2008 IEEE International Conference on Technologies for Homeland Security
(With Technical Assistance from the Department of Homeland Security, Science & Technology Directorate)

May 12 - 13, 2008
Westin Hotel, Waltham, MA
Greater Boston

The Overall Program Includes:

  • Reception on the evening of the first day of the Conference

  • 2 day Technical Conference including:

  • Wednesday Morning Plenary Keynote Session featuring government representatives and major private sector infrastructure operators

  • Invited Track Theme Papers by top scientists

  • Parallel Sessions of Contributed Technical Papers - BonCredit review site, is the right loan german's broker?

  • Poster Session

  • Business Panel – How to Do Business with DHS S&T and how to obtain seed funding to bring research to reality

  • Technology Exhibits

  • Networking Opportunities

Monday, May 12, 2008

7:00 – 8:00 AM Registration and Continental Breakfast
8:00 – 9:30 AM Welcome and Keynote Session
Session Chair: Lennart Long, ARA

Welcome Remarks:

Lennart Long – Chair Steering Committee

Amb. Henry Cooper – Conference Chair

Brig. Gen. (Ret) Philip Stowell – Technical Program Chair

Kevin M. Burke, Secretary of Public Safety and Security, Commonwealth of Massachusetts

Keynote Talk:

Dr. John Marburger –  Director, Office of Science & Technology Policy, Science Advisor to the President

“Nuclear Defense Research & Development – A Road Map for Interagency Coordination”


9:30 – 10:00 AM Networking and Coffee Break
10:00 – 12:00 Noon Plenary Session


Robert Hooks – Director of Transition, U.S. Department of Homeland Security, Science & Technology Directorate

“Key R&D Focus Areas for the DHS S&T Directorate”

Dr. Starnes Walker – Director of Research, U.S. Department of Homeland Security


12:00 – 1:00 PM Lunch
1:00 – 3:00 PM Track: CBRNE Transport
Session 1: Nuclear and X-ray Detection Technology
Track Chair: Dr. Lyle Malotky, TSA
Session Chair: Bill Baukus, AS & E


All-laser-driven, quasi-monoenergetic MeV-energy X-ray source for detection of SNM

Sudeep Banerjee, Nathan Powers, Vidya Ramanathan, Nathaniel Cunningham, Nate Chandler-Smith, Shouyuan Chen, Bradley Shadwick and Donald Umstadter, University of Nebraska, Department of Physics and Astronomy

Randy Vane, Dave Schultz, Jim Beene, and Sara Pozzi, Oak Ridge National Laboratory


Megavolt CT for Air Cargo Container Inspection

J. Bendahan, GE Homeland Protection, Inc.


Energy Calibration Algorithms for the Multiple Isotope Material Basis Set (MIMBS) Isotope Identification Method

Robert J. Estep, Benjamin A. Sapp, Los Alamos National Laboratory


Exploring RF Transmissions From Discharge-Based Micromachined Radiation Detectors

Christine K. Eun and Yogesh B. Gianchandani, Department of Electrical Engineering and Computer Science, University of Michigan


Detectors for Radiological Source Localization in Multi-Lane Traffic Environments

Sean M. Robinson, Robert C. Runkle, Kevin K. Anderson, David M. Pfund, Ken D. Jarman, James S. Chung, Pacific Northwest National Laboratory


Demonstration of the RadTrac Source Detection and Tracking System

R.B. Vilim and R. Klann, Argonne National Laboratories


1:00 – 3:00 PM Track: Risk Assessment & Response
Session 1 Intelligence and Risk Assessment
Track Chair: Joe Smith, ARA
Session Chair: Nancy Renfro, ARA


A Dynamic Decision Support System for Addressing Terrorist Transfer Threats

Richard Adler, Jeff Fuller, Decision Path, Inc.


Multi-Attribute Networked Terrorism Identification System (MANTIS)

Stanton S. Coerr, U.S. Marines; student at Naval War College


DS CDMA Radio Transmissions Detection

Ryszard J. KATULSKI, Jacek STEFANSKI, Ryszard STUDANSKI, Radosław WAS, Gdansk University of Technology


Collective Inferencing for Counterintelligence and Integrated Risk Assessment

Jesus Mena, InferX Corporation


Next Generation Data Fusion Open Source Intelligence (Osint) System Based On Mpeg7

Mark P. Pfeiffer, SAIL LABS Technology AG


Discovery, Analysis and Monitoring of Hidden Social Networks and Their Evolution

Mark Goldberg, Mykola Hayvanovich, Apirak Hoonlor, Stephen Kelley, Malik Magdon-Ismail, Konstantin Mertsalov, Boleslaw Szymanski, and William Wallace, Department of Computer Science, Rensselaer Polytechnic Institute


1:00 – 3:00 PM Track: Infrastructure
Session 1 Perimeter Surveillance, Border Crossing Detection & Intrusion Detection
Track Chair: Craig Coy L-3
Session Chair: Dr. Karen Panetta, Tufts University


Design Considerations for Intrusion Detection Wide Area Surveillance Radars for Perimeters and Borders

Walker Butler, ICx Radar Systems


Perimeter Security on Detecting Acoustic Signature of Approaching Vehicle Using Nonlinear Neural Computation

Bing Lu, Alireza Dibazar, Theodore W. Berger, University of Southern California


Airport Perimeter Security: Where we've been, Where we are, and Where we're going

Ann S. Barry and David S. Mazel, Technology Service Corporation


New Concepts in Intrusion Detection

Norman J. Meyerhoff


A novel 3D Seismic Sensor for Virtual Border Application

Sever Mican, Spider Technologies Security, Ltd.


