2 - 3 May 2018 Crystal City, VA USA
2018 IEEE International Symposium on Technologies for Homeland Security

Technical Program

April 25, 2017

7:00 AM

Continental Breakfast

8:00 - 9:30 AM Cyber Security 1: Cyber-Physical Systems Adapting an Agent-Based Model of Socio-Technical Systems to Analyze Security Failures Christine Cunningham, MIT LL; Antonio Roque*, MIT LL Analytics for Smart Grid Cybersecurity and Risk Management Nazli Choucri*, Massachusetts Institute of Technology; Gaurav Agarwal, Massachusetts Institute of Technology Towards Efficient and Robust Quantum-Resistant Security Architecture Oscar Garcia*, Philips Research; Sauvik Bhattacharya, Philips Research; Ludo Tolhuizen, Philips Research; Ronald Rietman, Philips Research Attack/Disaster 1: Critical Infrastructure Seismic Barrier Protection of Critical Infrastructure Rob Haupt*, MIT Lincoln Laboratory, Vladimir Liberman, MIT Lincoln Laboratory and Mordechai Rothschild, MIT Lincoln Laboratory Detection, Mitigation, Recovery of GPS based Assured Timing Critical Infrastructure when under attack by Spoofing or Jamming. Patrick Diamiond*, Diamond Consulting Gas Pipeline Recovery from Disruption Using Multi-Objective Optimization Fei He*, Texas A&M University-Kingsville Land & Maritime Border 1: Airborne Sensing Residue Analysis for Area Based Similarity Measure in Registration of Remotely Sensed Aerial Imagery for Homeland- Security Wide Areas Surveillance Imran Vakil, AFRL; Dalila Megherbi*, CMINDS center /ECE,  UMASS Lowell Tracker Fusion for Robust Object Tracking and Confidence Reporting in Wide Area Motion Imagery Theus Aspiras*, University of Dayton; Vijayan Asari, University of Dayton; Terry Stanard, AFRL Foliage Penetrating Ladar for Surface Situation Awareness John Aldridge*, MIT Lincoln Laboratory; Lily Lee, MIT Lincoln Laboratory; Marius Albota, MIT Lincoln Laboratory; Brittany Baker, MIT Lincoln Laboratory; Rajan Gurjar, MIT Lincoln Laboratory; Brendan Edwards, MIT Lincoln Laboratory; Daniel Dumanis, MIT Lincoln Laboratory Biometrics & Forensics 1: Facial Recognition Study of Facial Recognition in Visible and Near Infrared Spectrums Joey Pomperada*, US Navy SPAWAR Eyeglasses Detection based on Learning and Non-learning based Classification Schemes Ahmad Mohammad*, UMKC; Ajita Rattani, University of Missouri - Kansas City; Prof. Derakhshani, University of Missouri-Kansas City 9:30 - 10:00

