25 - 26 April 2017 Waltham, MA USA
Gold sponsor: Co-sponsor:
2017 IEEE International Symposium on Technologies for Homeland Security

Technical Program

Arpil 25, 2017

7:00 AM

Continental Breakfast

8:00 - 9:30 AM Cyber Security 1: Cyber-Physical Systems Adapting an Agent-Based Model of Socio-Technical Systems to Analyze Security Failures Christine Cunningham, MIT LL; Antonio Roque*, MIT LL Analytics for Smart Grid Cybersecurity and Risk Management Nazli Choucri*, Massachusetts Institute of Technology; Gaurav Agarwal, Massachusetts Institute of Technology Efficient and Robust Quantum-Resistant HIMMO Security Architecture Oscar Garcia*, Philips Research; Sauvik Bhattacharya, Philips Research; Ludo Tolhuizen, Philips Research; Ronald Rietman, Philips Research Attack/Disaster 1: Critical Infrastructure Seismic Barrier Protection of Critical Infrastructure Rob Haupt*, MIT Lincoln Laboratory Detection, Mitigation, Recovery of GPS based Assured Timing Critical Infrastructure when under attack by Spoofing or Jamming. Patrick Diamiond*, Diamond Consulting Oil and Gas Pipeline Recovery from Disruption Using Multi-objective Optimization Fei He*, Texas A&M University-Kingsville Land & Maritime Border 1: Airborne Sensing Residue Analysis for Area Based Similarity Measure in Registration of Remotely Sensed Aerial Imagery for Homeland- Security Wide Areas Surveillance Imran Vakil, AFRL; Dalila Megherbi*, CMINDS center /ECE,  UMASS Lowell Tracker Fusion for Robust Object Tracking and Confidence Reporting in Wide Area Motion Imagery Theus Aspiras*, University of Dayton; Vijayan Asari, University of Dayton; Terry Stanard, AFRL Foliage Penetrating Ladar for Border Surveillance John Aldridge*, Lily Lee, Marius Albota, Brittany Baker, Rajan Gurjar, Brendan Edwards, Daniel Dumanis, MIT Lincoln Laboratory Biometrics & Forensics 1: Facial Recognition Study of Facial Recognition in Visible and Near Infrared Spectrums Joey Pomperada*, US Navy SPAWAR Eyeglasses Detection based on Learning and Non-learning based Classification Schemes Ahmad Mohammad*, UMKC; Ajita Rattani, University of Missouri - Kansas City; Prof. Derakhshani, University of Missouri-Kansas City A Study On Matching Visible to Passive Infrared Face Images using Image Synthesis  Restoration Nnamdi Osia*, West Virginia University 9:30 - 10:00