Protecting Military Assets from Approaching Humans or Vehicle Using Vibration Sensors

Hyung O. Park, Alireza Dibazar, Ali Yousefi and Theodore W. Berger, University of Southern California


1:00 – 3:00 PM Track: Cyber & Software
Session 1 Software Security Legacy Systems
Track Chair: Steve Rakitin, SW Quality Consulting
Session Chair: Gil Cooke


Invited Talk

Joe Jarzombek, Department of Homeland Security


Report on the Security of Open Source Software

David Maxwell, Coverity, Inc.


Making Government IT Security Measurable: Cyberterrorism, CVEs, OVAL, CWE and why you must care!

Gary S. Miliefsky, NetClarity, Inc


A Plugn’play Platform Independent Solution That Eliminates Unauthorized Access Without the Use of Passwords or Encryption Keys

Salvatore (JT) Tuzzo, 4thDT™ Security


3:00 – 3:30 PM Networking and Coffee Break
3:00 – 5:00 Poster Session I
Poster Session Chair: Fausto Molinet, Matrix Internationale


Challenges to Event Formalization for Information Extraction

Antonio Badia, Intelligent Information Processing, Inc.


Evaluating technology investments via outcome measures vs. ROI's

John Bischoff, Thomas A. Mazzuchi, Shahram Sarkani, Paul Wormeli, School of Engineering & Applied Science, George Washington University, Integrated Justice Information Systems Institute


Intelligent Searching using Sentence Context

Alan Chickinsky, Northrop Grumman IT/TASC


Emergency Planning and Response/Recovery

Raheleh B. Dilmaghani and Ramesh R. Rao, University of California


The Anthrax Smoke Detector (ASD) as an inexpensive front end monitor

Amir Ettehadieh, Universal Detection Technology


Enhancing Cargo Container Security during Transportation: A Mesh Networking Based Approach

Su Jin Jim, Guofeng Deng, Sandeep K.S. Gupta, School of Cupting and Informatics, Arizona State University; Mary Murphy-Hoye, Intel Corp.


Hyperspectral Imaging for IED and Chemical Biological Defense

Michele Hinnrichs, Pacific Advanced Technology


Critical Infrastructure Protection (CIP) Governance and Assurance

Gregory B. Hutchins, Edward G. Perkins, Quality Plus Engineering


Achieving Unit Safety in the WebPuff Emergency Management Information System

Karen Legrand, IEM


On the relationship between forecast and detection performance: An application to Biosurveillance

Thomas Lotze, Galit Shmueli, Applied Mathematics and Scientific Computation Program, University of Maryland


Mitigating the Threat of Urban Radiological Contamination

Rick Demmer, Karen Wright, Idaho National Laboratory

Chris Norton, Randy Martin, Environmental Alternatives


Improving Watchlist Screening by Combining Evidence from Multiple Search Algorithms

Keith J. Miller and Mark Arehart, MITRE Corporation


Terahertz Standoff Detection of Homemade Explosives and Toxic Chemicals

Stephen L. Ostrow, SC&A, Inc; Richard Skibo, Princeton Nanotechnology Systems, Inc.


Bioevent Detection via Fusion of Disparate Data

Paul Picciano, Aptima, Inc.


Examining Containers for Chemical, Biological, and High Explosive Threats

Christina Rudzinski, MIT Lincoln Laboratory


Information Access and Distribution in a Dynamic Incident Response Environment

John Shockro, Matthew Shaw; Raytheon Network Centric Systems


Rapid Optimisation of Cell-Temperature and Dispersion Field Strength Interactions In Differential Mobility Spectrometry For The Detection Of Putrescine and Cadaverine

C. L. P Thomas, Loughborough University, UK


Using Two-Way Datacasting to Deliver Real-Time Public Safety Information

Scott Valcourt, Pushpa Datla, Kent Chamberlin, Benjamin McMahon, University of New Hampshire


Developing Complex Network Model and Simulation Tool for Disaster Failure Front Prediction

Haibo Wang, Texas A & M International University

Bahram Alidaee, Mustafa Altinakar, University of Mississippi


Performance analysis of highly available ad hoc Surveillance Networks Based on Dropped Units

Christian M. Wietfeld, Andreas Wolff, Sebastian Subik, Technische Universitat, Germany


A New Concept of Airport Security Screening

Yesna O. Yildiz, Douglas Q. Abraham, Analogic Corporation; Sos Agaian, University of Texas; Karen Panetta, Tufts University


3:30 – 5:30 PM Track: CBRNE Transport
Session 2 Detection and Identification of Special Nuclear Materials (SNM)
Track Chair: Dr. Lyle Malotky, TSA
Session 2 Chair: Dr. Ted Kochanski, Univ. of New Hampshire


A Direction Sensitive Neutron Detector

Steven Ahlen, Boston University


Muon Tomography for the Detection of Nuclear and Radioactive Substances in Containers

M. Benettoni, G. Bonomi, P. Calvini, P. Checchia, E. Conti, A. Dainese, D. Fabris, F. Gasparini, U. Gasparini, F. Gonella, M. Lunardon, A.T. Meneguzzo, M. Morando, S. Moretto, G. Nebbia, M. Pegoraro, S. Pesente, P. Ronchese, S. Squarcia, E. Torassa, S. Vanini, G. Viesti, A. Zenoni, G. Zumerle, Dipartimento di Ingegneria Meccanica, Università di Brescia, Italy


Prospects of Neutronic Technology for Multi-threat Detection

Philippe Le Tourneur, EADS Sodern


A Compton Telescope for Remote Location and Identification of Radioactive Material

Jason S. Legere, Justin Baker, Ulisse Bravar, John R. Macri, James M. Ryan, Space Science Center, University of New Hampshire