Break

10:00 - 11:30 Cyber Security 2:  Authentication Security Analysis of Two-Factor Authentication Matthew Crossman, Univ of Massachusetts Dartmouth; Hong Liu*, Univ of Massachusetts Dartmouth; Liudong Xing, Univ of Massachusetts Dartmouth; Timothy Shea, Univ of Massachusetts Dartmouth Incorporating Health Monitoring and Duress Detection into Mobile Device Authentication Susan Gottschlich*, Raytheon A Secure, Self-recovery, and High Capacity Blind Image Information Hiding, Authentication and Tampering Localization Scheme Using DCT Othmane Habouli, CMINDS/ECE UMASS Lowell; Dalila Megherbi*, CMINDS center /ECE,  UMASS Lowell Attack/Disaster 2: Cyber Risk Management and Intelligence Analysis TRAX: Social Media Data Analysis for Cyber Risk Management Anne Connell*, CERT A Survey of Fault and Attack Tree Modeling and Analysis for Cyber Risk Management Vidhyashree Nagaraju*, Universiy of Massachusetts Dartmouth; Lance Fiondella, University of Massachusetts Dartmouth; Thierry Wandji, Naval Air Systems Command Securing Wireless Communications of Connected Vehicles with Artificial Intelligence Prinkle Sharma*, University of Massachusetts Dartmouth; Hong Liu, Univ of Massachusetts Dartmouth; Honggang Wang, Univ of Massachusetts Dartmouth; Shelley Zhang, Univ of Massachusetts Dartmouth Land & Maritime Border 2: Enhancing Data Exploitation TraSeer: A Visual Analytics Tool for Vessel Movements in the Coastal Areas Guizhen Wang, Purdue University; Abish Malik, Purdue University; Calvin Yau, Purdue University; Chittayong Surakitbanharn*, Purdue University; David Ebert, Purdue University Automated scheduling of radar-cued camera system for optimizing visual inspection and detection of radar targets Deepak Khosla*, HRL Laboratories, LLC; David Huber, HRL Laboratories, LLC; Yang Chen, HRL Laboratories, LLC Biometrics & Forensics 2:  Finger and Palm Prints 3-D Palmprint Modeling for Biometric Verification Srijith Rajeev*, Tufts University; Shreyas Kamath Kalasa Mohandas, Tufts University; Karen Panetta, Tufts University; Sos Agaian, USA Fingerprint Authentication Using Geometric Features Shreyas Kamath Kalasa Mohandas*, Tufts University; Srijith Rajeev, Tufts University; Karen Panetta, Tufts University; Sos Agaian, USA Perspectives and Limitations of Touchless Fingerprints Anup Pillai*, IBM Research Almaden; Sam Mil'shtein, UMass Lowell 11:30 - 11:40

Break

11:40 - 12:30

Plenary Session

 Kay C. Goss, CEM  President, World Disaster Management, LLC 12:30 - 1:15

Lunch

1:20 - 2:50 Cyber Security 3: Intrusion Detection Automating Network Node Behavior Characterization by Mining Communication Patterns Thomas Carroll*, Pacific Northwest National Laboratory; Satish Chikkagoudar, Pacific Northwest National Laboratory; Kristine Arthur-Durett, Pacific Northwest National Laboratory; Dennis Thomas, Pacific Northwest National Laboratory Network Attribute Selection, Classification and Accuracy (NASCA) Algorithm for Intrusion Detection Systems Zheni Stefanova*, University of South Florida; Kandethody Ramachandran, University of South Florida Open Set Intrusion Recognition for Fine-Grained Attack Categorization Steve Cruz, University of Colorado Colorado Springs; Cora Coleman, New College Florida; Ethan Rudd*, University of Colorado at Colorado Springs; Terrance Boult, University of Colorado Colorado Springs Attack/Disaster 3: Resilience Building Forward:  Strategic Community Resilience Jennifer Schneider*, RIT; Carol Romanowski,  Rochester Institute of Technology; Sumita Mishra, Rochester Institute of Technology; Rajendra Raj, Rochester Institute of Technology; Michael McGuiness, RIT; Brandon Scwartz, RIT Development of a process improvement matrix to measure community level sustainability and resilience: a collaborative case study of Rochester, NY, USA Sarah Dobie*, Rochester Institute of Technology; Jennifer Schneider, RIT Spatial Indoor-Outdoor Emergency Incident Viewer for Crisis Mapping Nishith Maheshwari, National Institute of Standards and Technology; Judith Gelernter*, National Institute of Standards and Technology Land & Maritime Border 3: Enhancing Data Exploitation 2 MetricsVis: A Visual Analytics Framework for Performance Evaluation of Law Enforcement Officers Jieqiong Zhao, Purdue University; Abish Malik, Purdue University; Hanye Xu, Purdue University; Guizhen Wang, Purdue University; Jiawei Zhang, Purdue University; Chittayong Surakitbanharn*, Purdue University; David Ebert, Purdue University Omnidirectional Camera Image Analysis for Law-Enforcement and Border Control Applications Vijayan Asari*, University of Dayton; Pramud Rawat, Data Analysis and Simulation Services No-Reference Quality Metrics for Satellite Weather Images and Sky Images Arash Samani*, Tufts University; Karen Panetta, Tufts University; Sos Agaian, USA Biometrics & Forensics 3: Video Analytics Distance Aggregation based Score Fusion for Improving Person Re-identification Arko Barman*, University of Houston; Shishir Shah, University of Houston A Video Forensic Technique for Detecting Frame Integrity Using Human Visual System-inspired measure Qianwen Wan*, Tufts University; Karen Panetta, Tufts University; Sos Agaian, USA Autofocus for SWIR Facial Imagery Utilizing Haar Wavelets Seth Leffel*, West Virginia University; Thirimachos Bourlai, West Virginia University; Jeremy Dawson, West Virginia University 2:50 - 3:20