Break

10:00 - 11:30 Cyber Security 2:  Authentication Incorporating Health Monitoring and Duress Detection into Mobile Device Authentication Susan Gottschlich*, Raytheon Security Analysis of Two-Factor Authentication Matthew Crossman, Univ of Massachusetts Dartmouth; Hong Liu*, Univ of Massachusetts Dartmouth; Liudong Xing, Univ of Massachusetts Dartmouth; Timothy Shea, Univ of Massachusetts Dartmouth A Secure, Self-recovery, and High Capacity Blind Image Information Hiding, Authentication and Tampering Localization Scheme Using DCT Othmane Habouli, CMINDS/ECE UMASS Lowell; Dalila Megherbi*, CMINDS center /ECE,  UMASS Lowell Attack/Disaster 2: Cyber Risk Management and Intelligence Analysis TRAX: Social Media Data Analysis for Cyber Risk Management Anne Connell*, CERT A Survey of Fault and Attack Tree Modeling and Analysis for Cyber Risk Management Vidhyashree Nagaraju*, Universiy of Massachusetts Dartmouth; Lance Fiondella, University of Massachusetts Dartmouth; Thierry Wandji, Naval Air Systems Command Securing Wireless Communications of Connected Vehicles with Artificial Intelligence Prinkle Sharma, University of Massachusetts Dartmouth; Hong Liu*, Univ of Massachusetts Dartmouth; Honggang Wang, Univ of Massachusetts Dartmouth; Shelley Zhang, Univ of Massachusetts Dartmouth Land & Maritime Border 2: Enhancing Data Exploitation TraSeer: A Visual Analytics Tool for Vessel Movements in the Coastal Areas Guizhen Wang*, Purdue University; Abish Malik, Purdue University; Calvin Yau, Purdue University; David Ebert, Purdue University Automated scheduling of radar-cued camera system for optimizing visual inspection and detection of radar targets Deepak Khosla*, HRL Laboratories, LLC Layered Sensing Exploration and Exploitation in Virtual Contested Environment Amir Shirkhodaie*, Tennessee State University Biometrics & Forensics 2:  Finger and Palm Prints 3-D Palmprint Modeling for Biometric Verification Srijith Rajeev*, Tufts University; Shreyas Kamath Kalasa Mohandas, Tufts University; Karen Panetta, Tufts University; Sos Agaian, USA Fingerprint Authentication Using Geometric Features Shreyas Kamath Kalasa Mohandas*, Tufts University; Srijith Rajeev, Tufts University; Karen Panetta, Tufts University; Sos Agaian, USA Perspectives and Limitations of Touchless Fingerprints Anup Pillai*, IBM Research Almaden; Sam Mil'shtein, UMass Lowell 11:30 - 11:40

Break

11:40 - 12:30

Plenary Session

 Kay C. Goss, CEM  President, World Disaster Management, LLC 12:30 - 1:15

Lunch

1:20 - 2:50 Cyber Security 3: Intrusion Detection Automating Network Node Behavior Characterization by Mining Communication Patterns Thomas Carroll*, Pacific Northwest National Laboratory; Satish Chikkagoudar, Pacific Northwest National Laboratory; Kristine Arthur-Durett, Pacific Northwest National Laboratory Network Attribute Selection, Classification and Accuracy (NASCA) Algorithm for Intrusion Detection Systems Zheni Stefanova*, University of South Florida; Kandethody Ramachandran, University of South Florida Open Set Intrusion Recognition for Fine-Grained Attack Categorization Cora Coleman, New College Florida; Steve Cruz, University of Colorado at Colorado Springs; Ethan Rudd*, University of Colorado at Colorado Springs; Terrance Boult, University of Colorado Colorado Springs Attack/Disaster 3: Resilience Building forward:  strategic community resilience Jennifer Schneider*, RIT; Carol Romanowski,  Rochester Institute of Technology; Sumita Mishra, Rochester Institute of Technology; Rajendra Raj, Rochester Institute of Technology Development of a process improvement matrix to measure community level sustainability and resilience: a collaborative case study of Rochester, NY, USA Sarah Dobie*, Rochester Institute of Technology; Jennifer Schneider, RIT Spatial Indoor-Outdoor Emergency Incident Viewer for Crisis Mapping Nishith Maheshwari, National Institute of Standards and Technology; Judith Gelernter*, National Institute of Standards and Technology Land & Maritime Border 3: Enhancing Data Exploitation 2 MetricsVis: A Visual Analytics Framework for Performance Evaluation of Law Enforcement Officers Jieqiong Zhao*, Purdue University; Abish Malik, Purdue University; Hanye Xu, Purdue University; Guizhen Wang, Purdue University; Jiawei Zhang, Purdue University; David Ebert, Purdue University Omnidirectional Camera Image Analysis for Law-Enforcement and Border Control Applications Vijayan Asari*, University of Dayton; Pramud Rawat, Data Analysis and Simulation Services No-Reference Quality Metrics for Satellite Weather Images and Sky Images Arash Samani*, Tufts University; Karen Panetta, Tufts University; Sos Agaian, USA Biometrics & Forensics 3: Video Analytics Distance Aggregation based Score Fusion for Improving Person Re-identification Arko Barman*, University of Houston; Shishir Shah, University of Houston A Video Forensic Technique for Detecting Frame Integrity Using Human Visual System-inspired measures Qianwen Wan*, Tufts University; Karen Panetta, Tufts University; Sos Agaian, USA Autofocus for SWIR Facial Imagery Utilizing Haar Wavelets Seth Leffel*, West Virginia University 2:50 - 3:20

