PNNL; Jamie Coble, PNNL; Mukul Dixit, PNNL

Attack and Disaster Preparation, Recovery, and Response Session 8:

Priority Capabilities in LTE Supporting National Security and Emergency Preparedness Next Generation Network Priority Services

Carol-Lyn Taylor, DHS/OEC; David Nolan, DHS/OEC; Stan Wainberg*, Applied Communication Sciences; Arye Ephrath, Mythology, Inc.

Prototyping A Disadvantage Communication Capability: Airborne Remote Communication (ARC) platform

Andrew Weinert*, MIT Lincoln Laboratory; Timothy Hackett, Pennsylvania State University; Matt Samperi, Pennsylvania State University; Peter Erickson, MIT Lincoln Laboratory; Jason Huff, Pennsylvania State University; Carlos Parra, Pennsylvania State University; Erich Stoekl, Pennsylvania State University; Peter Zundritsch, Pennsylvania State University; Ryan Morris, Pennsylvania State University; Ivan Iakimenko, Pennsylvania State University; Erik Petschauer, Pennsylvania State University; Sven Bilen, Pennsylvania State University

The Status and Importance of Robustness in the Process of Critical Infrastructure Resilience Evaluation

Martin Hromada*, 26738; Ludek Lukas, Tomas Bata University in Zlin

Autonomous and Fault Tolerant Vehicular Self Deployment Mechanisms in MANETs

Stephen Gundry*, ; Jianmin Zou, City College Of New York; Cem Sahin, ; Janusz Kusyck, US Patent and Copyright Office; M. Umit Uyar, CUNY: City College of New York

Land and Maritime Border Security Session 8: Rad Nuke II

Muons Scanner to Detect Radioactive Source Hidden in Scrap Metal Containers

Germano Bonomi*, University of Brescia; Sara Vanini, University of Padova

Combined, Solid-State Molecular Property and Gamma Spectrometers for CBRN&E Detection

Lee Deal*, Nevada Nanotech Systems, Inc.; Ralph Whitten, Nevada Nanotech Systems, Inc.; Ben Rogers, Nevada Nonotech Systems

Integration of Inertial Measurement Data for Improved Localization & Tracking of Radiation Sources

Daniel Cooper*, Passport Systems, Inc.; Robert Ledoux, Passort Systems, Inc.; Krzysztof Kamieniecki, Passport Systems, Inc.; Stephen Korbly, Passport Systems, Inc.; Jeffrey Thompson, Passport Systems, Inc.; James Batcheler, Passport Systems, Inc.; James Costales, Passport Systems, Inc.

Utilization of Advanced Clutter Suppression Algorithms for Improved Spectroscopic Portal Capability Against Radionuclide Threats

Bogdan Cosofret*, Physical Sciences Inc.; Kirill Shokhirev, Physical Sciences Inc.; Phillip Mulhall, Physical Sciences Inc.; David Payne, Raytheon Integrated Defense Systems; Bernard Harris, Raytheon Integrated Defense Systems; Richard Moro, Raytheon

Biometrics & Forensics Session 8: Eye

An Assessment of the Human Performance of Iris Identification

Richard Guest*, University of Kent; Sarah Stevenage, University of Southampton; Hongmei HE, University of Kent; Greg Neil, University of Southampton

The Effects of Ethnicity, Gender and Eye Color on Iris Template Generation and Match Probability

John Howard*, Southern Methodist University; Delores Etter, Southern Methodist University; John Howard, Southern Methodist University

Workload Characteristics for Iris Matching Algorithm: A Case Study

Fang Hua*, Clarkson University; Gildo Torres, Clarkson University; Jed Chang, Chen Liu, Stephanie Schuckers

Application of Pyramidal Directional Filters for Biometric Identification using Conjunctival Vasculature Patterns

Sriram Pavan Tankasala*, UMKC; Plamen Doynov, UMKC; REZA Derakhshani, University of Missouri Kansas City