2 - 3 May 2018 Crystal City, VA USA
2018 IEEE International Symposium on Technologies for Homeland Security

Technical Program

April 26, 2017

7:00 AM

Continental Breakfast

8:00 - 9:30 AM Cyber Security 5: Secure Systems Implementing Secure E-Mail on the Open Internet with MailTrust Matthew Hudnall*, University of Alabama; Allen Parrish, United States Naval Academy; Susan Vrbsky, University of Alabama The Dover Inherently Secure Processor Gregory Sullivan*, Draper Preventing Reverse Engineering using Threshold Voltage Defined Multi-Input Camouflaged Gates Asmit De*, Pennsylvania State University; Swaroop Ghosh, Pennsylvania State University Attack/Disaster 5: Network Vulnerability Quantitative Assessment of Transportation Network Vulnerability with Dynamic Traffic Simulation Methods Venkateswaran Shekar*, University of Massachusetts Dartmouth; Lance Fiondella, University of Massachusetts Dartmouth; Mahantesh Halappanavar, Pacific Northwest National Laboratory; Samrat Chatterjee, Pacific Northwest National Laboratory Quantifying Economic and Environmental Impacts of Transportation Network Disruptions with Dynamic Traffic Simulation Venkateswaran Shekar*, University of Massachusetts Dartmouth; Lance Fiondella, University of Massachusetts Dartmouth; Samrat Chatterjee, Pacific Northwest National Laboratory; Mahantesh Halappanavar, Pacific Northwest National Laboratory Spatio-Temporal Reconstruction of Chemical and Biological Threat Plumes from a Network of Cameras Clara McCreery*, MIT Lincoln Laboratory; Gary Long, MIT Lincoln Laboratory; William Lawrence, MIT Lincoln Laboratory Land & Maritime Border 5: Counter-UAS and Small Aircraft Detection Development of a Sensor Placement and Optimization Tool for Low-Flying Aircraft Detection and Surveillance Weiqun Shi*, MITRE; Aleksandra Markina-Khusid, MITRE; Daniel Luke, MITRE; Mark Munson, MITRE; Edward Hanfling, MITRE; James Apicco, MITRE; Joseph Francoeur, MITRE; David Masters, DHS 3D Active and Passive Geolocation and Tracking of Unmanned Aerial Systems William Watson*, BAE Systems Risk Assessment for Application of Sensor Technologies to Overcoming the Security Risks of Unmanned Systems Adam Kelly*, DeTect-Inc. 9:30 10:00

Break

10:00 - 11:30 Cyber Security 6: Analytics Retrospective on a Decade of Research in visualization for cybersecurity R. Jordan Crouser*, Smith College; Erina Fukuda, Smith College; Subashini Sridhar, Smith College Detecting disguised processes using Application-Behavior Profiling Christian Vaas*, University of Oxford; Jassim Happa, University of Oxford MLAT.is: MLAT Treaty Cartel Internet and Network Overlay for Digital Traffic Analytics Sarah Cortes*, Northeastern University Attack/Disaster 6: Situational Awareness Automated Scene Understanding via Fusion of Image and Object Features Deepak Khosla*, HRL Laboratories, LLC; Ryan Uhlenbrock, HRL Laboratories, LLC; Yang Chen, HRL Laboratories, LLC Disaster Response : Victims’ Localization using Bluetooth Low Energy Sensors Zhuorui  Yang*, UMass Amherst; Aura Ganz, UMass Amherst; James Schafer, UMass Amherst Efficient Detection of Communities and Prediction of Abnormal Events, Situational Awareness in Large Complex Networks Pravin Chopade*, ACTNext by ACT Inc. Iowa City IA, USA; Justin  Zhan, University of Nevada-Las Vegas; Marwan Bikdash, North Carolina A&T State University, Greensboro, NC, USA Land & Maritime Border 6: Underwater Imaging Adaptive Alpha Trimmed Correlation Based Underwater Image Stitching Rahul Rajendran*, TUFTS University; Shishir Rao, TUFTS University; Karen Panetta, Tufts University; Sos Agaian, USA Combined Transform and Spatial Domain Based "No Reference" Measure for Underwater Images Shishir Rao*, TUFTS University; Rahul Rajendran, TUFTS University; Karen Panetta, Tufts University; Sos Agaian, USA Contrast Enhancement for Underwater Images in Maritime Border Protection Ozan Erat*, Tufts University; Karen Panetta, Tufts University; Sos Agaian, USA 11:30 - 11:40