Break

3:20 - 5:20 Cyber Security 4: Approaches in Cybersecurity Modeling Subsidizing Cybersecurity Information Sharing: A Game between A Government and N Companies Ali Pala*, University at Buffalo; Jun Zhuang, University at Buffalo Agent-Centric Approach for Cybersecurity Decision-Support with Partial Observability Ramakrishna Tipireddy, Pacific Northwest National Laboratory; Samrat Chatterjee*, Pacific Northwest National Laboratory; Patrick Paulson, Pacific Northwest National Laboratory; Matthew Oster, Pacific Northwest National Laboratory; Mahantesh Halappanavar, Modeling Insider Threat Types in Cyber Organizations Eunice Santos, Illinois Institute of Technology; Eugene Santos Jr., Dartmouth College; John Korah*, Illinois Institute of Technology; Jeremy Thompson, Dartmouth College; Vairavan Murugappan, Illinois Institute of Technology; Suresh Subramanian, Illinois I Cognitive Modeling of Polymorphic Malwares Using Fractal Based Semantic Characterization Muhammad Salman Khan*, University of Manitoba; Sana Siddiqui, University of Manitoba; Ken Ferens, University of Manitoba Attack/Disaster 4: Disaster Preparedness and Response Evaluation of Cornerstone Autism Center for Active Shooter Incidents Patrick Glass*, Purdue Homeland Security Institute Unified Human and Robot Command for Disaster Recovery Situations Carlos Ibarra Lopez*, University of Massachusetts Lowell; James Kuczynski, University of Massachusetts Lowell; Holly Yanco, University of Massachusetts Lowell Broadcasting Emergency Information to Non-English Speakers Jon Peha*, Carnegie Mellon University; Mike Yu, Carnegie Mellon University LocATER: Localization and Accountability Technologies for Emergency Responders Velin Dimitrov*, Northeastern University; Jose Vazquez, New Stone Soup VT; Taskin Padir, Northeastern University Land & Maritime Border 4: Ground-based Hardware for Border and Customs Enforcement Passive Acoustic Methods of Small Boat Detection, Tracking, and Classification Alexander Pollara*, Stevens Institute of Technology MSC; Alexander Sutin, Stevens Institute of Technology MSC; Hady Salloum, Stevens Institute of Technology MSC Fiber optics interferometer for general-purpose detection of acoustic signals Jefferson Odhner*, Odhner Holographics Remote Power Systems for Sensors on the Northern Border Lin Simpson, National Renewable Energy Laboratory; Lin Simpson*, National Renewable Energy Laboratory; Alicen Kandt, National Renewable Energy Laboratory Assessing the Risk Factors of Intermodal Traffic On Railroad Transport Gary Gordon*, University of Massachusetts Lowell; Ricahrd Young, The Pennsylvania State University Biometrics & Forensics 4: Ocular Biometrics and Other Modes Gender Prediction using Mobile Ocular Biometrics: A Feasibility Study Sai Narsi Reddy Donthi Reddy*, University of Missouri - Kansas City; Ajita Rattani, University of Missouri - Kansas City; Prof. Derakhshani, University of Missouri-Kansas City Online Co-training in Mobile Ocular Biometric Recognition Ajita Rattani*, University of Missouri - Kansas City; Prof. Derakhshani, University of Missouri-Kansas City Noise Assessment Framework for Optimizing ECG Key Generation Nima Karimian*, University of Connecticut; Fatemeh Tehranipoor, University of Connecticut; Zimu Guo, University of Florida; Mark Tehranipoor, University of Florida; Domenic Forte, University of Florida Continuous Authentication of a Mobile Device using Neuromorphic and Early Warning Behavior-Based Authentication in Common Theft Scenarios Stephan Salas, HRL Laboratories, LLC; Shane Roach*, HRL Laboratories, LLC; Matthew E. Phillips, HRL Laboratories, LLC; Nigel Stepp, HRL Laboratories, LLC; Jose Cruz-Albrecht, HRL Laboratories, LLC; Vincent De Sapio, HRL Laboratories, LLC; Tsai-Ching Lu, HRL Laboratories, LLC 6:00

