25 - 26 April 2017 Waltham, MA USA
Gold sponsor: Co-sponsor:
2017 IEEE International Symposium on Technologies for Homeland Security

Technical Program

Arpil 26, 2017

7:00 AM

Continental Breakfast

8:00 - 9:30 AM Cyber Security 5: Secure Systems MailTrust - Attribute-Based Dynamic Encrypted Email Matthew Hudnall*, University of Alabama The Dover Inherently Secure Processor Gregory Sullivan*, Draper Threshold Voltage Defined Multi-Input Camouflaged Gate Asmit De*, Pennsylvania State University; Swaroop Ghosh, Pennsylvania State University Attack/Disaster 5: Network Vulnerability Quantitative Assessment of Transportation Network Vulnerability With Dynamic Traffic Simulation Methods Venkateswaran Shekar*, University of Massachusetts Dartmouth; Lance Fiondella, University of Massachusetts Dartmouth; Mahantesh Halappanavar, Pacific Northwest National Laboratory; Samrat Chatterjee, Pacific Northwest National Laboratory Quantifying Economic and Environmental Impacts of Transportation Network Disruptions with Dynamic Traffic Simulation Venkateswaran Shekar*, University of Massachusetts Dartmouth; Lance Fiondella, University of Massachusetts Dartmouth; Samrat Chatterjee, Pacific Northwest National Laboratory; Mahantesh Halappanavar, Pacific Northwest National Laboratory Revisiting the Vulnerability and Resilience of the Networks Horia Teodorescu*, Technical University Iasi Land & Maritime Border 5: Counter-UAS and Small Aircraft Detection Development of a Sensor Placement and Optimization Tool for Low-Flying Aircraft Detection and Surveillance Weiqun Shi*, MITRE; Aleksandra Markina-Khusid, MITRE; Daniel Luke, MITRE; Mark Munson, MITRE; Edward Hanfling, MITRE; James Apicco, MITRE; Joseph Francoeur, MITRE; David Masters, DHS 3D Active and Passive Geolocation and Tracking of Unmanned Aerial Systems William Watson*, BAE Systems : Sensor Technologies for Overcoming the Security Risks of Unmanned Systems Adam Kelly*, DeTect, Inc.; Helen Lewis, DeTect, Inc. 9:30 10:00

Break

10:00 - 11:30 Cyber Security 6: Analytics Retrospective on a Decade of Research in visualization for cybersecurity R. Jordan Crouser*, Smith College Detecting disguised processes using Application-Behavior Profiling Christian Vaas*, University of Oxford, CDT of Cyber Security; Jassim Happa, University of Oxford Introducing MLAT.is Treaty Cartel Internet Overlay for Digital Traffic Analytics Sarah Cortes*, Northeastern University; Sarah Cortes, Northeastern University Attack/Disaster 6: Situational Awareness Automated Scene Understanding via Fusion of Image and Object Features Deepak Khosla*, HRL Laboratories, LLC Disaster response : Victims’ Localization using Bluetooth Low Energy Sensors Zhuorui  Yang*, UMass Amherst; Aura Ganz, UMass Amherst; James Schafer, UMass Amherst Efficient Detection of Communities and Prediction of Abnormal Events, Situational Awareness in Large Complex Networks Pravin Chopade*, North Carolina A&T State University Greensboro, NC, USA; Justin  Zhan, University of Nevada-Las Vegas; Marwan Bikdash, North Carolina A&T State University, Greensboro, NC, USA Land & Maritime Border 6: Underwater Imaging Adaptive Alpha Trimmed Correlation Based Underwater Image Stitching Rahul Rajendran*, TUFTS University; Shishir Rao, TUFTS University; Karen Panetta, Tufts University; Sos Agaian, USA Combined Transform and Spatial Domain Based No Reference Measure for Underwater Images Shishir Rao*, TUFTS University; Rahul Rajendran, TUFTS University; Karen Panetta, Tufts University; Sos Agaian, USA Three Dimensional Alpha Weighted Quadratic Filter Oriented Underwater Color Enhancement for Maritime Border Protection Ozan Erat*, Tufts University; Karen Panetta, Tufts University; Sos Agaian, USA 11:30 - 11:40