Recent Progress from LLNL in Detecting Weapons and Other Contraband with Nuclear Photo-Absorption

Jason Pruet, C. Barty, C. Hagmann, F. Hartemann, M. Johnson and D. McNabb, Lawrence Livermore National Laboratory


Development of a Real-Time Fast Neutron Imaging Telescope (FNIT) for the Detection of Special Nuclear Material (SNM)

Richard S. Woolf, Ulisse Bravar, Jason S. Legere, John R. Macri, James M. Ryan, Procheta Mallik, Benoit Pirard , UNH Space Science Center


3:30 – 5:30 PM Track: CBRNE Transport
Session 2 Mass Spectroscopy Optical & Other Chemical Core Detection and Identification Technology
Track Chair: Dr. Lyle Malotky, TSA
Session 2 Chair: Dr. Ted Kochanski, Univ. of New Hampshire


Ion Mobility Spectrometry for Detection of Contraband in Shipping Containers without Impeding Movement of Containers Through Ports

Charles S. (Steve) Harden and Joseph C. Harden, ConSearch, LLC


Functionalized Sorbent Membranes for use with Ion Mobility Spectrometry

Bernadette Higgins, Duane Simonson, R. Andrew McGill, Viet Nguyen, Jennifer Stepnowski, Rekha Pai, Naval Research Laboratory; Stanley Stepnowski, Matt Rake, NOVA Research, Inc.


Miniaturized Ion Mobility-Mass Spectrometry with Secondary Electrospray Ionization (SESI) for Explosive and Chemical Warfare Agent Detection

Christina Crawford, Prabha Dwivedi, Maggie Tam, William F. Siems, Andrew Goodin and Herbert H. Hill, Jr., Department of Chemistry Washington State University


An Electronic Nose for Detecting Hazardous Chemicals and Explosives

Pradeep U. Kurup, University of Massachusetts Lowell


Microfabricated Gas Chromatograph for Trace Analysis

Rekha S. Pai, David R. Mott, R. Andrew McGill, Bernadette A. Higgins, and Duane L. Simonson; Naval Research Laboratory; Jennifer L. Stepnowski, NOVA Research, Inc.


External Second-Gate Fourier Transform Ion Mobility Spectrometry: A handheld Spectrometer with Chip-based Data Acquisition and Control

Edward E. Tarver, ETARAN Instruments, Inc.


3:30 – 5:30 PM Track: Risk Assessment & Response
Session 2 Information Sharing
Track Chair: Joe Smith, ARA
Session Chair Dr. Joe Marr


Network Based Information Sharing Between Emergency Operations Centers

Richard Chipman, Roger Wuerfel, Science Applications International Corporation


System Integration and Information sharing for the Emergency Response Systems of Beijing 2008 Olympic Games

Zhang (Jack) Ji, Beijing Harmony Technology Company


Hybrid Multidimensional Relational and Link Analytical Knowledge Discovery for Law Enforcement

CA Joslyn, D Gillen, J Burke, and T Critchlow, Pacific Northwest National Laboratory

R Fernandes, M Damante, Lawrence Livermore National Laboratory


Developing a Web-Based Mapping Application for Public Access to Emergency Management Information Using Open Source Tools

John M. Morgan, III, Towson University


Secure Homeland Analysis and Reporting Environment (SHARE)

Randy Smith, Brandon Dixon, David Brown, Allen Parrish, The University of Alabama

Maury Mitchell, Alabama Criminal Justice Information Center


State of the Art Information Sharing Initiative Demonstrates Multi-Vendor RMS Interoperability among 25 Law Enforcement Agencies

Peter J. Rosamilia, Science Applications International Corporation (SAIC)


3:30 – 5:30 PM Track: Cyber & Software
Session 2 Software Security Awareness and Training
Track Chair: Steve Rakitin, SW Quality Consulting
Session Chair: John Conrad, Textron Systems


How to tackle security issues in large existing/legacy systems while maintaining development priorities

Djenana Campara and Nikolai Mansourov, KDM Analytics


The Insider Threat in the Software Development Life Cycle

Karen Mercedes Goertzel, Booz Allen Hamilton


The Software Security Landscape

Robert A. Martin, Mitre Corporation; Sean Barnum, Cigital, Inc.


A Self-Awareness Strategy Using System Level Diagnosis In CMP/IP Based Architectures

B. Rucinska, T. Kochanski, A. Rucinski and H. Spaanenburg, University of New Hampshire


Jamming Steganography using Steganography: Prevention of Data Exfiltration using Steganographic Techniques

Keith D. Bertolino and Ravi Sundaram, Northeastern University


Systematic Scanning for Malicious Source Code

S. Tucker Taft, SofCheck, Inc.


6:00 – 9:00 PM: Welcome Reception and Poster Session II
Poster Session Chair: Fausto Molinet, Matrix Internationale


Software Engineering

Kristen Baldwin Office of the Under Secretary of Defense for Acquisition, Technology and Logistics (OUSD (AT&L))


Emergency Response Planning and Training through Interactive Simulation and Visualization with Decision Support

Bruce Donald Campbell, Huseyin Onur Mete, Thomas A. Furness, Suzanne Weghorst, Zelda B. Zabinsky, Industrial Engineering HITLab, University of Washington


Integrating Log Analysis Into Your Incident Response Practice

Anton Chuvakin, LogLogic, Inc.