Break

3:20 - 5:20 Cyber Security 4: Approaches in Cybersecurity Modeling Agent-Centric Approach for Cybersecurity Decision-Support with Partial Observability Ramakrishna Tipireddy, Pacific Northwest National Laboratory; Samrat Chatterjee*, Pacific Northwest National Laboratory; Patrick Paulson, Pacific Northwest National Laboratory; Matthew Oster, Pacific Northwest National Laboratory; Mahantesh Halappanavar, Modeling Insider Threat Types in Cyber Organizations Eunice Santos, Illinois Institute of Technology; Eugene Santos Jr., Dartmouth College; John Korah*, Illinois Institute of Technology; Jeremy Thompson, Dartmouth College; Vairavan Murugappan, Illinois Institute of Technology; Suresh Subramanian, Illinois Institute of Technology Cognitive Modeling of Polymorphic Malware Using Fractal Based Semantic Characterization Muhammad Salman Khan*, University of Manitoba; Sana Siddiqui, University of Manitoba; Ken Ferens, University of Manitoba Attack/Disaster 4: Disaster Preparedness and Response Evaluation of Cornerstone Autism Center for Active Shooter Incidents Patrick Glass*, Purdue Homeland Security Institute Unified Human and Robot Command for Disaster Recovery Situations Carlos Ibarra Lopez*, University of Massachusetts Lowell; James Kuczynski, University of Massachusetts Lowell; Holly Yanco, University of Massachusetts Lowell Broadcasting Emergency Information to Non-English Speakers Jon Peha*, Carnegie Mellon University; Mike Yu, Carnegie Mellon University LocATER: Localization and Accountability Technologies for Emergency Responders Velin Dimitrov*, Northeastern University; Jose Vazquez, New Stone Soup VT; Taskin Padir, Northeastern University Land & Maritime Border 4: Ground-based Hardware for Border and Customs Enforcement Passive Acoustic Methods of Small Boat Detection, Tracking, and Classification Alexander Pollara*, Stevens Institute of Technology MSC; Alexander Sutin, Stevens Institute of Technology MSC; Hady Salloum, Stevens Institute of Technology MSC Fiber Optics Interferometer for General-Purpose Detection of Acoustic Signals Jefferson Odhner*, Odhner Holographics Remote Power Systems for Sensors on the Northern Border Lin Simpson, National Renewable Energy Laboratory; Lin Simpson*, National Renewable Energy Laboratory; Alicen Kandt, National Renewable Energy Laboratory Biometrics & Forensics 4: Ocular Biometrics and Other Modes Gender Prediction using Mobile Ocular Biometrics: A Feasibility Study Ajita Rattani*, University of Missouri - Kansas City; Sai Narsi Reddy Donthi Reddy, University of Missouri - Kansas City; Prof. Derakhshani, University of Missouri-Kansas City Online Co-training in Mobile Ocular Biometric Recognition Ajita Rattani*, University of Missouri - Kansas City; Prof. Derakhshani, University of Missouri-Kansas City Noise Assessment Framework for Optimizing ECG Key Generation Nima Karimian*, University of Connecticut; Fatemeh Tehranipoor, University of Connecticut; Zimu Guo, University of Florida; Mark Tehranipoor, University of Florida; Domenic Forte, University of Florida Neuromorphic and Early Warning Behavior-Based Authentication in Common Theft Scenarios Stephan Salas, HRL Laboratories, LLC; Richard Patrick, HRL Laboratories, LLC; Shane Roach*, HRL Laboratories, LLC; Nigel Stepp, HRL Laboratories, LLC; Jose Cruz-Albrecht, HRL Laboratories, LLC; Matthew E. Phillips, HRL Laboratories, LLC; Vincent De Sapio, 6:00