Break

11:40 - 12:30

Plenary Session

12:30 - 1:15

Lunch

1:20 - 2:50 Cyber Security 7: Testbeds and Training Environments Hyperdrive: a flexible cloud testbed for research and education Amirali Sanatinia*, Sanket Deshpande, Apoorv Munshi, Daniel Kohlbrenner, Michael Yessaillian, Sarada Symonds, Agnes Chan, Guevara Noubir Northeastern University Experiment as a Service - Extending OpenStack into a Scientific Instrument for Cyber Security Research Theora Rice*, Pacific Northwest National Laboratory; Thomas Edgar, Pacific Northwest National Laboratory Dynamic Cyber Security Training Environments for an Evolving Cyber Workforce William Stout*, Sandia National Laboratories; Vincent Urias, SNL; Han Lin, SNL; Brian Van Leeuwen, SNL Attack/Disaster 7: Machine Learning and UAV How to Steal a Machine Learning Classifier with Deep Learning Yi Shi*, Intelligent Automation, Inc.; Yalin Sagduyu, Intelligent Automation, Inc.; Alexander Grushin, Intelligent Automation, Inc. Data Fusion and Unmanned Aerial Vehicles (UAVs) for First Responders Casey Corrado*, Tufts University; Karen Panetta, Tufts University Optimizing the Strategic Allocation of Small Unmanned Aerial Systems for Distributed Sensing Andrew Weinert*, MIT Lincoln Laboratory; Mathieu Dahan, MIT; Saurabh Amin, MIT Land & Maritime Border 7: Human- and Cargo-Borne Concealed Threat Deep Learning for Fusing Multi-Sensor Person-borne IED Data Ross Deming*, Solid State Scientific Corporation; Roman Ilin, Air Force Research Laboratory; Scott MacIntosh, Black Cat Science, Inc. Modeling and Imaging Security Threats Using a Single-Frequency Adaptable Reflect-Array Hipolito Gomez Sousa, Northeastern University; Jose Martinez-Lorenzo*, Northeastern University Vibro-acoustic Methods of Insect Detection in Agricultural Shipments and Wood Packing Materials Alexander Sutin*, Stevens Institute of Technology MSC Cyber Secuity 8: Privacy A Consensus Model for Optimizing Privacy, Secrecy, Security and Safety Warren Axelrod*, US Cyber Consequences Unit On the Analysis of Collaborative Anonymity Set Formation (CASF) Method for Privacy in the Smart Grid Sabrina Afrin, Rochester Institute of Technology; Sumita Mishra*, Rochester Institute of Technology Improved Cyber Threat Indicator Sharing  by Scoring Privacy Risk Elena Peterson*, Pacific Northwest National Laboratory; Daniel Best, Pacific Northwest National Laboratory; Jaspreet Bhatia, Carnegie Mellon University; Travis Breaux, Carnegie Mellon University 2:50 - 3:20