Next Generation Disaster Response: Automated Patient Triage, Monitoring, and Tracking

Tia Gao, Chris Pesto, Michael VanDaniker, JeongGil Ko, Yin Chen, Jong Hyun Lim, Taesung Kim, Andreas Terzis, Richard Dutton, Andrew Watt, Jason Tracey, Philip Anderson, John Hopkins University


Toward a Four-Dimensional, Real-Time, Information-Sharing and Visualization System

Jonathan Howard, University of Maryland, Center for Advanced Transportation Technology Laboratory


Crime Information Extraction from Police and Witness Narrative Reports

Chih Hao Ku, Alicia Iriberi and Gondy Leroy, School of Information Systems and Technology Claremont Graduate University


Optical Detection of Explosive Materials: Imaging and Pattern Recognition Techniques

Maxime G. Lemaitre, Nicolas J. Dedual, Jose C. Principe, and Rolf E. Hummel, Department of Materials Science & Engineering, University of Florida


Security in Ocean Container Transport Through the Use of RFID Technologies

Dimitrios V. Lyridis, Panagiotis S. Tsilingiris, Harilaos N. Psaraftis, Laboratory for Marine Transport - School of Naval Architecture & Marine Engineering, National Technical University of Athens, Greece


Novel Trace Chemical Detection Technologies for Homeland Security

Amy E. Staubs and Matthew S. Matyjaszczyk, Tyco/Scott Health and Safety, A Division of Tyco Safety Products


Line Scanner for Biometric Applications

S. Mil'shtein, J. Palma, C. Liessner, M. Baier, A. Pillai, A. Shendye, Advanced Electronic Technology Center, ECE Dept. UMASS Lowell


Wide Range Compact Surface Enhanced Raman Scattering (SERS) Sensors for Ubiquitous CBRNE Detection Deployment

Stephen L. Ostrow, Mikael Lindstam, Richard Skibo, SC&A, Inc


From Desktop to Field: Deploying Visual Incident Analysis for Law Enforcement

William A. Pike, Richard May, Bob Baddeley, Joe Bruce, Christopher Janneck, Deborah Payne, Rick Riensche and Katarina Younkin, Pacific Northwest National Laboratory

William Pottenger, Rutgers University


A Review of Human Signatures in Urban Environments Using Seismic and Acoustic Methods

James M. Sabatier and Alexander Ekimov, The University of Mississippi, National Center for Physical Acoustics


CORRIDOR - Comprehensive Risk Reduction Indicator Data Operations Reporter

Gordon Skelton, Jackson State University, Joy Parikh, Radiance Technologies, Inc.


Seaport and Container Security – Industry-Centric Solutions

Douglas T. Thomson, QinetiQ North America


Inter-Lan Socket Connection Manager (ILSCM)

Jim Valdivia, Southeastern Computer Consultants, Inc. (SCCI)


Monitoring/Verification using DMS: TATP Example

Manuel Manard, Dept. of Homeland Security; Stephan Weeks, Kevin Kyle, U.S. Department of Energy Special Technologies Laboratory (Operated by National Security Technologies, LLC)


RadSrc: Calculating Gamma-ray Signatures from Aged Mixtures of Heavy Nuclides

Douglas Wright, Tom Gosnell, Jeff Gronberg, Larry Hiller, Lawrence Livermore National Laboratory


Intelligent Fence Intrusion Detection System: Detection of Intentional Fence Breaching and Recognition of Fence Climbing

Ali Yousefi, Alireza A. Dibazar, and Theodore Berger, University of Southern California

Tuesday, May 13, 2008

7:00 – 8:00 AM Registration and Continental Breakfast
8:00 – 9:30 AM Business Panel
Honorary Panel Dr. Thomas A. Cellucci, Director of Technology Commercialization
Chair and Moderator: DHS, Science & Technology Directorate
Panel Organizer: Karen Krause, PSSG, LLC


To help the innovation community and those investing in emerging technologies better understand the process of technology communication, the business panel will feature key catalysts in the process of technology commercialization: federal government, end-users, venture capitalists, state economic development agencies, and technology standard setting bodies. More details, click here.



Dr. Thomas Cellucci, Dir. Of Technology Commercialization, DHS, S&T Directorate

Overview of DHS S&T, DHS S&T Investment Priority Areas, and How DHS S&T Fosters Technology Commercialization in the Homeland Security Market

Dennis Treece, Corporate Security Officer for Massport, Dir. of the Massport Center for Security Excellence

Overview of Massport as a Technology Proving Ground for the Refinement and Adoption of Aviation, Port, and Surface Transportation Security and Public Safety Technologies; Discussion on How Massport Establishes Requirements for the Purchase of Homeland Security Technologies


Overview of In-Q-Tel’s Investment Priority Areas, Investment Process, and How In-Q-Tel Fosters Technology Commercialization in the Homeland Security Market

Massachusetts Economic Development Agency

Overview of the Commonwealth of Massachusetts and the Economic Development Initiatives Available to Technology Innovation Community to Foster Homeland Security Technology Commercialization

IEEE Standards Committee

Overview of How IEEE is Helping to Establish Standards for Security Technologies

9:30 – 10:00 AM Networking and Coffee Break
9:30 – 11:30 AM Poster Session III
Poster Session Chair: Fausto Molinet, Matrix Internationale


Point Threat Detection Untilizing a Dynamically Distributed Sensor Network

Osmo Anttalainen, Janne Pitkanen, Environics Oy of Finland; Gary Carriveau, Environics Oy


Information Sharing Project

Peter Cosgrove, NLECTC-SE (National Law Enforcement and Corrections Technology Center)


Identifying Technology Gaps in HAZMAT Operations

Jill L. Drury, The MITRE Corporation; Jonathan Arambula, Sarah Kuhn, Mark Micire, Holly A. Yanco, The University of Mass Lowell


A Novel Risk Assessment System for Port State Control Inspection

Zhong Gao, Laiman Po, Hao Dong, Xiaopei Wei, Mei Qin and Mengjue Liu, Collegel of Telecommunications and Information Engineering, Nanjing University of Posts and Telecommunications


A Case Study on Data Interoperability for License Plate Recognition

Gregory Harman, DropFire, Inc.