Break

11:40 - 12:30

Plenary Session

12:30 - 1:15

Lunch

1:20 - 2:50 Cyber Security 7: Testbeds and Training Environments Hyperdrive: a flexible cloud testbed for research and education Amirali Sanatinia*, Northeastern University; Sanket Deshpande, Northeastern University; Apoorv Munshi, Northeastern University; Daniel Kohlbrenner, Northeastern University; Michael Yessaillian, Northeastern University; Sarada Symonds, Northeastern Univers Experiment as a Service - Extending OpenStack into a Scientific Instrument for Cyber Security Research Theora Rice*, Pacific Northwest National Laboratory; Thomas Edgar, Pacific Northwest National Laboratory Dynamic Cyber Security Training Environments for an Evolving Cyber Workforce William Stout*, Sandia National Laboratories; Vincent Urias, SNL; Han Lin, SNL; Brian Van Leeuwen, SNL Attack/Disaster 7: Machine Learning and UAV How to Steal a Machine Learning Classifier with Deep Learning Yi Shi*, Intelligent Automation, Inc.; Yalin Sagduyu, Intelligent Automation, Inc.; Alexander Grushin, Intelligent Automation, Inc. Data Fusion and Unmanned Aerial Vehicles (UAVs) for First Responders Casey Corrado*, Tufts University; Karen Panetta, Tufts University Optimizing the Strategic Allocation of Small Unmanned Aerial Systems for Distributed Sensing Andrew Weinert*, MIT Lincoln Laboratory; Mathieu Dahan, MIT; Saurabh Amin, MIT Land & Maritime Border 7: Human- and Cargo-Borne Concealed Threat Deep Learning for Fusing Multi-Sensor Person-borne IED Data Ross Deming*, Solid State Scientific Corporation; Roman Ilin, Air Force Research Laboratory; Scott MacIntosh, Black Cat Science, Inc. Modeling and Imaging Security Threats Using a Single-Frequency Adaptable Reflect-Array Hipolito Gomez Sousa, Northeastern University; Jose Martinez-Lorenzo*, Northeastern University Vibro-acoustic methods of insect detection in agricultural shipments and wood packing materials Alexander Sutin*, Stevens Institute of Technology MSC Cyber Secuity 8: Privacy A Consensus Model for Optimizing Privacy, Secrecy, Security and Safety Warren Axelrod*, US Cyber Consequences Unit On the Analysis of Collaborative Anonymity Set Formation (CASF) Method for Privacy in the Smart Grid Sabrina Afrin, Rochester Institute of Technology; Sumita Mishra*, Rochester Institute of Technology Improved Cyber Threat Indicator Sharing  by Scoring Privacy Risk Elena Peterson*, Pacific Northwest National Laboratory; Daniel Best, Pacific Northwest National Laboratory; Jaspreet Bhatia, Carnegie Mellon University; Travis Breaux, Carnegie Mellon University 2:50 - 3:20