Break

3:20 - 5:20 Cyber Security 9: Classification and Scoring Algorithms in Cybersecurity Probabilistic Inference of Internet Node Geolocation with Anomaly Detection Neehar Mukne*, Worcester Polytechnic Institute Prioritizing Security Bug Fixes:  A Novel Text Analytics Approach Pete Rotella*, Cisco Systems, Inc. FastDetict: A Data Mining Framework for Predicting and Preventing DDoS Attack Mais Nijim*, Texas A&M university Kingsville; Mohammad Khan, Texas A&M University Kingsville; Hisham Albataineh, Texas A&M University Kingsville Automated U.S Diplomatic Cables Security Classification: Topic Models Pruning Vs. Classification Based on Clusters Khudran Alzhrani*, University of Colorado Colorado Springs Attack/Disaster 8: Terrorism and Disaster Preparedness Fighting Together? - Understanding Bilateral Operational Cooperation in the Realm in the Real, of Counter-Terorism Arie Perliger*, University of Massachusetts Lowell; Daniel Milton, United States Military Academy Designing a Decision Aid for Intelligence Analysis: A Scenario Based approach Shannon Briggs*, Rensselaer Polytechnic Institute; Rostyslav Korolov, Rensselaer Polytechnic Institute; Heng Ji, Rensselaer Polytechnic Institute; Clare Voss, Army Research Laboratory; William Wallace, Rensselaer Polytechnic Institute INSiGHT: Detecting the Radicalization Trajectories of Homegrown Violent Extremists with Dynamic Graph Pattern Matching Benjamin Hung*, Colorado State University; Anura Jayasumana, Colorado State University; Vidarshana Bandara, CA Technologies Spatio-Temporal Reconstruction of Chemical and Biological Threat Plumes from a Network of Cameras Clara McCreery*, MIT Lincoln Laboratory; Gary Long, MIT Lincoln Laboratory; William Lawrence, MIT Lincoln Laboratory Land & Maritime Border 8:  Radiological and Nuclear Detection A 2-bits and 3-bits Metamaterial Absorber-based Compressive Reflector Antenna for High Sensing Capacity Imaging Ali Molaei*, NEU; Juan Heredia-Juesas, Northeastern University; Jose Martinez-Lorenzo, Northeastern University 64-Element Fast Neutron, Coded-Aperture Imager Christopher Griffith*, Naval Research Laboratory; Richard Woolf, Naval Research Laboratory; Bernard Phlips, Naval Research Laboratory Humidity-Induced Damage in Polyvinyl Toluene and Polystyrene Plastic Scintillator Eric Sword*, UT Battelle Silverside Neutron Detector Performance Alison Forsyth*, Silverside Detectors; Timothy Teal, tim@sside.co; Philip Taber, Silverside Detectors; Andrew Inglis, Silverside Detectors 5:30

Conference Adjourns

25 - 26 April 2017 Waltham, MA USA
Gold sponsor: Co-sponsor:
2017 IEEE International Symposium on Technologies for Homeland Security

Technical Program

Arpil 26, 2017

7:00 AM

Continental Breakfast

8:00 - 9:30 AM Cyber Security 5: Secure Systems MailTrust - Attribute-Based Dynamic Encrypted Email Matthew Hudnall*, University of Alabama The Dover Inherently Secure Processor Gregory Sullivan*, Draper Threshold Voltage Defined Multi-Input Camouflaged Gate Asmit De*, Pennsylvania State University; Swaroop Ghosh, Pennsylvania State University Attack/Disaster 5: Network Vulnerability Quantitative Assessment of Transportation Network Vulnerability With Dynamic Traffic Simulation Methods Venkateswaran Shekar*, University of Massachusetts Dartmouth; Lance Fiondella, University of Massachusetts Dartmouth; Mahantesh Halappanavar, Pacific Northwest National Laboratory; Samrat Chatterjee, Pacific Northwest National Laboratory Quantifying Economic and Environmental Impacts of Transportation Network Disruptions with Dynamic Traffic Simulation Venkateswaran Shekar*, University of Massachusetts Dartmouth; Lance Fiondella, University of Massachusetts Dartmouth; Samrat Chatterjee, Pacific Northwest National Laboratory; Mahantesh Halappanavar, Pacific Northwest National Laboratory Revisiting the Vulnerability and Resilience of the Networks Horia Teodorescu*, Technical University Iasi Land & Maritime Border 5: Counter-UAS and Small Aircraft Detection Development of a Sensor Placement and Optimization Tool for Low-Flying Aircraft Detection and Surveillance Weiqun Shi*, MITRE; Aleksandra Markina-Khusid, MITRE; Daniel Luke, MITRE; Mark Munson, MITRE; Edward Hanfling, MITRE; James Apicco, MITRE; Joseph Francoeur, MITRE; David Masters, DHS 3D Active and Passive Geolocation and Tracking of Unmanned Aerial Systems William Watson*, BAE Systems : Sensor Technologies for Overcoming the Security Risks of Unmanned Systems Adam Kelly*, DeTect, Inc.; Helen Lewis, DeTect, Inc. 9:30 10:00