Welcome Reception, Exhibits and Poster Session Presentations

Cyber Security Posters Modeling Threats: Insider Attacks on Critical Infrastructure Assets Rajendra Raj*, Rochester Institute of Technology; Sumita Mishra, Rochester Institute of Technology; Carol Romanowski,  Rochester Institute of Technology; Jennifer Schneider, RIT; Suhair Alshehri, King Abdulaziz University Security Improvement of USB Technology Daniel Noyes, Univ of Massachusetts Dartmouth; Hong Liu*, Univ of Massachusetts Dartmouth; Paul Fortier, Univ of Massachusetts Dartmouth; Haiping Xu, Univ of Massachusetts Dartmouth Open Source Android Vulnerability Detection Tools: A Survey Keyur Kulkarni, The University of Toledo; Ahmad Javaid*, The University of Toledo Cybersecurity via FOTA-Monitored ‘Thing’ Behavior Achutha Raman*, 4PrivacyMatters Functional Dependency Approach towards Cyber Resilience in Enterprise Systems C. Ariel Pinto*, Old Dominion University; Paul Garvey, The MITRE Corp.; Joost Santos, George Washington University The Metric at the End of the Rainbow George Markowsky*, University of Maine; Linda Markowsky, University of Maine Attack/Disaster Posters Investigation techniques in ground water Prof. Dr. Ashraf  Saleh*, BRNO University of Technology Paper Title TBD John Sinisi*, Sinisi Solutions LLC Integrated Platform for Critical Infrastructure Analysis and Common Operational Picture Solutions Samir Puuska*, National Defence University MindCollect: An Information Needs Management System for Coalition Situational Awareness, Sensemaking, Decision Making, and Mission Integration David Kamien*, Mind-Alliance Systems Network Science Based framework for Joint Restoration of Interdependent Infrastructure Systems Demonstrated on Boston’s Mass Transit and Power Distribution System Udit Bhatia*, Northeastern University, Boston. MA; Auroop R. Ganguly, Northeastern University, Boston, MA Boston Community Energy Study – Zonal Analysis for Urban Microgrids Eric Morgan*, MIT LL; Stephen Valentine, MIT LL; Cheryl Blomberg, MIT LL; Erik Limpaecher, MIT LL Human Collaboration in Technology Innovation Robert Desourdis*, SAIC; Ted Manakas, SAIC Disaster Preparedness: Subway Evacuation Training System for People with Disabilities using Annotated Video Hao Dong*, Univ. of Massachusetts Amherst; Juechen Yin, Univ. of massachusetts Amherst; Aura Ganz, UMass Amherst Large-Scale Big Data Networks Analytics and Community Detection Annie Xie , North Carolina School of Science and Mathematics, Now Princeton University, New Jersey, United States; Andrew Harvey, The STEM Early College,  North Carolina A&T State University, Greensboro, NC, USA; Pravin Chopade*, North Carolina A&T State Land and Maritime Border Posters Detection and Tracking of Smuggler Vessels Using a Heterogeneous Network of Autonomous Vessels and Buoys Andrew Punnoose*, Punnoose Engineering Fast Color Transfer for Camouflage Applications Long Bao*, Tufts University; Karen Panetta, Tufts University; Sos Agaian, USA Walk-Through Metal Detectors and Stadium Contraband Omoikhefe Eboreime, Texas Southern University; Christie Nelson*, Rutgers University; Dexter Harris, Morgan State University Biometrics & Forensics Posters Securing Mobile Single Sign-on with Adaptive Authentication Dipto Chakravarty*, CA Technologies
25 - 26 April 2017 Waltham, MA USA
Gold sponsor: Co-sponsor:
2017 IEEE International Symposium on Technologies for Homeland Security