Break

3:20 - 5:20 Cyber Security 9: Classification and Scoring Algorithms in Cybersecurity Probabilistic Inference of Internet Node Geolocation with Anomaly Detection Neehar Mukne*, Worcester Polytechnic Institute; Randy Paffenroth, Worcester Polytechnic Institute Textual Analysis of Security Bug Reports Pete Rotella*, Cisco Systems, Inc. FastDetict: A Data Mining Framework for Predicting and Preventing DDoS Attack Mais Nijim*, Texas A&M university Kingsville; Mohammad Khan, Texas A&M University Kingsville; Hisham Albataineh, Texas A&M University Kingsville Automated U.S Diplomatic Cables Security Classification: Topic Models Pruning vs. Classification Based on Clusters Khudran Alzhrani*, University of Colorado Colorado Springs; Ethan Rudd, University of Colorado at Colorado Springs; Edward Chow, UCCS; Terrance Boult, University of Colorado Colorado Springs Attack/Disaster 8: Terrorism and Disaster Preparedness Fighting Together? – Understanding Bilaterial Operational Cooperation in the Realm of Counter-Terrorism Arie Perliger*, University of Massachusetts Lowell; Daniel Milton, United States Military Academy Generation of Plausible Hurricane Tracks for Preparedness Exercises Jonathan K. Su, Charles Rose, Anthony Lapadula, Robert Hallowell,  MIT Lincoln Laboratory INSiGHT: A System for Detecting Radicalization Trajectories in Large Heterogeneous Graphs Benjamin Hung*, Colorado State University; Anura Jayasumana, Colorado State University; Vidarshana Bandara, CA Technologies Land & Maritime Border 8:  Radiological and Nuclear Detection A 2-bits and 3-bits Metamaterial Absorber-based Compressive Reflector Antenna for High Sensing Capacity Imaging Ali Molaei*, NEU; Juan Heredia-Juesas, Northeastern University; Jose Martinez-Lorenzo, Northeastern University 64-Element Fast Neutron, Coded-Aperture Imager Christopher Griffith*, Naval Research Laboratory; Richard Woolf, Naval Research Laboratory; Bernard Phlips, Naval Research Laboratory Humidity-Induced Damage in Polyvinyl Toluene and Polystyrene Plastic Scintillator Eric Sword*, Oak Ridge National Laboratory Silverside Neutron Detector Performance Alison Forsyth*, Silverside Detectors; Timothy Teal, tim@sside.co; Andrew Inglis, Silverside Detectors 5:30

Conference Adjourns

2- 3 May 2018 Crystal City, VA USA
2018 IEEE International Symposium on Technologies for Homeland Security

Technical Program

April 26, 2017

7:00 AM

Continental Breakfast

8:00 - 9:30 AM Cyber Security 5: Secure Systems Implementing Secure E-Mail on the Open Internet with MailTrust Matthew Hudnall*, University of Alabama; Allen Parrish, United States Naval Academy; Susan Vrbsky, University of Alabama The Dover Inherently Secure Processor Gregory Sullivan*, Draper Preventing Reverse Engineering using Threshold Voltage Defined Multi-Input Camouflaged Gates Asmit De*, Pennsylvania State University; Swaroop Ghosh, Pennsylvania State University Attack/Disaster 5: Network Vulnerability Quantitative Assessment of Transportation Network Vulnerability with Dynamic Traffic Simulation Methods Venkateswaran Shekar*, University of Massachusetts Dartmouth; Lance Fiondella, University of Massachusetts Dartmouth; Mahantesh Halappanavar, Pacific Northwest National Laboratory; Samrat Chatterjee, Pacific Northwest National Laboratory Quantifying Economic and Environmental Impacts of Transportation Network Disruptions with Dynamic Traffic Simulation Venkateswaran Shekar*, University of Massachusetts Dartmouth; Lance Fiondella, University of Massachusetts Dartmouth; Samrat Chatterjee, Pacific Northwest National Laboratory; Mahantesh Halappanavar, Pacific Northwest National Laboratory Spatio-Temporal Reconstruction of Chemical and Biological Threat Plumes from a Network of Cameras Clara McCreery*, MIT Lincoln Laboratory; Gary Long, MIT Lincoln Laboratory; William Lawrence, MIT Lincoln Laboratory Land & Maritime Border 5: Counter-UAS and Small Aircraft Detection Development of a Sensor Placement and Optimization Tool for Low-Flying Aircraft Detection and Surveillance Weiqun Shi*, MITRE; Aleksandra Markina-Khusid, MITRE; Daniel Luke, MITRE; Mark Munson, MITRE; Edward Hanfling, MITRE; James Apicco, MITRE; Joseph Francoeur, MITRE; David Masters, DHS 3D Active and Passive Geolocation and Tracking of Unmanned Aerial Systems William Watson*, BAE Systems Risk Assessment for Application of Sensor Technologies to Overcoming the Security Risks of Unmanned Systems Adam Kelly*, DeTect-Inc. 9:30 10:00