Break

10:00 - 11:30 Cyber Security 6: Analytics Retrospective on a Decade of Research in visualization for cybersecurity R. Jordan Crouser*, Smith College Detecting disguised processes using Application- Behavior Profiling Christian Vaas*, University of Oxford, CDT of Cyber Security; Jassim Happa, University of Oxford Introducing MLAT.is Treaty Cartel Internet Overlay for Digital Traffic Analytics Sarah Cortes*, Northeastern University; Sarah Cortes, Northeastern University Attack/Disaster 6: Situational Awareness Automated Scene Understanding via Fusion of Image and Object Features Deepak Khosla*, HRL Laboratories, LLC Disaster response : Victims’ Localization using Bluetooth Low Energy Sensors Zhuorui  Yang*, UMass Amherst; Aura Ganz, UMass Amherst; James Schafer, UMass Amherst Efficient Detection of Communities and Prediction of Abnormal Events, Situational Awareness in Large Complex Networks Pravin Chopade*, North Carolina A&T State University Greensboro, NC, USA; Justin  Zhan, University of Nevada- Las Vegas; Marwan Bikdash, North Carolina A&T State University, Greensboro, NC, USA Land & Maritime Border 6: Underwater Imaging Adaptive Alpha Trimmed Correlation Based Underwater Image Stitching Rahul Rajendran*, TUFTS University; Shishir Rao, TUFTS University; Karen Panetta, Tufts University; Sos Agaian, USA Combined Transform and Spatial Domain Based No Reference Measure for Underwater Images Shishir Rao*, TUFTS University; Rahul Rajendran, TUFTS University; Karen Panetta, Tufts University; Sos Agaian, USA Three Dimensional Alpha Weighted Quadratic Filter Oriented Underwater Color Enhancement for Maritime Border Protection Ozan Erat*, Tufts University; Karen Panetta, Tufts University; Sos Agaian, USA 11:30 - 11:40

Break

11:40 - 12:30

Plenary Session

12:30 - 1:15

Lunch

1:20 - 2:50 Cyber Security 7: Testbeds and Training Environments Hyperdrive: a flexible cloud testbed for research and education Amirali Sanatinia*, Sanket Deshpande, Apoorv Munshi, Daniel Kohlbrenner, Michael Yessaillian, Sarada Symonds, Agnes Chan, Guevara Noubir Northeastern University Experiment as a Service - Extending OpenStack into a Scientific Instrument for Cyber Security Research Theora Rice*, Pacific Northwest National Laboratory; Thomas Edgar, Pacific Northwest National Laboratory Dynamic Cyber Security Training Environments for an Evolving Cyber Workforce William Stout*, Sandia National Laboratories; Vincent Urias, SNL; Han Lin, SNL; Brian Van Leeuwen, SNL Attack/Disaster 7: Machine Learning and UAV How to Steal a Machine Learning Classifier with Deep Learning Yi Shi*, Intelligent Automation, Inc.; Yalin Sagduyu, Intelligent Automation, Inc.; Alexander Grushin, Intelligent Automation, Inc. Data Fusion and Unmanned Aerial Vehicles (UAVs) for First Responders Casey Corrado*, Tufts University; Karen Panetta, Tufts University Optimizing the Strategic Allocation of Small Unmanned Aerial Systems for Distributed Sensing Andrew Weinert*, MIT Lincoln Laboratory; Mathieu Dahan, MIT; Saurabh Amin, MIT Land & Maritime Border 7: Human- and Cargo- Borne Concealed Threat Deep Learning for Fusing Multi-Sensor Person-borne IED Data Ross Deming*, Solid State Scientific Corporation; Roman Ilin, Air Force Research Laboratory; Scott MacIntosh, Black Cat Science, Inc. Modeling and Imaging Security Threats Using a Single- Frequency Adaptable Reflect-Array Hipolito Gomez Sousa, Northeastern University; Jose Martinez-Lorenzo*, Northeastern University Vibro-acoustic Methods of Insect Detection in Agricultural Shipments and Wood Packing Materials Alexander Sutin*, Stevens Institute of Technology MSC Cyber Secuity 8: Privacy A Consensus Model for Optimizing Privacy, Secrecy, Security and Safety Warren Axelrod*, US Cyber Consequences Unit On the Analysis of Collaborative Anonymity Set Formation (CASF) Method for Privacy in the Smart Grid Sabrina Afrin, Rochester Institute of Technology; Sumita Mishra*, Rochester Institute of Technology Improved Cyber Threat Indicator Sharing  by Scoring Privacy Risk Elena Peterson*, Pacific Northwest National Laboratory; Daniel Best, Pacific Northwest National Laboratory; Jaspreet Bhatia, Carnegie Mellon University; Travis Breaux, Carnegie Mellon University 2:50 - 3:20