Welcome Reception, Exhibits and Poster Session Presentations

Cyber Security Posters Modeling Threats: Insider Attacks on Critical Infrastructure Assets Rajendra Raj*, Rochester Institute of Technology; Sumita Mishra, Rochester Institute of Technology; Carol Romanowski,  Rochester Institute of Technology; Jennifer Schneider, RIT; Suhair Alshehri, King Abdulaziz University Security Improvement of USB Technology Daniel Noyes, Univ of Massachusetts Dartmouth; Hong Liu*, Univ of Massachusetts Dartmouth; Paul Fortier, Univ of Massachusetts Dartmouth; Haiping Xu, Univ of Massachusetts Dartmouth Open Source Android Vulnerability Detection Tools: A Survey Keyur Kulkarni, The University of Toledo; Ahmad Javaid*, The University of Toledo Cybersecurity via FOTA-Monitored ‘Thing’ Behavior Achutha Raman*, 4PrivacyMatters Functional Dependency Approach towards Cyber Resilience in Enterprise Systems C. Ariel Pinto*, Old Dominion University; Paul Garvey, The MITRE Corp.; Joost Santos, George Washington University The Metric at the End of the Rainbow George Markowsky*, University of Maine Attack/Disaster Posters Investigation Techniques in Ground Water Prof. Dr. Ashraf  Saleh*, BRNO University of Technology Hardening Substations and Utilities John Sinisi*, Sinisi Solutions LLC Integrated Platform for Critical Infrastructure Analysis and Common Operating Picture Solutions Samir Puuska*, National Defence University; Seppo Horsmanheimo, VTT Technical Research Centre of Finland Ltd.; Heli Kokkoniemi-Tarkkanen, VTT Technical Research Centre of Finland Ltd. ; Pirkko Kuusela, VTT Technical Research Centre of Finland Ltd. ; Lotta MindCollect: An Information Needs Management System for Coalition Situational Awareness, Sensemaking, Decision Making, and Mission Integration David Kamien*, Mind-Alliance Systems Network Science Based framework for Joint Restoration of Interdependent Infrastructure Systems Demonstrated on Boston’s Mass Transit and Power Distribution System Udit Bhatia*, Northeastern University, Boston. MA; Auroop R. Ganguly, Northeastern University, Boston, MA Boston Community Energy Study – Zonal Analysis for Urban Microgrids Eric Morgan*, MIT LL; Stephen Valentine, MIT LL; Cheryl Blomberg, MIT LL; Erik Limpaecher, MIT LL Human Collaboration in Technology Innovation Robert I. Desourdis, Jr. Desourdis Collaboration, LLC; Kuan H. Collins, University of Maryland University College, The Graduate School Disaster Preparedness: Subway Evacuation Training System for People with Disabilities using Annotated Video Hao Dong*, Univ. of Massachusetts Amherst; Juechen Yin, Univ. of massachusetts Amherst; Zhuorui  Yang, UMass Amherst; Aura Ganz, UMass Amherst Land and Maritime Border Posters Detection and Tracking of Smuggler Vessels Using a Heterogeneous Network of Autonomous Vessels and Buoys Andrew Punnoose*, Punnoose Engineering Fast Color Transfer for Camouflage Applications Long Bao*, Tufts University; Karen Panetta, Tufts University; Sos Agaian, USA Walk-Through Metal Detectors and Stadium Contraband Omoikhefe Eboreime, Texas Southern University; Christie Nelson*, Rutgers University; Dexter Harris, Morgan State University Biometrics & Forensics Posters Securing Mobile Single Sign-on with Adaptive Authentication Dipto Chakravarty*, CA Technologies Two-Mode Biometrics Using Fingers Mukhammaddin Zinaddinov, Advanced Electronics Technology Center, UMASS-Lowell; Samson Mil'shtein, Advanced Electronics Technology Center, UMASS-Lowell Attack Trees for Protecting Biometric Systems Against Evolving Presentation Attacks Emanuela Marasco*, University of North Carolina at Charlotte UNCC; Bojan  Cukic, uncc; Mohamed Shehab, UNCC; Usam Rauf, UNCC
2- 3 May 2018 Crystal City, VA USA
2018 IEEE International Symposium on Technologies for Homeland Security

