Open Access. Powered by Scholars. Published by Universities.®
- Discipline
- Publication
- Publication Type
Articles 1 - 13 of 13
Full-Text Articles in Engineering
A Security Approach For The Example Sodium Fast Reactor, Christian X. Young, Robert S. Bean
A Security Approach For The Example Sodium Fast Reactor, Christian X. Young, Robert S. Bean
The Summer Undergraduate Research Fellowship (SURF) Symposium
Increases in the spread of nuclear technology and the rise of non-state terrorism in the modern era has proved the need for effective security approaches to new nuclear facilities. Many documents about security approaches for nuclear plants are non-public material, however, making it difficult to teach others about the basics of security design. To alleviate this issue, we used available texts in the security realm to design a security approach for the Generation IV International Forum’s Example Sodium Fast Reactor. Our approach utilized infrared, microwave, fiber optic, and other advanced technologies to provide security for the special nuclear material present. …
Measuring The Effectiveness Of Photoresponsive Nanocomposite Coatings On Aircraft Windshields To Mitigate Laser Intensity, Ryan S. Phillips, Hubert K. Bilan, Zachary X. Widel, Randal J. Demik, Samantha J. Brain, Matthew Moy, Charles Crowder, Stanley L. Harriman, James T. O'Malley Iii, Joseph E. Burlas, Steven F. Emmert, Jason J. Keleher
Measuring The Effectiveness Of Photoresponsive Nanocomposite Coatings On Aircraft Windshields To Mitigate Laser Intensity, Ryan S. Phillips, Hubert K. Bilan, Zachary X. Widel, Randal J. Demik, Samantha J. Brain, Matthew Moy, Charles Crowder, Stanley L. Harriman, James T. O'Malley Iii, Joseph E. Burlas, Steven F. Emmert, Jason J. Keleher
Journal of Aviation Technology and Engineering
In 2004, pilots reported 46 laser illumination events to the Federal Aviation Administration (FAA), with the number increasing to approximately 3,600 in 2011. Since that time, the number of reported laser incidents has ranged from 3,500 to 4,000. Previous studies indicate the potential for flight crewmember distraction from bright laser light being introduced to the cockpit. Compositional variations of the photoresponsive nanocomposite coatings were applied to an aircraft windscreen using a modified liquid dispersion/heating curing process. The attenuating effects of the deposited films on laser light intensity were evaluated using an optical power meter and the resultant laser intensity data …
Cloud Enabled Attack Vectors, Ryan Jasper
Cloud Enabled Attack Vectors, Ryan Jasper
Purdue Polytechnic Directed Projects
The purpose of this directed project and related research was to demonstrate and catalog a new attack vector that utilizes cloud managed infrastructure. Cloud computing is a recent trend that is creating significant hype in the IT sector. Being that cloud computing is a new theme in the computing world, there are many security concerns that remain unknown and unexplored. The product of this directed project provides a documented taxonomy of the new attack vector and how to mitigate risk from this kind of attack.
The new attack vector creates efficiencies throughout the lifecycle of an attack and greatly reduces …
A Multi-Criteria Methodology For Measuring The Resilience Of Transportation Assets And Prioritizing Security Investments, Michelle S. Dojutrek, Samuel Labi, J Eric Dietz
A Multi-Criteria Methodology For Measuring The Resilience Of Transportation Assets And Prioritizing Security Investments, Michelle S. Dojutrek, Samuel Labi, J Eric Dietz
International Institute for Infrastructure Resilience and Reconstruction (I3R2) Conference
Transportation project prioritization uses performance measures that are related to the transportation asset, its operations, and its environment. However, in the state of practice, evaluation does not consider directly the likelihood of natural or man-made threats, the infrastructure resilience, or the consequences of the infrastructure damage in the event that the threat occurs. Thus, during the prioritization of investments, assets of low security do not receive the due attention they deserve. In defining security as the lack of risk of damage from threats due to inherent structure or functional resilience, this paper is based on the premise that the inclusion …
Privacy-Preserving Assessment Of Location Data Trustworthiness, Chenyun Dai, Fang-Yu Rao, Gabriel Ghinita, Elisa Bertino
Privacy-Preserving Assessment Of Location Data Trustworthiness, Chenyun Dai, Fang-Yu Rao, Gabriel Ghinita, Elisa Bertino
Cyber Center Publications
Assessing the trustworthiness of location data corresponding to individuals is essential in several applications, such as forensic science and epidemic control. To obtain accurate and trustworthy location data, analysts must often gather and correlate information from several independent sources, e.g., physical observation, witness testimony, surveillance footage, etc. However, such information may be fraudulent, its accuracy may be low, and its vol-
ume may be insufficient to ensure highly trustworthy data. On the other hand, recent advancements in mobile computing and positioning systems, e.g., GPS-enabled cell phones, highway sensors, etc., bring new and effective technological means to track the location of …