Technical Program

Arpil 25, 2017

7:00 AM

Continental Breakfast

8:00 - 9:30 AM Cyber Security 1: Cyber-Physical Systems Adapting an Agent-Based Model of Socio-Technical Systems to Analyze Security Failures Christine Cunningham, MIT LL; Antonio Roque*, MIT LL Analytics for Smart Grid Cybersecurity and Risk Management Nazli Choucri*, Massachusetts Institute of Technology; Gaurav Agarwal, Massachusetts Institute of Technology Efficient and Robust Quantum-Resistant HIMMO Security Architecture Oscar Garcia*, Philips Research; Sauvik Bhattacharya, Philips Research; Ludo Tolhuizen, Philips Research; Ronald Rietman, Philips Research Attack/Disaster 1: Critical Infrastructure Seismic Barrier Protection of Critical Infrastructure Rob Haupt*, MIT Lincoln Laboratory Detection, Mitigation, Recovery of GPS based Assured Timing Critical Infrastructure when under attack by Spoofing or Jamming. Patrick Diamiond*, Diamond Consulting Oil and Gas Pipeline Recovery from Disruption Using Multi- objective Optimization Fei He*, Texas A&M University-Kingsville Land & Maritime Border 1: Airborne Sensing Residue Analysis for Area Based Similarity Measure in Registration of Remotely Sensed Aerial Imagery for Homeland-Security Wide Areas Surveillance Imran Vakil, AFRL; Dalila Megherbi*, CMINDS center /ECE,  UMASS Lowell Tracker Fusion for Robust Object Tracking and Confidence Reporting in Wide Area Motion Imagery Theus Aspiras*, University of Dayton; Vijayan Asari, University of Dayton; Terry Stanard, AFRL Foliage Penetrating Ladar for Border Surveillance John Aldridge*, Lily Lee, Marius Albota, Brittany Baker, Rajan Gurjar, Brendan Edwards, Daniel Dumanis, MIT Lincoln Laboratory Biometrics & Forensics 1: Facial Recognition Study of Facial Recognition in Visible and Near Infrared Spectrums Joey Pomperada*, US Navy SPAWAR Eyeglasses Detection based on Learning and Non-learning based Classification Schemes Ahmad Mohammad*, UMKC; Ajita Rattani, University of Missouri - Kansas City; Prof. Derakhshani, University of Missouri-Kansas City A Study On Matching Visible to Passive Infrared Face Images using Image Synthesis  Restoration Nnamdi Osia*, West Virginia University 9:30 - 10:00