Developing Critical/Dynamical Area Security with Dual-Surveillance/Radial-Ring Configured Networks

Li-Yen Hsu, Department of Aviation Management, China Institute of Technology


The Use of ID Reader-Authenticators in Secure Access Control and Credentialing

Theodore Kuklinski, and Bruce Monk, AssureTec Systems


H-Trust: A Robust and Lightweight Group Reputation System for Securing Cyber-Infrastructure

Huanyu Zhao and Xiaolin Li, Oklahoma State University


Situational Awareness and Visual Analytics for Emergency Response and Training

Ross Maciejewsi, SungYe Kim, Deen King-Smith, Karl Ostmo, Nick Klosterman, Aravind K. Mikkilineni, David S. Ebert, Edward J. Delp, Timothy F. Collins, Purdue University School of Electrical and Computer Engineering


Highest Performance Explosives Trace Portal using Mass Spectrometry

Chris J. McBee, Jack A. Syage, Karl A. Hanold, Syagen Technology, Inc.


Incident Scene Mobility Analysis

Klara Nahrstedt, Ying Huang, Wenbo He, University of Illinois at Urbana-Champaign

Whay C. Lee, Motorola Labs


Recovery of the Periorbital Signal and its Application in the Detection of Deceit

D. Shastri, P. Tsiamyrtzis, and I. Pavlidis, University of Houston


Raising the Bar for Hardware Security - The Need for Physical Layer Hardware Security

Craig Rawlings, Kilopass Technology Corporation


Particle/Vapor Explosives Sampler/Concentrator for Detecting the Full Range of Explosives Threats

Alan K. Junor, Paul T. Chaney, Jack A. Syage, Syagen Technology, Inc.


Systems Engineering Solution for Technology Deployment to Combat Complex Threat Scenarios in the Homeland

Michael Tierney, Samar K. Guharay, David Colella, Garry Jacyna, Philip Barry, Matthew, Koehler, Brian Tivnan, Tobin Bergen-Hill, The MITRE Corporation


Energy-Efficient Target Monitoring Using Base-Station Relocation in Wireless Sensor Networks

Deepti Jain and Vinod M. Vokkarane, University of Massachusetts


Seeking Shelter: Towards a Multi-Agent Based Simulation of a School Lockdown Scenario

Lawrence D. Welch, Stephen Ekwaro-Osire, Texas Tech University


Cosmic-Ray Background Generator (CRY) for Monte Carlo Transport Codes

Douglas Wright, Chris Hagmann, David Lange, Lawrence Livermore National Laboratory


Integrated Knowledge Management System (Ikms)

Tarek Zaki, Noblis


10:00 – 12:00 Noon Track: CBRNE Transport
Session 3: Chemical & Biological Agent Detection and Identification
Track Chair: Dr. Lyle Malotky, TSA
Session Chair: Ed Tarver, ETARAN Instruments, Inc.


Highly Sensitive Organic Sensors for Rapid and Reversible Toxic Chemical Vapor Detection

Ariya Akthakul, Natalia Maklakov, Joel White, CogniScent, Inc.


Sensor Alert Verification for Incident Operational Response (SAVIOR)

Richard Czerwinski, George Carayannopoulos, Michael Switkes and Robert Ponte

Lincoln Laboratory, Massachusetts Institute of Technology


The Totally Optical Vapor Analyzer (TOVA) Open Path Chemical Sensor for Facility Protection

S. Keith Holland and Gabriel Laufer, Avir Sensors


Detecting infectious and biowarfare agents on aircraft - Is it feasible?

Grace M. Hwang, The Mitre Corporation


Compact, Spark-Induced Breakdown Spectroscopy-Based Trigger for Hazardous Bioaerosol Detection

D. Sonnenfroh, K. Galbally-Kinney, M. Hinds, D. Paulsen, and R. Wainner, Physical Sciences, Inc., A. Bauer, Dept. of Chemistry/Denver Research Institute


Fast and Accurate Chemical/Biological Agent Detector based on Mass Spectrometry

Matthew D. Evans, Sheng-Suan (Victor) Cai, Jianwei Li, Jack A. Syage, Syagen Technology, Inc.

Todd Griffin, Paul Rauch, William Harris, General Dynamics


10:00 – Noon Track: Risk Assessment & Response
Session 3 Incident Response & Operational Situational Awareness
Track Chair: Joe Smith ARA
Session Chair: Captain Howard Mintz, Newton Police Department


In Situ Warning System for Emergency Responders to Provide Building Structural Health

Dr. Daniel Bock, Dr. Keehoon Kim, Physical Optics Corporation


Emergency Data Awareness: Sharing Under Stress

Larry Budnick, Raytheon Network Centric Systems


Facilitating Communication for First Responders Using Dynamic Distributed Constraint Optimization

Alan Kaplan, Michael Mitkus, James Sim, Drakontas, Robert Lass, and William Relgi, Drexel University


Unified Incident Command and Decision Support (UICDS): A Department of Homeland Security Initiative in Information Sharing

James W. Morentz, Science Applications International Corporation


Advanced 3-D Locator Indoor Positioning for Firefighters and Other First Responders

Steve Rounds, Sr., L-3 Communications/Interstate Electronics Corporation


Interoperable Role-Based Single Sing-On-Access to Distributed Public Authority Information Systems

Christian M. Wietfeld, Kai Daniel and Thank Tran, Technische Universitat, Germany


10:00 AM  – 12 Noon Track: Infrastructure
Session 3 Tunnel and Acoustic Detection Technology
Track Chair: Craig Coy, L-3
Session Chair: Brid Gen. (Ret) Phil Stowell, ARA


Fiber-Optic Sensor System Detection, Classification, and Localization (FOSS-DCL) Program for In-Ground Surveillance Applications

Phillip L. Ainsleigh, Fletcher A. Blackmon, Naval Undersea Warfare Center Division, Newport Sensors & Sonar Systems Dept.


