Wiley Handbook of Science and Technology for Homeland Security, 4 Volume SetISBN: 978-0-471-76130-3
Hardcover
2888 pages
April 2010
|
2 CROSS-CUTTING THEMES AND TECHNOLOGIES.
2.1 Risk Modeling and Vulnerability Assessment.
Terrorism Risk: Characteristics and Features.
Risk Analysis Frameworks for Counterterrorism.
Logic Trees: Fault, Success, Attack, Event, Probability, and
Decision Trees.
Bayesian Networks.
Using Risk Analysis to Inform Intelligence Analysis.
Vulnerability Assessment.
Multi-objective Decision Analysis.
Risk Communication.
Experience with Expert Judgment: the TU Delft Expert Judgment
Data.
Probabilistic Risk Assessment (PRA).
Deterrence: An Empirical Psychological Model.
Scenario Analysis, Cognitive Maps, And Concept Maps.
Policy Development.
Consequence Mitigation: Current Research and Future Trends.
Time-Domain Probabilistic Risk Assessment Method for Interdependent
Infrastructure Failure and Recovery Modeling.
Social and Psychological Aspects.
Risk Transfer and Insurance: Insurability Concepts and Programs for
Covering Extreme Events.
Quantitative Representation of Risk.
Qualitative Representation of Risk.
Terrorist Organizations and Modeling Trends.
Cyber-Security.
Defeating Surprise Through Threat Anticipation and Possibility
Management.
Memetics for Threat Reduction in Risk Management.
High Consequence Threats: Electromagnetic Pulse.
High Consequence Events: Nuclear Explosions.
Modeling Population Dynamics for Homeland Security
Applications.
2.2 Sensing and Detection.
Protecting Security Sensors and Systems.
Threat Signatures of Explosive Materials.
Radioactive Materials Sensors.
Knowledge Extraction from Surveillance Sensors.
Sensing Dispersal of Chemical and Biological Agents in Urban
Environments.
Sensing Releases of Highly Toxic and Extremely Toxic
Compounds.
2D-to-3D Face Recognition Systems.
Eye and Iris Sensors.
Dynamic Load Balancing for Robust Distributed Computing in the
Presence of Topological Impairments.
2.3 Cyber Security.
Advanced Attacker Detection and Understanding with Emerging
Honeynet Technologies.
Attack Traceback and Attribution.
Authentication, Authorization, Access Control, and Privilege
Management.
Classes of Vulnerabilities and Attacks.
Cyber Forensics.
Cyber Security for the Banking and Finance Sector.
Cyber Security Policy Specification and Management.
Cyber Security Standards.
Cyber Security Technology Usability and Management.
Detection of hidden information, covert channels and information
flows.
High Assurance: Provably Secure Systems and Architectures.
Industrial Process Control System Security.
Multilevel Security.
Security of Distributed, Ubiquitous, and Embedded Computing
Platforms.
Trusted Platforms: The Root of Security.
2.4 Protection and Prevention.
Protection and Prevention: an Overview.
Less-Lethal Payloads for Robotic and Automated Response
Systems.
Protection and Prevention: Security Assessment Methodologies for US
Ports and Waterways.
Homeland Security Perspective on Threats and Challenges.
The Sensor Web: Advanced Technology for Situational
Awareness.
Defending Against Directed Energy Weapons: RF Weapons and
Lasers.
The Forum of Incident Response and Security Teams (FIRST).
Critical Information Infrastructure Protection, Overview.
Critical Information Infrastructure Protection, Australia.
Critical Information Infrastructure Protection, Austria.
Critical Information Infrastructure Protection, Brazil.
Critical Information Infrastructure Protection, Canada.
Critical Information Infrastructure Protection, Estonia.
Critical Information Infrastructure Protection, Finland.
Critical Information Infrastructure Protection, France.
Critical Information Infrastructure Protection, Germany.
Critical Information Infrastructure Protection, Hungary.
Critical Information Infrastructure Protection, India.
Critical Information Infrastructure Protection, Italy.
Critical Information Infrastructure Protection, Japan.
Critical Information Infrastructure Protection, Malaysia.
Critical Information Infrastructure Protection, New Zealand.
Critical Information Infrastructure Protection, Norway.
Critical Information Infrastructure Protection, Poland.
Critical Information Infrastructure Protection, Republic of
Korea.
Critical Information Infrastructure Protection, Russia.
Critical Information Infrastructure Protection, Singapore.
Critical Information Infrastructure Protection, Spain.
Critical Information Infrastructure Protection, Sweden.
Critical Information Infrastructure Protection, Switzerland.
Critical Information Infrastructure Protection, the
Netherlands.
Critical Information Infrastructure Protection, United
Kingdom.
Critical Information Infrastructure Protection, United
Nations.
Critical Information Infrastructure Protection, United
States.
Critical Information Infrastructure Protection, the World Bank
Group.
Critical Information Infrastructure Protection, European
Union.
Critical Information Infrastructure Protection, NATO.
Critical Information Infrastructure Protection, Group of Eight
(G8).
Organisation for Economic Co-Operation and Development (OECD).
2.5 Human Social and Behavioral Research.
Audience sensing and tailoring for preferred and forced decision
style.
Behavioral screening.
Biometrics Sensors.
Consequence attribution (forward and reverse).
Deception detection, tools for counterterrorism and homeland
security.
Human behavior and how it adjusts our actions in complex events in
both positive and negative ways.
Human emotion and its involvement in overt events for both observer
and victim.
Human perception and attention in information-rich and
event-overloa situations.
Information analysis and distillation under time constraints.
Information Collection and presentation in high data volume and
multiple timescale situations.
Information repurposing and fusion.
Temporal analysis and synchronization for proper understanding of
real event sequences.