Break

10:00 - 11:30 Cyber Security 2:  Authentication Incorporating Health Monitoring and Duress Detection into Mobile Device Authentication Susan Gottschlich*, Raytheon Security Analysis of Two-Factor Authentication Matthew Crossman, Univ of Massachusetts Dartmouth; Hong Liu*, Univ of Massachusetts Dartmouth; Liudong Xing, Univ of Massachusetts Dartmouth; Timothy Shea, Univ of Massachusetts Dartmouth A Secure, Self-recovery, and High Capacity Blind Image Information Hiding, Authentication and Tampering Localization Scheme Using DCT Othmane Habouli, CMINDS/ECE UMASS Lowell; Dalila Megherbi*, CMINDS center /ECE,  UMASS Lowell Attack/Disaster 2: Cyber Risk Management and Intelligence Analysis TRAX: Social Media Data Analysis for Cyber Risk Management Anne Connell*, CERT A Survey of Fault and Attack Tree Modeling and Analysis for Cyber Risk Management Vidhyashree Nagaraju*, Universiy of Massachusetts Dartmouth; Lance Fiondella, University of Massachusetts Dartmouth; Thierry Wandji, Naval Air Systems Command Securing Wireless Communications of Connected Vehicles with Artificial Intelligence Prinkle Sharma, University of Massachusetts Dartmouth; Hong Liu*, Univ of Massachusetts Dartmouth; Honggang Wang, Univ of Massachusetts Dartmouth; Shelley Zhang, Univ of Massachusetts Dartmouth Land & Maritime Border 2: Enhancing Data Exploitation TraSeer: A Visual Analytics Tool for Vessel Movements in the Coastal Areas Guizhen Wang*, Purdue University; Abish Malik, Purdue University; Calvin Yau, Purdue University; David Ebert, Purdue University Automated scheduling of radar-cued camera system for optimizing visual inspection and detection of radar targets Deepak Khosla*, HRL Laboratories, LLC Layered Sensing Exploration and Exploitation in Virtual Contested Environment Amir Shirkhodaie*, Tennessee State University Biometrics & Forensics 2:  Finger and Palm Prints 3-D Palmprint Modeling for Biometric Verification Srijith Rajeev*, Tufts University; Shreyas Kamath Kalasa Mohandas, Tufts University; Karen Panetta, Tufts University; Sos Agaian, USA Fingerprint Authentication Using Geometric Features Shreyas Kamath Kalasa Mohandas*, Tufts University; Srijith Rajeev, Tufts University; Karen Panetta, Tufts University; Sos Agaian, USA Perspectives and Limitations of Touchless Fingerprints Anup Pillai*, IBM Research Almaden; Sam Mil'shtein, UMass Lowell 11:30 - 11:40

Break

11:40 - 12:30

Plenary Session

 Kay C. Goss, CEM  President, World Disaster Management, LLC 12:30 - 1:15

Lunch

1:20 - 2:50 Cyber Security 3: Intrusion Detection Automating Network Node Behavior Characterization by Mining Communication Patterns Thomas Carroll*, Pacific Northwest National Laboratory; Satish Chikkagoudar, Pacific Northwest National Laboratory; Kristine Arthur-Durett, Pacific Northwest National Laboratory Network Attribute Selection, Classification and Accuracy (NASCA) Algorithm for Intrusion Detection Systems Zheni Stefanova*, University of South Florida; Kandethody Ramachandran, University of South Florida Open Set Intrusion Recognition for Fine-Grained Attack Categorization Cora Coleman, New College Florida; Steve Cruz, University of Colorado at Colorado Springs; Ethan Rudd*, University of Colorado at Colorado Springs; Terrance Boult, University of Colorado Colorado Springs Attack/Disaster 3: Resilience Building forward:  strategic community resilience Jennifer Schneider*, RIT; Carol Romanowski,  Rochester Institute of Technology; Sumita Mishra, Rochester Institute of Technology; Rajendra Raj, Rochester Institute of Technology Development of a process improvement matrix to measure community level sustainability and resilience: a collaborative case study of Rochester, NY, USA Sarah Dobie*, Rochester Institute of Technology; Jennifer Schneider, RIT Spatial Indoor-Outdoor Emergency Incident Viewer for Crisis Mapping Nishith Maheshwari, National Institute of Standards and Technology; Judith Gelernter*, National Institute of Standards and Technology Land & Maritime Border 3: Enhancing Data Exploitation 2 MetricsVis: A Visual Analytics Framework for Performance Evaluation of Law Enforcement Officers Jieqiong Zhao*, Purdue University; Abish Malik, Purdue University; Hanye Xu, Purdue University; Guizhen Wang, Purdue University; Jiawei Zhang, Purdue University; David Ebert, Purdue University Omnidirectional Camera Image Analysis for Law- Enforcement and Border Control Applications Vijayan Asari*, University of Dayton; Pramud Rawat, Data Analysis and Simulation Services No-Reference Quality Metrics for Satellite Weather Images and Sky Images Arash Samani*, Tufts University; Karen Panetta, Tufts University; Sos Agaian, USA Biometrics & Forensics 3: Video Analytics Distance Aggregation based Score Fusion for Improving Person Re-identification Arko Barman*, University of Houston; Shishir Shah, University of Houston A Video Forensic Technique for Detecting Frame Integrity Using Human Visual System-inspired measures Qianwen Wan*, Tufts University; Karen Panetta, Tufts University; Sos Agaian, USA Autofocus for SWIR Facial Imagery Utilizing Haar Wavelets Seth Leffel*, West Virginia University 2:50 - 3:20