Border Crossing Detection and Tracking through Localized Image Processing

Aaron Greenblatt, Dr. Karen Panetta, Tufts University, Dr. Sos Agaian, University of Texas


Real-Time System for Stand-Off Measurement of Structural Stability

Wayne C. Hasse, Philippe E. Monin, Malcolm S. MacGregor, Zachary S. Haase, Richard F. Young

Summitt Safety, Inc.


An investigation into the efficacy of keystroke analysis for perimeter defense and facility access

Christopher S. Leberknight, George R. Widmeyer, and Michael L. Recce,

New Jersey Institute of Technology


Overview of the Operation for the Proposed Locomotive Worker Identification with Cameras

Sidney E. Martin, Transportation Security Logistics Northeast Maritime Institute


A Study on the Passive Detection of Clandestine Tunnels

James M. Sabatier and Ghaith M. Matalkah, The University of Mississippi,

National Center for Physical Acoustics


10:00 – Noon Track: Cyber & Software
Session 3 Attack Resistant Secure Software Development
Track Chair: Steve Rakitin, SW Quality Consulting
Session Chair: John Conrad, Textron Systems


Managing Information Sharing and Technology Interoperability Performance When Information Security is Paramount The Value of Security in Web Services Environments

Diane Hanf, Kevin Buck, Mike Brenner, Prasanta Das, Ron Albuquerque, Ed Kenney, The MITRE Corporation


Integrating Static Analysis Into a Secure Software Development Process

David Kleidermacher, Green Hills Software, Inc.


Virtual Cyber-Security Testing Capability for Large Scale Distributed Information Infrastructure Protection

Perry Pederson, Priority 5; David Lee, Guoqiang Shu, Dongluo Chen, Zhijun Liu, Na Li, Lifeng Sang, Ohio State University


Creating the Secure Software Testing Target List

Robert A. Martin, Mitre Corporation, Sean Barnum, Cigital, Inc.


Beyond Penetration Testing

Kenneth R. van Wyk, KRvW Associates, LLC


Internet Attack Traceback - Cross-validation and Pebble Tracing

Fang Yu and David Lee, Ohio State University


12:00 – 1:00 PM Lunch
1:00 – 3:00 PM Track: CBRNE Transport
Session 4: High Explosives & Explosive Devices Detection (ED) Technology
Track Chair: Dr. Lyle Malotky, TSA
Session Chair: Joe Smith, ARA


Standoff LIBS and Raman Measurements of Energetic Materials using a Single UV Excitation Laser

Edwin L. Dottery, Robert D. Waterbury, Jeremy Rose, Alakai, Inc.; Avishekh Pal, Dennis K. Killinger, University of South Florida


Vapor Generator for the Calibration and Test of Explosive Detectors

Donald Hayes, Bogdan Antohe, David Taylor, David Wallace, Michael Grove & Mark Christison, MicroFab Technologies, Inc


Detection of Explosives using nanofibrous membranes

Abhishek Kumar, Ignaty Leshchiner, Subhalakshmi Nagarajan, Ramaswamy Nagarajan and Jayant Kumar, Center of Advanced Materials University of Massachusetts, Lowell


Application of Laser Ion Mobility Spectrometry (LIMS) to Explosive Detection

J. Spannhake, C. Oberhuttinger, H. Oberpriller, M. Kessler, J. Gobel, U. Martin, G. Muller, EADS Innovation Works


Rapiscan Systems - A Neutron Interrogation Based Vehicle Borne IED Detection System for Checkpoint Security

D. Strellis, M. Elsalim, T. Shaw, T. Gozani, Rapiscan Systems Neutronics and Advanced Technologies Corporation


Detection of Buried IEDs Using Nonlinear Time Reversal Acoustic Techniques

Alexander Sutin and Hady R. Salloum, Maritime Systems Stevens Institute of Technology


1:00 – 3:00 PM Track: Risk Assessment & Response
Session 4 Operational Interoperability and Field Communications Technology
Track Chair: Joe Smith, ARA
Session Chair: Don Bliss NI2


The Role For PSXG In An Advanced Communications Architecture For Disaster And Emergency Response

Brad Bernthal and Nancy Jesuale, Colorado Law School


Satellite Mutual Aid Radio Talkgroups: A New Tool Enabling Communications Interoperability

Jim Corry and Austin Comerton, Mobile Satellite Ventures


SFINKS: Secure Focused Information, News, and Knowledge Sharing

Tatyana Ryutov; Tatiana Kichkaylo; Robert Neches, Michael Orosz, USC Information Sciences Institute


A Software Based Implementation of an APCO Project 25 Compliant Packet Data Transmitter

Eric R. Ramsey, W. Thomas Miller, III, and Andrew L. Kun, University of New Hampshire


Coordinating Department of Defense Global Information Grid Initiative to Department of Transportation Next Generation 911 Initiative

Michael Schmitt, Idaho National Laboratory


Information Sharing for Emergency Response

Gurminder Singh, Naval Postgraduate School


1:00 – 3:00 PM Track: Infrastructure
Session 4 Access Screening Document Authentication and Biometrics
Track Chair: Craig Coy, L-3
Session Chair: Dr. Andrzej Rucinski, Univ. of New Hampshire


Eagle-Eyes: A System for Iris Recognition at a Distance

Faisal Bashir, Pablo Casaverde, David Usher, Marc Friedman, Retica Systems, Inc.