Technical Program

April 25, 2017

7:00 AM

Continental Breakfast

8:00 - 9:30 AM Cyber Security 1: Cyber-Physical Systems Adapting an Agent-Based Model of Socio-Technical Systems to Analyze Security Failures Christine Cunningham, MIT LL; Antonio Roque*, MIT LL Analytics for Smart Grid Cybersecurity and Risk Management Nazli Choucri*, Massachusetts Institute of Technology; Gaurav Agarwal, Massachusetts Institute of Technology Towards Efficient and Robust Quantum-Resistant Security Architecture Oscar Garcia*, Philips Research; Sauvik Bhattacharya, Philips Research; Ludo Tolhuizen, Philips Research; Ronald Rietman, Philips Research Attack/Disaster 1: Critical Infrastructure Seismic Barrier Protection of Critical Infrastructure Rob Haupt*, MIT Lincoln Laboratory, Vladimir Liberman, MIT Lincoln Laboratory and Mordechai Rothschild, MIT Lincoln Laboratory Detection, Mitigation, Recovery of GPS based Assured Timing Critical Infrastructure when under attack by Spoofing or Jamming. Patrick Diamiond*, Diamond Consulting Gas Pipeline Recovery from Disruption Using Multi- Objective Optimization Fei He*, Texas A&M University-Kingsville Land & Maritime Border 1: Airborne Sensing Residue Analysis for Area Based Similarity Measure in Registration of Remotely Sensed Aerial Imagery for Homeland-Security Wide Areas Surveillance Imran Vakil, AFRL; Dalila Megherbi*, CMINDS center /ECE,  UMASS Lowell Tracker Fusion for Robust Object Tracking and Confidence Reporting in Wide Area Motion Imagery Theus Aspiras*, University of Dayton; Vijayan Asari, University of Dayton; Terry Stanard, AFRL Foliage Penetrating Ladar for Surface Situation Awareness John Aldridge*, MIT Lincoln Laboratory; Lily Lee, MIT Lincoln Laboratory; Marius Albota, MIT Lincoln Laboratory; Brittany Baker, MIT Lincoln Laboratory; Rajan Gurjar, MIT Lincoln Laboratory; Brendan Edwards, MIT Lincoln Laboratory; Daniel Dumanis, MIT Lincoln Laboratory Biometrics & Forensics 1: Facial Recognition Study of Facial Recognition in Visible and Near Infrared Spectrums Joey Pomperada*, US Navy SPAWAR Eyeglasses Detection based on Learning and Non-learning based Classification Schemes Ahmad Mohammad*, UMKC; Ajita Rattani, University of Missouri - Kansas City; Prof. Derakhshani, University of Missouri-Kansas City 9:30 - 10:00