Break

3:20 - 5:20 Cyber Security 4: Approaches in Cybersecurity Modeling Subsidizing Cybersecurity Information Sharing: A Game between A Government and N Companies Ali Pala*, University at Buffalo; Jun Zhuang, University at Buffalo Agent-Centric Approach for Cybersecurity Decision- Support with Partial Observability Ramakrishna Tipireddy, Pacific Northwest National Laboratory; Samrat Chatterjee*, Pacific Northwest National Laboratory; Patrick Paulson, Pacific Northwest National Laboratory; Matthew Oster, Pacific Northwest National Laboratory; Mahantesh Halappanavar, Modeling Insider Threat Types in Cyber Organizations Eunice Santos, Illinois Institute of Technology; Eugene Santos Jr., Dartmouth College; John Korah*, Illinois Institute of Technology; Jeremy Thompson, Dartmouth College; Vairavan Murugappan, Illinois Institute of Technology; Suresh Subramanian, Illinois I Cognitive Modeling of Polymorphic Malwares Using Fractal Based Semantic Characterization Muhammad Salman Khan*, University of Manitoba; Sana Siddiqui, University of Manitoba; Ken Ferens, University of Manitoba Attack/Disaster 4: Disaster Preparedness and Response Evaluation of Cornerstone Autism Center for Active Shooter Incidents Patrick Glass*, Purdue Homeland Security Institute Unified Human and Robot Command for Disaster Recovery Situations Carlos Ibarra Lopez*, University of Massachusetts Lowell; James Kuczynski, University of Massachusetts Lowell; Holly Yanco, University of Massachusetts Lowell Broadcasting Emergency Information to Non-English Speakers Jon Peha*, Carnegie Mellon University; Mike Yu, Carnegie Mellon University LocATER: Localization and Accountability Technologies for Emergency Responders Velin Dimitrov*, Northeastern University; Jose Vazquez, New Stone Soup VT; Taskin Padir, Northeastern University Land & Maritime Border 4: Ground-based Hardware for Border and Customs Enforcement Passive Acoustic Methods of Small Boat Detection, Tracking, and Classification Alexander Pollara*, Stevens Institute of Technology MSC; Alexander Sutin, Stevens Institute of Technology MSC; Hady Salloum, Stevens Institute of Technology MSC Fiber optics interferometer for general-purpose detection of acoustic signals Jefferson Odhner*, Odhner Holographics Remote Power Systems for Sensors on the Northern Border Lin Simpson, National Renewable Energy Laboratory; Lin Simpson*, National Renewable Energy Laboratory; Alicen Kandt, National Renewable Energy Laboratory Assessing the Risk Factors of Intermodal Traffic On Railroad Transport Gary Gordon*, University of Massachusetts Lowell; Ricahrd Young, The Pennsylvania State University Biometrics & Forensics 4: Ocular Biometrics and Other Modes Gender Prediction using Mobile Ocular Biometrics: A Feasibility Study Sai Narsi Reddy Donthi Reddy*, University of Missouri - Kansas City; Ajita Rattani, University of Missouri - Kansas City; Prof. Derakhshani, University of Missouri-Kansas City Online Co-training in Mobile Ocular Biometric Recognition Ajita Rattani*, University of Missouri - Kansas City; Prof. Derakhshani, University of Missouri-Kansas City Noise Assessment Framework for Optimizing ECG Key Generation Nima Karimian*, University of Connecticut; Fatemeh Tehranipoor, University of Connecticut; Zimu Guo, University of Florida; Mark Tehranipoor, University of Florida; Domenic Forte, University of Florida Continuous Authentication of a Mobile Device using Neuromorphic and Early Warning Behavior-Based Authentication in Common Theft Scenarios Stephan Salas, HRL Laboratories, LLC; Shane Roach*, HRL Laboratories, LLC; Matthew E. Phillips, HRL Laboratories, LLC; Nigel Stepp, HRL Laboratories, LLC; Jose Cruz-Albrecht, HRL Laboratories, LLC; Vincent De Sapio, HRL Laboratories, LLC; Tsai-Ching Lu, HRL Laboratories, LLC 6:00