Advances in X-ray Backscatter Imaging Systems for Personnel Screening

Bill Baukus, American Science and Engineering, Inc.


Real Time Text and Language Independent Speaker Identification with a Reconfigurable Wireless Network of Acoustic Sensors

Maurizio Bocca and Heikki N. Koivo, Control Engineering Laboratory, Helsinki University of Technology (TKK)


Exploiting Random Patterns of Optically Readable Materials to Ensure Authentication of Documents, Media and Substrates

Jay Fraser, Tracer Detection Technology Corp.


Vehicle and Visitor Screening

Tom Markham, Honeywell Labs


Fingerprint Recognition Algorithms for Full Partial and Fingerprints

S. Mil'shtein, A. Pillai, A. Shendye, C. Liessner, M. Baier, Advanced Electronic Technology Center, ECE Dept. UMASS Lowell


1:00 – 3:00 PM Track: Cyber & Software
Session 4 Network Security Focus on SCADAs
Track Chair: Steve Rakitin, SW Quality Consulting
Session Chair: Dr. Jerry Larocque, MIT Lincoln Laboratory


Space Division Multiple Access Scheme for Wireless Sensor Networks

Abdallah El Moutia & Kia Makki , Florida International University


Critical Infrastructure and Control Systems Security: An Interdisciplinary Approach

Ryan Ellis, University of California, San Diego


Control System Cyber Incident Reporting Protocol

Simon Hennin, Raytheon Network Centric Systems


Suite B Cryptography for Securing the Critical Infrastructure

Robert R. Jueneman, SPYRUS, Inc.


Idaho National Laboratory Supervisory Control and Data Acquisition Intrusion Detection System (SCADA IDS)

Michael Milvich and Jared Verba, Idaho National Laboratory


Dual-Homed Fault-Tolerant Routing in Wireless Sensor Networks

Nidhi Jain, Vinod M. Vokkarane, and Jianping Wang, University of Massachusetts


3:00 – 3:30 PM Networking and Coffee Break
3:00 – 5:00 Poster Session IV
Poster Session Chair: Fausto Molinet, matrix Internationale


Using Generative Analysis for Homeland Security: Modeling the Possibilities and the Probabilities

Philip Barry, Matthew Koehler, Garry Jacyna, Mitre Corporation


Pedestrian-based Radiation Mapping for Cargo Ship Survey

Jim Castelaz , Stanford University, Dept. of Electrical Engineering; Lance McLean, Tim Ashenfelter, Remote Sensing Lab – Andrews, National Security Technologies (NSTec)


Methodology and Modeling to Assess Long Dwell In-Transit Radiation Systems for Cargo Ships

Marie-Anne Descalle, David Campbell, James Hall, Robert Lanier, Jason Pruet, Padmini Sokkappa, Richard Walker, Lawrence Livermore National Laboratory


Device independent information sharing during incident response

David Goughnour, Robert T. Durbin, Jr., ElanTech, Inc.


Miniaturized Hybrid Sensor for Multiple Threats Detection

S. K. Guharay, A. Mariano, C. Bradshaw, The Mitre Corporation


Gamma Vector Camera: A Gamma Ray and Neutron Directional Detector

Munther M. Hindi, Lee Klynn, and Howard Demroff, Lockheed Martin Advanced Technology Center


Neutron Imaging Camera

Georgia DeNolfo, Sam Floyd, Stanley Hunter, John Krizmanic, Jason Link, Seunghee Son;

NASA/Goddard Space Flight Center, Noel Guardala, Marlene Skopec, Bob Stark, NSWC/Carderock Division


New England Center for Emergency Preparedness

Stan J. Kuzia Jr., Global Emergency Resources LLC


Standoff Technology Demonstration Program (SOTDP)

Nick Lombardo, Greg Holter, Pacific Northwest National Laboratory

Joe Foster, Department of Homeland Security


Second Life: Limits of creativity or cyber threat

Sujoyini Mandal and Ee-Peng Lim, International Center for Political Violence and Terrorism Research S. Rajaratnam School for International Studies Nanyang Technological University, China


Directional Radiation Detection Technology Development at the DOE Remote Sensing Laboratory

Lance McLean, Remote Sensing Laboratory - Andrews


Automatic Detection of Potential Threat Objects in X-ray Luggage Scan Images

Shahan Nercessian, Karen Panetta, Tufts University; Sos Agaian, University of Texas


Model Program for Public Water System Homeland Security

Paul J. Pearce, Nova Biologicals, Inc


Rapiscan Systems - SNM Detection by Differential Die Away Analysis

T. Shaw, D. Strellis, J. Stevenson, D. Keeley, M. Elsalim, T. Gozani

Rapiscan Systems Neutronics and Advanced Technologies Corporation


Infrastructure Security via Randomization: A Game Theoretic Model and its Application at the Los Angeles International Airport

James Pita, Manish Jain, Janusz Marecki, Fernando Ordóñez, Christopher Portway, Milind Tambe, Craig Western, Praveen Paruchuri, Sarit Kraus, University of Southern California


Denial of Control: Implications of Denial of Service Attacks in Critical Infrastructure Control Systems

Zachary D. Tudor, George Mason University; Marty Edwards, Idaho National Laboratory;

Mark G. Fabro, Lofty Perch


Rapid and Reversible Toxic Chemical Vapor Detection Using Solid-state, Dye-labeled DNA-based Sensors

Andrew Walker, Ariya Akthakul, Joel White, CogniScent, Inc


Transportation Systems Protection The Threat Associated with Transporting Empty Containers