Prox-Rbac: A Proximity-Based Spatially Aware Rbac, Michael Kirkpatrick, Maria Luisa Damiani, Elisa Bertino
Prox-Rbac: A Proximity-Based Spatially Aware Rbac, Michael Kirkpatrick, Maria Luisa Damiani, Elisa Bertino
Cyber Center Publications
As mobile computing devices are becoming increasingly dominant in enterprise and government organizations, the need for fine-grained access control in these environments continues to grow. Specifically, advanced forms of access control can be deployed to ensure authorized users can access sensitive resources only when in trusted locations. One technique that has been proposed is to augment role-based access control (RBAC) with spatial constraints. In such a system, an authorized user must be in a designated location in order to exercise the privileges associated with a role. In this work, we extend spatially aware RBAC systems by defining the notion of …
Beyond K-Anonymity: A Decision Theoretic Framework For Assessing Privacy Risk, Guy Lebanon, Monica Scannapieco, Mohamed Fouad, Elisa Bertino
Beyond K-Anonymity: A Decision Theoretic Framework For Assessing Privacy Risk, Guy Lebanon, Monica Scannapieco, Mohamed Fouad, Elisa Bertino
Cyber Center Publications
An important issue any organization or individual has to face when managing data containing sensitive information, is the risk that can be incurred when releasing such data. Even though data may be sanitized before being released, it is still possible for an adversary to reconstruct the original data using additional information thus resulting in privacy violations. To date, however, a systematic approach to quantify such risks is not available. In this paper we develop a framework, based on statistical decision theory, that assesses the relationship between the disclosed data and the resulting privacy risk. We model the problem of deciding …
Pattern Recognized Surveillance System, Purdue Ect Team
Pattern Recognized Surveillance System, Purdue Ect Team
ECT Fact Sheets
The ultimate objective is to create a complete-decision maker which allows us to detect the new state and initiate appropriate actions taking and analyzing all historical and current information based upon adaptive reasoning. Computers have the ability to extract information from multiple sources and identify and track patterns of activity that are inconsistent with "normal" operations.
Emerging Video Surveillance And Monitoring Technologies, Purdue Ect Team
Emerging Video Surveillance And Monitoring Technologies, Purdue Ect Team
ECT Fact Sheets
The traditional video surveillance applications have some limitations; 1) one unit per one person in one place, 2) the limited area for surveillance due to the location of cameras 3) increasing operating cost, 4) hard reductions in theft and claim rates over the long term. Recently, video technology has grown by leaps and bounds throughout the last few years due to the steep development of Information Technology (IT). The newest video surveillance technologies seem to be taking two aspects: 1) Digital Video Surveillance (DVS) of a turn toward digital video servers using Internet access, and 2) Multi-modal User Interface (MUI).
Air Ventilation Protection System For Building Security, Purdue Ect Team
Air Ventilation Protection System For Building Security, Purdue Ect Team
ECT Fact Sheets
The new technology to solve the limitation of conventional Collective protection equipment (CPE) system has been developed as "Combined ESP/ESF/PCO and microfibrous media CPE application". This concept of this new technology is the combination of the both systems; 1) Microfibrous Material Technology, and 2) Photocataytic Oxidation Technology.
New Access Control Technologies: Biometric Identification, Purdue Ect Team
New Access Control Technologies: Biometric Identification, Purdue Ect Team
ECT Fact Sheets
Biometrics are computerized methods of recognizing people based on physical or behavioral characteristics. The main biometric technologies include face recognition, fingerprint, hand geometry, iris, palm prints, signature and voice. Biometric technologies can work in two modes – authentication (one-to-one matching) and identification (one-to-many) matching. However, only three biometrics are capable of the latter – face, finger and iris.
Acoustic Wave Sensors, Purdue Ect Team
Acoustic Wave Sensors, Purdue Ect Team
ECT Fact Sheets
Modern office buildings are generally considered safe and healthful working environments. However, energy conservation measures have minimized the infiltration of outside air and contributed to the buildup of indoor air contaminants. Three products manufactured by Microsensor Systems Inc. are introduced: HAZMATCAD, CW Sentry Plus, MiniCAD MKII.
Infrared Gas Sensor, Purdue Ect Team
Infrared Gas Sensor, Purdue Ect Team
ECT Fact Sheets
In recent years, the rapid development of monitoring and detecting technology of indoor air quality have been observed. We have seen the two major streams of detection technology introduced so far: Acoustic wave sensor and Infrared gas sensor. The use of a gas monitoring system in the case of that dangerous levels of gases are detected, can help to prevent an explosion or can help to prevent worker injury or exposure to toxic gases.