Break

10:00 - 11:30 Cyber Security 6: Analytics Retrospective on a Decade of Research in visualization for cybersecurity R. Jordan Crouser*, Smith College; Erina Fukuda, Smith College; Subashini Sridhar, Smith College Detecting disguised processes using Application- Behavior Profiling Christian Vaas*, University of Oxford; Jassim Happa, University of Oxford MLAT.is: MLAT Treaty Cartel Internet and Network Overlay for Digital Traffic Analytics Sarah Cortes*, Northeastern University Attack/Disaster 6: Situational Awareness Automated Scene Understanding via Fusion of Image and Object Features Deepak Khosla*, HRL Laboratories, LLC; Ryan Uhlenbrock, HRL Laboratories, LLC; Yang Chen, HRL Laboratories, LLC Disaster Response : Victims’ Localization using Bluetooth Low Energy Sensors Zhuorui  Yang*, UMass Amherst; Aura Ganz, UMass Amherst; James Schafer, UMass Amherst Efficient Detection of Communities and Prediction of Abnormal Events, Situational Awareness in Large Complex Networks Pravin Chopade*, ACTNext by ACT Inc. Iowa City IA, USA; Justin  Zhan, University of Nevada-Las Vegas; Marwan Bikdash, North Carolina A&T State University, Greensboro, NC, USA Land & Maritime Border 6: Underwater Imaging Adaptive Alpha Trimmed Correlation Based Underwater Image Stitching Rahul Rajendran*, TUFTS University; Shishir Rao, TUFTS University; Karen Panetta, Tufts University; Sos Agaian, USA Combined Transform and Spatial Domain Based "No Reference" Measure for Underwater Images Shishir Rao*, TUFTS University; Rahul Rajendran, TUFTS University; Karen Panetta, Tufts University; Sos Agaian, USA Contrast Enhancement for Underwater Images in Maritime Border Protection Ozan Erat*, Tufts University; Karen Panetta, Tufts University; Sos Agaian, USA 11:30 - 11:40