Justin C. Whiton, System Planning Corporation


Physical Access Protection using Continuous Authentication

Roland Yap, Terence Sim, Geraldine Kwang, Rajiv Ramnath, National University of Singapore


Partial Multimedia Encryption with Different Security Levels

Yicong Zhou, Karen Panetta, Tufts University; Sos Agaian, University of Texas


3:30 – 5:30 PM Track: CBRNE Transport
Session 5 Cargo Systems & Misc. Transportation Security Identification of Special Nuclear Materials (SNM)
Track Chair: Dr. Lyle Malotky, TSA
Session 5 Chair: Len Long, ARA


Defense CBRNE Threat-Detection Systems for Transportation Security

Marion G. Ceruti, Richard Waters, Pam Boss, Ritesh Patel, Stuart H. Rubin, Charles Datte, Scott McGirr and Thomas Stark, Space and Naval Warfare Systems Center


A Wireless Electronic Monitoring System for Securing Milk from Farm to Processor

Lindsay Hopper, Chris Thompson, Suraj Alexander, William Crist, Fred Payne, Tim Stombaugh, Phillip Womble, Jon Paschal, Ryan Moore, Brian Luck, Applied Physics Institute, Western Kentucky University


CBRN Decontamination using a Large-Area Cold Plasma Applicator

Gregory Konesky, K-Plasma, Ltd.


National Food and Agriculture Sector Transportation and Movement Model and FASTRANS

Michael Orosz, University of Southern California Information Sciences Institute

Neville Clarke, D.J. Kwiatkowski, Texas A & M; John Hoffman, Shaun Kennedy, David Wray, University of Minnesota


Advancements in the PROTECT Early Warning Crisis Management System

Anthony J. Policastro, Smiths Detection-Livewave, Inc.


A More Efficient and Effective Way to Check for CBRNE in Air Cargo

Dennis Treece, Massachusetts Port Authority


3:30 – 5:30 PM Track: Risk Assessment & Response
Session 5 Modeling & Simulation
Track Chair: Joe Smith ARA
Session Chair: Dr. Andrzej Stepnowski, Gdansk University of Technology


Real-Time Massive Data Simulation And Visualization Project

Sujal Bista, Michael L. Pack, University of Maryland, College Park Center for Advanced Transportation Technology


A Modeling Framework for Evaluating Effectiveness of Smart-Infrastructure Crises Management Systems

Sandeep K.S. Gupta, Tridib Mukherjee, Department of Computer Science and Engineering, Arizona State University


Fast Modeling of Urban Plume Transport for Emergency Response and Preparedness

Hsi Na (Sam) Lee, U. S. Department of Homeland Security/Science &Technology Environmental Measurements Laboratory


Cognitive Aspects of Risk-Informed Decisions: Methodology and Tools

Igor Linkov, Martin Schultz, Jongbum Kim, Burton Suedel and Todd Bridges, US Army Engineer Research and Development Center


Analysis of Satellite Ais Communication Interface Implementation

Marcin Waraksa, Jerzy Zurek, Gdynia Maritime University

Rafal Niski, National Institute of Telecommunications


3:30 – 5:30 PM Track: Infrastructure
Session 5 Sensor Nets & Video & Anomaly Detection
Track Chair: Craig Coy, L-3
Session Chair: Dr. Karen Panetta, Tufts University


An Individual and Crowd Intent Recognition Surveillance System

Charles J. Cohen, Katherine Scott, Cybernet Systems Corporation

Frank Morelli is with U.S. Army Research Laboratory


Indexing Objects In Video Sequences for Tracking Targets of Interest Across a Network of Cameras

Isaac Cohen, Yunqian Ma, Ben Miller, Honeywell, ACS Labs


The Intelligent Island: Using COTS Equipment to Monitor an Island

George Markowsky, University of Maine


Monolithic visible to SWIR imaging arrays using Germanium Photodetectors

Conor Rafferty, Clifford King, Bryan Ackland, J.H. O’Neill, Ingvar Aberg, TS Sriram, A. Mackay, R. Johnson, NoblePeak Vision


CitySense: An Urban-Scale Wireless Sensor Network and Testbed

Matt Welsh, Harvard University School of Engineering and Applied Sciences

Josh Bers, BBN Technologies


CBR Sensing Testbed Architecture

M. Curran Schiefelbein, MIT Lincoln Laboratory


3:30 – 5:30 PM Track: Cyber & Software
Session 5 Attack Resistant Secure Software Development, Testing, Verification and Validation
Track Chair: Steve Rakitin, SW Quality Consulting
Session Chair: Dr. Karen Panetta, Tufts University


A New Security Sensitivity Measurement for Software Variables

Xueqi Cheng, Nannan He, and Michael S. Hsiao, Department of Electrical and Computer Engineering, Virginia Tech


Software and CyberSecurity: Attack Resistant Secure Software Development

Nathaniel J. Fuller, Space and Naval Warfare System Center (SPAWARSYSCEN)


A New Hybrid Static/Run-Time Secure Memory Access Protection

Nannan He, Xueqi Cheng, Michael S. Hsiao, Virginia Tech


Towards a High Assurance Multi-level Secure PC for Intelligence Communities

David Kleidermacher, Green Hills Software, Inc.


Comparative Analysis Between Zernike and Tchebichef Moments For Image Watermarking Applications To Achieve Secure, Reliable, and Higher Tampering Detection in Image Data Transmission

S. M. Elshoura & D. B. Megherbi, University of Massachusetts-Lowell


A Framework for Cyber Attack Threat and Impact Analysis

Jay Yang, Rochester Institute of Technology; Jared Holsopple, CUBRC, Inc