2.6 System and Sector Interdependencies.
System and Sector Interdependencies: An Overview.
The Genesis of Interdependencies Concepts.
Analysis of Cascading Infrastructure Failures.
Characterizing Infrastructure Failure Interdependencies to Inform
Systemic Risk.
Critical Infrastructure Protection Decision Making.
Cyber Security Metrics and Measures.
Geospatial Data Support for Infrastructure Interdependencies
Analysis.
Implications of Regulation on the Protection of Critical
Infrastructures.
Infrastructure Dependency Indicators.
Inherently Secure Next-Generation Computing and Communication
Networks for Reducing Cascading Impacts.
Input-Output Modeling for Interdependent Infrastructure
Sectors.
Interdependent Energy Infrastructure Simulation System.
Managing Critical Infrastructure Interdependencies: The Ontario
Approach.
Network Flow Approaches for Analyzing and Managing Disruptions to
Interdependent Infrastructure Systems.
Object-Oriented Approaches for Integrated Analysis of
Interdependent Energy Networks.
President's Commission on Critical Infrastructure Protection and
Presidential Decision Directive 63.
Vulnerability Assessment Methodologies for Interdependent
Systems.
Water Infrastructure Interdependencies.
2.7 Human Information Systems.
Human Sensation and Perception.
Naturalistic Decision Making, Expertise, and Homeland
Security.
Security and Safety Synergy: Advancing Security with Human Factors
Knowledge.
Human Behavior and Deception Detection.
Speech and Video Processing for Homeland Security.
Classification and Clustering for Homeland Security
Applications.
Training and Learning Development for Homeland Security.
3 KEY APPLICATION AREAS.
3.1 Agriculture and Food Supply.
Carcass Disposal Options.
Decontamination and Disposal of Contaminated Foods.
Developing Risk Metrics to Estimate Risks of Catastrophic
Biological and Bioterrorist Events: Applications to the Food
Industry.
Early Detection and Diagnosis of High-Consequence Plant Pests in
the United States.
Insects As Vectors Of Foodborne Pathogens.
Livestock Agroterrorism and the Potential Public Health Risk.
Microbial Forensics and Plant Pathogens: Attribution of
Agricultural Crime.
Mid-Infrared Sensors for The Rapid Analysis of Select Microbial
Food Borne Pathogens.
Mitigating Consequences of Pathogen Inoculation into Processed
Food.
Mitigating Public Health Risks from an Agroterror Attack.
Optimal Investments in Mitigating Agroterrorism Risks.
Potential for Human Illness from Animal Transmission or Food-Borne
Pathogens.
Pulsenet: A Program to Detect and Track Food Contamination
Events.
Risk Assessment, Risk Management, and Preventive Best Practices for
Retailers and Foodservice Establishments.
Risk Communication: An Overlooked Tool in Combating
Terrorism.
Social, Psychological, and Communication Impacts of an
Agroterrorism Attack.
The EDEN Homeland Security Project: Educational Opportunities in
Food and Agrosecurity.
The Global Food Supply Chain.
The Role of Food Safety in Food Security/Defense.
The Use of Threat, Vulnerability, and Consequence (TVC) Analysis
for Decision Making on The Deployment of Limited Security
Resources.
Vulnerability of the Domestic Food Supply Chain.
3.2 Water.
Decontamination methods for drinking water treatment and
distribution systems.
Decontamination Methods for Wastewater and Stormwater Collection
and Treatment Systems.
Designing an Optimum Water Monitoring System.
Drinking Water Supply, Treatment and Distribution Practice in the
United States.
Emergency response planning for drinking water systems.
Health Risk Assessment for Radiological, Chemical, and Biological
Attacks.
Homeland Security and Wastewater Treatment.
Protecting Water Infrastructure in the United States? Setting
Priorities, Conducting Research, and Sharing Results.
Roles of Federal, State, and Local Authorities in Water
Infrastructure Security.
Surveillance Methods and Technologies for Water and Wastewater
Systems.
Treatability of Contaminants in Conventional Systems.
Understanding the Implications of Critical Infrastructure
Interdependencies for Water.
Water Infrastructure and Water Use in the United States.
Water Supply and Wastewater Management Regulations, Standards, and
Guidance.
3.3 Communications and Information Infrastructure.
Wireless Security.
Critical Infrastructure Protection: Telecommunication.
3.4 Energy Systems.
Comparative Risk Assessment for Energy Systems: A Tool for
Comprehensive Assessment of Energy Security.
Large-Scale Electricity Transmission Grids: Lessons Learned from
the European Electricity Blackouts.
3.5 Public Health.
Biodefense Priorities in Life-science Research: Chemical Threat
Agents.
Biodefense Workforce.
Biosurveillance Tradecraft.
Developing a Threat List--Emerging Infectious Diseases.
Development of Radiation Countermeasures.
Farm Level Control of Foreign Animal Disease and Food-Borne
Pathogens.
Importation of Foreign Dengue Virus Presents Low Risk to US
Homeland; Spread Will Not Parallel that of West Nile Virus.
North Carolina Biosurveillance System.
Practical Systems for Biosurveillance: The Military Perspective and
Essence.
3.6 Transportation Security.
Harden Security of High-Risk and Critical Supply Chains.
Population Evacuations.
Roles and Implications of Transportation Systems in Homeland
Security.
The Nation's Transportation System as a Security Challenge.
Transportation Operations and Control.
Transportation Security Performance Measures.
3.7 Intelligence Systems.
Craniofacial Aging.
File Forensics and Conversion.
Finding Inadvertent Release of Information.
Nano-Enabled Power Sources.
New Approaches to IRIS Recognition: One-Dimensional
Algorithms.
Spectrally Adaptive Nanoscale Quantum Dot Sensors.