Welcome Reception, Exhibits and Poster Session

Presentations

Cyber Security Posters Modeling Threats: Insider Attacks on Critical Infrastructure Assets Rajendra Raj*, Rochester Institute of Technology; Sumita Mishra, Rochester Institute of Technology; Carol Romanowski,  Rochester Institute of Technology; Jennifer Schneider, RIT; Suhair Alshehri, King Abdulaziz University Security Improvement of USB Technology Daniel Noyes, Univ of Massachusetts Dartmouth; Hong Liu*, Univ of Massachusetts Dartmouth; Paul Fortier, Univ of Massachusetts Dartmouth; Haiping Xu, Univ of Massachusetts Dartmouth Open Source Android Vulnerability Detection Tools: A Survey Keyur Kulkarni, The University of Toledo; Ahmad Javaid*, The University of Toledo Cybersecurity via FOTA-Monitored ‘Thing’ Behavior Achutha Raman*, 4PrivacyMatters Functional Dependency Approach towards Cyber Resilience in Enterprise Systems C. Ariel Pinto*, Old Dominion University; Paul Garvey, The MITRE Corp.; Joost Santos, George Washington University The Metric at the End of the Rainbow George Markowsky*, University of Maine; Linda Markowsky, University of Maine Attack/Disaster Posters Investigation techniques in ground water Prof. Dr. Ashraf  Saleh*, BRNO University of Technology Paper Title TBD John Sinisi*, Sinisi Solutions LLC Integrated Platform for Critical Infrastructure Analysis and Common Operational Picture Solutions Samir Puuska*, National Defence University MindCollect: An Information Needs Management System for Coalition Situational Awareness, Sensemaking, Decision Making, and Mission Integration David Kamien*, Mind-Alliance Systems Network Science Based framework for Joint Restoration of Interdependent Infrastructure Systems Demonstrated on Boston’s Mass Transit and Power Distribution System Udit Bhatia*, Northeastern University, Boston. MA; Auroop R. Ganguly, Northeastern University, Boston, MA Boston Community Energy Study – Zonal Analysis for Urban Microgrids Eric Morgan*, MIT LL; Stephen Valentine, MIT LL; Cheryl Blomberg, MIT LL; Erik Limpaecher, MIT LL Human Collaboration in Technology Innovation Robert Desourdis*, SAIC; Ted Manakas, SAIC Disaster Preparedness: Subway Evacuation Training System for People with Disabilities using Annotated Video Hao Dong*, Univ. of Massachusetts Amherst; Juechen Yin, Univ. of massachusetts Amherst; Aura Ganz, UMass Amherst Large-Scale Big Data Networks Analytics and Community Detection Annie Xie , North Carolina School of Science and Mathematics, Now Princeton University, New Jersey, United States; Andrew Harvey, The STEM Early College,  North Carolina A&T State University, Greensboro, NC, USA; Pravin Chopade*, North Carolina A&T State Land and Maritime Border Posters Detection and Tracking of Smuggler Vessels Using a Heterogeneous Network of Autonomous Vessels and Buoys Andrew Punnoose*, Punnoose Engineering Fast Color Transfer for Camouflage Applications Long Bao*, Tufts University; Karen Panetta, Tufts University; Sos Agaian, USA Walk-Through Metal Detectors and Stadium Contraband Omoikhefe Eboreime, Texas Southern University; Christie Nelson*, Rutgers University; Dexter Harris, Morgan State University Biometrics & Forensics Posters Securing Mobile Single Sign-on with Adaptive Authentication Dipto Chakravarty*, CA Technologies