Break

10:00 - 11:30 Cyber Security 2:  Authentication Security Analysis of Two-Factor Authentication Matthew Crossman, Univ of Massachusetts Dartmouth; Hong Liu*, Univ of Massachusetts Dartmouth; Liudong Xing, Univ of Massachusetts Dartmouth; Timothy Shea, Univ of Massachusetts Dartmouth Incorporating Health Monitoring and Duress Detection into Mobile Device Authentication Susan Gottschlich*, Raytheon A Secure, Self-recovery, and High Capacity Blind Image Information Hiding, Authentication and Tampering Localization Scheme Using DCT Othmane Habouli, CMINDS/ECE UMASS Lowell; Dalila Megherbi*, CMINDS center /ECE,  UMASS Lowell Attack/Disaster 2: Cyber Risk Management and Intelligence Analysis TRAX: Social Media Data Analysis for Cyber Risk Management Anne Connell*, CERT A Survey of Fault and Attack Tree Modeling and Analysis for Cyber Risk Management Vidhyashree Nagaraju*, Universiy of Massachusetts Dartmouth; Lance Fiondella, University of Massachusetts Dartmouth; Thierry Wandji, Naval Air Systems Command Securing Wireless Communications of Connected Vehicles with Artificial Intelligence Prinkle Sharma*, University of Massachusetts Dartmouth; Hong Liu, Univ of Massachusetts Dartmouth; Honggang Wang, Univ of Massachusetts Dartmouth; Shelley Zhang, Univ of Massachusetts Dartmouth Land & Maritime Border 2: Enhancing Data Exploitation TraSeer: A Visual Analytics Tool for Vessel Movements in the Coastal Areas Guizhen Wang, Purdue University; Abish Malik, Purdue University; Calvin Yau, Purdue University; Chittayong Surakitbanharn*, Purdue University; David Ebert, Purdue University Automated scheduling of radar-cued camera system for optimizing visual inspection and detection of radar targets Deepak Khosla*, HRL Laboratories, LLC; David Huber, HRL Laboratories, LLC; Yang Chen, HRL Laboratories, LLC Biometrics & Forensics 2:  Finger and Palm Prints 3-D Palmprint Modeling for Biometric Verification Srijith Rajeev*, Tufts University; Shreyas Kamath Kalasa Mohandas, Tufts University; Karen Panetta, Tufts University; Sos Agaian, USA Fingerprint Authentication Using Geometric Features Shreyas Kamath Kalasa Mohandas*, Tufts University; Srijith Rajeev, Tufts University; Karen Panetta, Tufts University; Sos Agaian, USA Perspectives and Limitations of Touchless Fingerprints Anup Pillai*, IBM Research Almaden; Sam Mil'shtein, UMass Lowell 11:30 - 11:40

Break

11:40 - 12:30

Plenary Session

 Kay C. Goss, CEM  President, World Disaster Management, LLC 12:30 - 1:15

Lunch

1:20 - 2:50 Cyber Security 3: Intrusion Detection Automating Network Node Behavior Characterization by Mining Communication Patterns Thomas Carroll*, Pacific Northwest National Laboratory; Satish Chikkagoudar, Pacific Northwest National Laboratory; Kristine Arthur-Durett, Pacific Northwest National Laboratory; Dennis Thomas, Pacific Northwest National Laboratory Network Attribute Selection, Classification and Accuracy (NASCA) Algorithm for Intrusion Detection Systems Zheni Stefanova*, University of South Florida; Kandethody Ramachandran, University of South Florida Open Set Intrusion Recognition for Fine-Grained Attack Categorization Steve Cruz, University of Colorado Colorado Springs; Cora Coleman, New College Florida; Ethan Rudd*, University of Colorado at Colorado Springs; Terrance Boult, University of Colorado Colorado Springs Attack/Disaster 3: Resilience Building Forward:  Strategic Community Resilience Jennifer Schneider*, RIT; Carol Romanowski,  Rochester Institute of Technology; Sumita Mishra, Rochester Institute of Technology; Rajendra Raj, Rochester Institute of Technology; Michael McGuiness, RIT; Brandon Scwartz, RIT Development of a process improvement matrix to measure community level sustainability and resilience: a collaborative case study of Rochester, NY, USA Sarah Dobie*, Rochester Institute of Technology; Jennifer Schneider, RIT Spatial Indoor-Outdoor Emergency Incident Viewer for Crisis Mapping Nishith Maheshwari, National Institute of Standards and Technology; Judith Gelernter*, National Institute of Standards and Technology Land & Maritime Border 3: Enhancing Data Exploitation 2 MetricsVis: A Visual Analytics Framework for Performance Evaluation of Law Enforcement Officers Jieqiong Zhao, Purdue University; Abish Malik, Purdue University; Hanye Xu, Purdue University; Guizhen Wang, Purdue University; Jiawei Zhang, Purdue University; Chittayong Surakitbanharn*, Purdue University; David Ebert, Purdue University Omnidirectional Camera Image Analysis for Law- Enforcement and Border Control Applications Vijayan Asari*, University of Dayton; Pramud Rawat, Data Analysis and Simulation Services No-Reference Quality Metrics for Satellite Weather Images and Sky Images Arash Samani*, Tufts University; Karen Panetta, Tufts University; Sos Agaian, USA Biometrics & Forensics 3: Video Analytics Distance Aggregation based Score Fusion for Improving Person Re-identification Arko Barman*, University of Houston; Shishir Shah, University of Houston A Video Forensic Technique for Detecting Frame Integrity Using Human Visual System-inspired measure Qianwen Wan*, Tufts University; Karen Panetta, Tufts University; Sos Agaian, USA Autofocus for SWIR Facial Imagery Utilizing Haar Wavelets Seth Leffel*, West Virginia University; Thirimachos Bourlai, West Virginia University; Jeremy Dawson, West Virginia University 2:50 - 3:20