Break

11:40 - 12:30

Plenary Session

12:30 - 1:15

Lunch

1:20 - 2:50 Cyber Security 7: Testbeds and Training Environments Hyperdrive: a flexible cloud testbed for research and education Amirali Sanatinia*, Northeastern University; Sanket Deshpande, Northeastern University; Apoorv Munshi, Northeastern University; Daniel Kohlbrenner, Northeastern University; Michael Yessaillian, Northeastern University; Sarada Symonds, Northeastern Univers Experiment as a Service - Extending OpenStack into a Scientific Instrument for Cyber Security Research Theora Rice*, Pacific Northwest National Laboratory; Thomas Edgar, Pacific Northwest National Laboratory Dynamic Cyber Security Training Environments for an Evolving Cyber Workforce William Stout*, Sandia National Laboratories; Vincent Urias, SNL; Han Lin, SNL; Brian Van Leeuwen, SNL Attack/Disaster 7: Machine Learning and UAV How to Steal a Machine Learning Classifier with Deep Learning Yi Shi*, Intelligent Automation, Inc.; Yalin Sagduyu, Intelligent Automation, Inc.; Alexander Grushin, Intelligent Automation, Inc. Data Fusion and Unmanned Aerial Vehicles (UAVs) for First Responders Casey Corrado*, Tufts University; Karen Panetta, Tufts University Optimizing the Strategic Allocation of Small Unmanned Aerial Systems for Distributed Sensing Andrew Weinert*, MIT Lincoln Laboratory; Mathieu Dahan, MIT; Saurabh Amin, MIT Land & Maritime Border 7: Human- and Cargo- Borne Concealed Threat Deep Learning for Fusing Multi-Sensor Person-borne IED Data Ross Deming*, Solid State Scientific Corporation; Roman Ilin, Air Force Research Laboratory; Scott MacIntosh, Black Cat Science, Inc. Modeling and Imaging Security Threats Using a Single- Frequency Adaptable Reflect-Array Hipolito Gomez Sousa, Northeastern University; Jose Martinez-Lorenzo*, Northeastern University Vibro-acoustic methods of insect detection in agricultural shipments and wood packing materials Alexander Sutin*, Stevens Institute of Technology MSC Cyber Secuity 8: Privacy A Consensus Model for Optimizing Privacy, Secrecy, Security and Safety Warren Axelrod*, US Cyber Consequences Unit On the Analysis of Collaborative Anonymity Set Formation (CASF) Method for Privacy in the Smart Grid Sabrina Afrin, Rochester Institute of Technology; Sumita Mishra*, Rochester Institute of Technology Improved Cyber Threat Indicator Sharing  by Scoring Privacy Risk Elena Peterson*, Pacific Northwest National Laboratory; Daniel Best, Pacific Northwest National Laboratory; Jaspreet Bhatia, Carnegie Mellon University; Travis Breaux, Carnegie Mellon University 2:50 - 3:20

Break

3:20 - 5:20 Cyber Security 9: Classification and Scoring Algorithms in Cybersecurity Probabilistic Inference of Internet Node Geolocation with Anomaly Detection Neehar Mukne*, Worcester Polytechnic Institute; Randy Paffenroth, Worcester Polytechnic Institute Textual Analysis of Security Bug Reports Pete Rotella*, Cisco Systems, Inc. FastDetict: A Data Mining Framework for Predicting and Preventing DDoS Attack Mais Nijim*, Texas A&M university Kingsville; Mohammad Khan, Texas A&M University Kingsville; Hisham Albataineh, Texas A&M University Kingsville Automated U.S Diplomatic Cables Security Classification: Topic Models Pruning vs. Classification Based on Clusters Khudran Alzhrani*, University of Colorado Colorado Springs; Ethan Rudd, University of Colorado at Colorado Springs; Edward Chow, UCCS; Terrance Boult, University of Colorado Colorado Springs Attack/Disaster 8: Terrorism and Disaster Preparedness Fighting Together? – Understanding Bilaterial Operational Cooperation in the Realm of Counter- Terrorism Arie Perliger*, University of Massachusetts Lowell; Daniel Milton, United States Military Academy Generation of Plausible Hurricane Tracks for Preparedness Exercises Jonathan K. Su, Charles Rose, Anthony Lapadula, Robert Hallowell,  MIT Lincoln Laboratory INSiGHT: A System for Detecting Radicalization Trajectories in Large Heterogeneous Graphs Benjamin Hung*, Colorado State University; Anura Jayasumana, Colorado State University; Vidarshana Bandara, CA Technologies Land & Maritime Border 8:  Radiological and Nuclear Detection A 2-bits and 3-bits Metamaterial Absorber-based Compressive Reflector Antenna for High Sensing Capacity Imaging Ali Molaei*, NEU; Juan Heredia-Juesas, Northeastern University; Jose Martinez-Lorenzo, Northeastern University 64-Element Fast Neutron, Coded-Aperture Imager Christopher Griffith*, Naval Research Laboratory; Richard Woolf, Naval Research Laboratory; Bernard Phlips, Naval Research Laboratory Humidity-Induced Damage in Polyvinyl Toluene and Polystyrene Plastic Scintillator Eric Sword*, Oak Ridge National Laboratory Silverside Neutron Detector Performance Alison Forsyth*, Silverside Detectors; Timothy Teal, tim@sside.co; Andrew Inglis, Silverside Detectors 5:30

Conference Adjourns