Break

3:20 - 5:20 Cyber Security 9: Classification and Scoring Algorithms in Cybersecurity Probabilistic Inference of Internet Node Geolocation with Anomaly Detection Neehar Mukne*, Worcester Polytechnic Institute Prioritizing Security Bug Fixes:  A Novel Text Analytics Approach Pete Rotella*, Cisco Systems, Inc. FastDetict: A Data Mining Framework for Predicting and Preventing DDoS Attack Mais Nijim*, Texas A&M university Kingsville; Mohammad Khan, Texas A&M University Kingsville; Hisham Albataineh, Texas A&M University Kingsville Automated U.S Diplomatic Cables Security Classification: Topic Models Pruning Vs. Classification Based on Clusters Khudran Alzhrani*, University of Colorado Colorado Springs Attack/Disaster 8: Terrorism and Disaster Preparedness Fighting Together? - Understanding Bilateral Operational Cooperation in the Realm in the Real, of Counter- Terorism Arie Perliger*, University of Massachusetts Lowell; Daniel Milton, United States Military Academy Designing a Decision Aid for Intelligence Analysis: A Scenario Based approach Shannon Briggs*, Rensselaer Polytechnic Institute; Rostyslav Korolov, Rensselaer Polytechnic Institute; Heng Ji, Rensselaer Polytechnic Institute; Clare Voss, Army Research Laboratory; William Wallace, Rensselaer Polytechnic Institute INSiGHT: Detecting the Radicalization Trajectories of Homegrown Violent Extremists with Dynamic Graph Pattern Matching Benjamin Hung*, Colorado State University; Anura Jayasumana, Colorado State University; Vidarshana Bandara, CA Technologies Spatio-Temporal Reconstruction of Chemical and Biological Threat Plumes from a Network of Cameras Clara McCreery*, MIT Lincoln Laboratory; Gary Long, MIT Lincoln Laboratory; William Lawrence, MIT Lincoln Laboratory Land & Maritime Border 8:  Radiological and Nuclear Detection A 2-bits and 3-bits Metamaterial Absorber-based Compressive Reflector Antenna for High Sensing Capacity Imaging Ali Molaei*, NEU; Juan Heredia-Juesas, Northeastern University; Jose Martinez-Lorenzo, Northeastern University 64-Element Fast Neutron, Coded-Aperture Imager Christopher Griffith*, Naval Research Laboratory; Richard Woolf, Naval Research Laboratory; Bernard Phlips, Naval Research Laboratory Humidity-Induced Damage in Polyvinyl Toluene and Polystyrene Plastic Scintillator Eric Sword*, UT Battelle Silverside Neutron Detector Performance Alison Forsyth*, Silverside Detectors; Timothy Teal, tim@sside.co; Philip Taber, Silverside Detectors; Andrew Inglis, Silverside Detectors 5:30

Conference Adjourns