Break

3:20 - 5:20 Cyber Security 4: Approaches in Cybersecurity Modeling Agent-Centric Approach for Cybersecurity Decision- Support with Partial Observability Ramakrishna Tipireddy, Pacific Northwest National Laboratory; Samrat Chatterjee*, Pacific Northwest National Laboratory; Patrick Paulson, Pacific Northwest National Laboratory; Matthew Oster, Pacific Northwest National Laboratory; Mahantesh Halappanavar, Modeling Insider Threat Types in Cyber Organizations Eunice Santos, Illinois Institute of Technology; Eugene Santos Jr., Dartmouth College; John Korah*, Illinois Institute of Technology; Jeremy Thompson, Dartmouth College; Vairavan Murugappan, Illinois Institute of Technology; Suresh Subramanian, Illinois Institute of Technology Cognitive Modeling of Polymorphic Malware Using Fractal Based Semantic Characterization Muhammad Salman Khan*, University of Manitoba; Sana Siddiqui, University of Manitoba; Ken Ferens, University of Manitoba Attack/Disaster 4: Disaster Preparedness and Response Evaluation of Cornerstone Autism Center for Active Shooter Incidents Patrick Glass*, Purdue Homeland Security Institute Unified Human and Robot Command for Disaster Recovery Situations Carlos Ibarra Lopez*, University of Massachusetts Lowell; James Kuczynski, University of Massachusetts Lowell; Holly Yanco, University of Massachusetts Lowell Broadcasting Emergency Information to Non-English Speakers Jon Peha*, Carnegie Mellon University; Mike Yu, Carnegie Mellon University LocATER: Localization and Accountability Technologies for Emergency Responders Velin Dimitrov*, Northeastern University; Jose Vazquez, New Stone Soup VT; Taskin Padir, Northeastern University Land & Maritime Border 4: Ground-based Hardware for Border and Customs Enforcement Passive Acoustic Methods of Small Boat Detection, Tracking, and Classification Alexander Pollara*, Stevens Institute of Technology MSC; Alexander Sutin, Stevens Institute of Technology MSC; Hady Salloum, Stevens Institute of Technology MSC Fiber Optics Interferometer for General-Purpose Detection of Acoustic Signals Jefferson Odhner*, Odhner Holographics Remote Power Systems for Sensors on the Northern Border Lin Simpson, National Renewable Energy Laboratory; Lin Simpson*, National Renewable Energy Laboratory; Alicen Kandt, National Renewable Energy Laboratory Biometrics & Forensics 4: Ocular Biometrics and Other Modes Gender Prediction using Mobile Ocular Biometrics: A Feasibility Study Ajita Rattani*, University of Missouri - Kansas City; Sai Narsi Reddy Donthi Reddy, University of Missouri - Kansas City; Prof. Derakhshani, University of Missouri-Kansas City Online Co-training in Mobile Ocular Biometric Recognition Ajita Rattani*, University of Missouri - Kansas City; Prof. Derakhshani, University of Missouri-Kansas City Noise Assessment Framework for Optimizing ECG Key Generation Nima Karimian*, University of Connecticut; Fatemeh Tehranipoor, University of Connecticut; Zimu Guo, University of Florida; Mark Tehranipoor, University of Florida; Domenic Forte, University of Florida Neuromorphic and Early Warning Behavior-Based Authentication in Common Theft Scenarios Stephan Salas, HRL Laboratories, LLC; Richard Patrick, HRL Laboratories, LLC; Shane Roach*, HRL Laboratories, LLC; Nigel Stepp, HRL Laboratories, LLC; Jose Cruz-Albrecht, HRL Laboratories, LLC; Matthew E. Phillips, HRL Laboratories, LLC; Vincent De Sapio, 6:00

Welcome Reception, Exhibits and Poster Session

Presentations

Cyber Security Posters Modeling Threats: Insider Attacks on Critical Infrastructure Assets Rajendra Raj*, Rochester Institute of Technology; Sumita Mishra, Rochester Institute of Technology; Carol Romanowski,  Rochester Institute of Technology; Jennifer Schneider, RIT; Suhair Alshehri, King Abdulaziz University Security Improvement of USB Technology Daniel Noyes, Univ of Massachusetts Dartmouth; Hong Liu*, Univ of Massachusetts Dartmouth; Paul Fortier, Univ of Massachusetts Dartmouth; Haiping Xu, Univ of Massachusetts Dartmouth Open Source Android Vulnerability Detection Tools: A Survey Keyur Kulkarni, The University of Toledo; Ahmad Javaid*, The University of Toledo Cybersecurity via FOTA-Monitored ‘Thing’ Behavior Achutha Raman*, 4PrivacyMatters Functional Dependency Approach towards Cyber Resilience in Enterprise Systems C. Ariel Pinto*, Old Dominion University; Paul Garvey, The MITRE Corp.; Joost Santos, George Washington University The Metric at the End of the Rainbow George Markowsky*, University of Maine Attack/Disaster Posters Investigation Techniques in Ground Water Prof. Dr. Ashraf  Saleh*, BRNO University of Technology Hardening Substations and Utilities John Sinisi*, Sinisi Solutions LLC Integrated Platform for Critical Infrastructure Analysis and Common Operating Picture Solutions Samir Puuska*, National Defence University; Seppo Horsmanheimo, VTT Technical Research Centre of Finland Ltd.; Heli Kokkoniemi-Tarkkanen, VTT Technical Research Centre of Finland Ltd. ; Pirkko Kuusela, VTT Technical Research Centre of Finland Ltd. ; Lotta MindCollect: An Information Needs Management System for Coalition Situational Awareness, Sensemaking, Decision Making, and Mission Integration David Kamien*, Mind-Alliance Systems Network Science Based framework for Joint Restoration of Interdependent Infrastructure Systems Demonstrated on Boston’s Mass Transit and Power Distribution System Udit Bhatia*, Northeastern University, Boston. MA; Auroop R. Ganguly, Northeastern University, Boston, MA Boston Community Energy Study – Zonal Analysis for Urban Microgrids Eric Morgan*, MIT LL; Stephen Valentine, MIT LL; Cheryl Blomberg, MIT LL; Erik Limpaecher, MIT LL Human Collaboration in Technology Innovation Robert I. Desourdis, Jr. Desourdis Collaboration, LLC; Kuan H. Collins, University of Maryland University College, The Graduate School Disaster Preparedness: Subway Evacuation Training System for People with Disabilities using Annotated Video Hao Dong*, Univ. of Massachusetts Amherst; Juechen Yin, Univ. of massachusetts Amherst; Zhuorui  Yang, UMass Amherst; Aura Ganz, UMass Amherst Land and Maritime Border Posters Detection and Tracking of Smuggler Vessels Using a Heterogeneous Network of Autonomous Vessels and Buoys Andrew Punnoose*, Punnoose Engineering Fast Color Transfer for Camouflage Applications Long Bao*, Tufts University; Karen Panetta, Tufts University; Sos Agaian, USA Walk-Through Metal Detectors and Stadium Contraband Omoikhefe Eboreime, Texas Southern University; Christie Nelson*, Rutgers University; Dexter Harris, Morgan State University Biometrics & Forensics Posters Securing Mobile Single Sign-on with Adaptive Authentication Dipto Chakravarty*, CA Technologies Two-Mode Biometrics Using Fingers Mukhammaddin Zinaddinov, Advanced Electronics Technology Center, UMASS-Lowell; Samson Mil'shtein, Advanced Electronics Technology Center, UMASS-Lowell Attack Trees for Protecting Biometric Systems Against Evolving Presentation Attacks Emanuela Marasco*, University of North Carolina at Charlotte UNCC; Bojan  Cukic, uncc; Mohamed Shehab, UNCC; Usam Rauf, UNCC