Welcome to HST 2017

Technical Program Proceedings
November 5, 2019 November 6, 2019

Technical Program Tuesday, November 5, 2019

7:00 AM

Registration Opens

8:00 AM

Open Networking Breakfast

8:45 - 10:30 AM

Welcome to HST 2019 / Plenary Sessions

James Flavin MIT Lincoln Laboratory

Invited Speakers

DASD Derek Maurer Deputy Assistant Secretary of Defense for Defense Continuity and Mission Assurance Mr. Malcholm Reese National Guard Bureau, Joint Program Manager/ Joint Program Executive Office for Chemical, Biological, Radiological and Nuclear Defense 10:30 AM

Technical Program Overview- Speaker: G. Larocque/ A. Serino

Best Paper Awards- Speaker: G. Larocque/ A. Serino

10:45 AM

Break

11:00 AM Cyber 1: Critical Infrastructure Protection 14: Extending Over-The-Air Libraries to Secure ESP8266 Updates Mauricio Papa (The University of Tulsa)*; Xinchi He (The University of Tulsa); Rose Gamble (University of Tulsa) 110: Protecting Personally Identifiable Information (PII) in Critical Infrastructure Data Using Differential Privacy Asma M Alnemari (Rochester Institute of Technology)*; Rajendra Raj (Rochester Institute of Technology); Carol Romanowski (Rochester Institute of Technology); Sumita Mishra (Rochester Institute of Technology) 40: Detecting Sensors and Inferring their Correlations at Level-0 in Industrial Cyber-Physical Systems Kalyan Perumalla (Oak Ridge National Laboratory)*; Srikanth Yoginath (ORNL); Juan Lopez (Oak Ridge National Laboratory) Humanitarian Assistance & Disaster Relief (HADR) 1: Planning and Communication 73: Multimodal, Multiuser Immersive Brainstorming and Scenario Planning for Intelligence Analysis Shannon Briggs (Rensselaer Polytechnic Institute)*; Matthew Peveler (Rennselaer Polytechnic Institute); Jaimie Drozdal (Rensselaer Polytechnic Institute); Lilit Balagyozyan (Rensselaer Polytechnic Institute); Michael Perrone (IBM Research); Hui Su (IBM Research) 74: 5G or Wi-Fi for HA/DR in the 60 GHz Band Md Fahad Kabir (Georgia Southern University); Seungmo Kim (Georgia Southern University)* 34: Proposal for Robust Person-to-Person Communications Cystem for Large-scale Emergency Displaced Population of People and Pets David H Parker (Parker Intellectual Property Enterprises, LLC)* Land/Maritime Borders & Critical Infrastructure Protection 1: Vessels & Cargo 3: A Graph-based Data Analysis of Industrial Control Systems Network Traffic Imani Palmer (University of Illinois at Urbana-Champaign)*; Shane McFly (University of Illinois at Urbana-Champaign) 63: Using Deep Neural Networks to Address the Evolving Challenges of Concealed Threat Detection within Complex Electronic Items Neelanjan Bhowmik (Durham University)*; Yona Falinie A. Gaus (Durham University); Toby Breckon (Durham University) 57: Detection of DDoS in SDN Environment Using Entropy-based Detection Tamer Omar (California State Polytechnic University, Pomona)* Biometrics & Forensics 1- Reidentification and Event Recognition 69: Characterizing the Utility of Surveillance Video for Person Re-Identification Haoyu Chen (Purdue University)*; Edward Delp (Purdue University); Amy R. Reibman (Purdue University) 107: Biometric Fusion with Applications in Passenger Re-authentication for Automated Border Control Systems Duc Huy Hoang Nguyen (University of Missouri, Kansas City); Ajita Rattani (University of Missouri - Kansas City)*; Prof. Reza Derakhshani (University of Missouri-Kansas City) 65: Forensic Audio Analysis and Event Recognition for Smart Surveillance Systems Yusuf Ozkan (University of Bridgeport)*; Buket Barkana (University of Bridgeport) 12:30 PM

Lunch (12:15- 1:15)

1:20 PM Cyber 2: Model Driven Approaches 47: Model-driven Deception for Control System Environments William Hofer (Pacific Northwest National Laboratory)*; Thomas Edgar (Pacific Northwest National Laboratory); Draguna Vrabie (Pacific Northwest National Laboratory); Katy Nowak (Pacific Northwest National Laboratory) 62: Blockchain Model for Enhancing Aircraft Maintenance Records Security Ahrash Aleshi (Embry-Riddle Aeronautical University); Remzi Seker (Embry-Riddle Aeronautical University); Radu Babiceanu (Embry-Riddle Aeronautical University)* 54: Securing the Long-Chain of Cyber-Physical Global Communication Infrastructure Nazli Choucri (Massachusetts Institute of Technology)*; Gaurav Agarwal (Massachusetts Institute of Technology) Humanitarian Assistance & Disaster Relief (HADR) 2: Situational Awareness and Evacuation 94: Towards a General-Purpose, Replicable, Swarm-Capable Unmanned Aircraft System Ross Arnold (US Army)*; Andrew Kopeikin (United States Military Academy); Christopher Korpela (USMA); benjamin a abruzzo (US Army) 79: UAS Swarm Shares Survey Data to Expedite Coordinated Mapping of Radiation Hotspots Brian Savidge (United States Military Academy); Andrew Kopeikin (United States Military Academy)*; Ross Arnold (United States Military Academy); Dominic Larkin (United States Military Academy) 42: Intelligent and Automated Emergency Evacuation of Populated Areas in an Event of Volcanic Activity Mais Nijim (Texas A&M university Kingsville)*; Hisham Albataineh (Texas A&M University Kingsville) Land/Maritime Borders & Critical Infrastructure Protection 2: Autonomous Vehicles, BioSwimmers, and UAVs 31: BIOSwimmer Search and Inspection for the Port of Charleston, S.C. Michael Conry (Boston Engineering)*; Michael Rufo (Boston Engineering); David Shane (Boston Engineering) 35: Stevens Drone Detection Acoustic System and Experiments in Acoustics UAV Tracking Alexander Sedunov (Stevens Institute of Technology)*; Hady Salloum (Stevens Institute of Technology MSC); Alexander Sutin (Stevens Institute of Technology MSC); Nikolay Sedunov (Stevens Institute of Technology); Alexander Yakubovskiy (Stevens Institute of Technology) 51: Attacks on Machine Learning: Adversarial Examples in Connected and Autonomous Vehicles Prinkle Sharma (University of Massachusetts Dartmouth); David Austin (University of Massachusetts Dartmouth); Hong Liu (Univ of Massachusetts Dartmouth)* Biometrics & Forensics 2: Biometric ID Methods 114: Using Transfer Learning and BPDFHE to Improve Ocular Image Recognition Accuracy Riddhiman Das (University of Missouri-Kansas City)*; Reza Derakhshani (University of Missouri-Kansas City) 5: Secure & Enhanced Atm with Biometric Authentication Bhuvaneshwari A J (Kamaraj College of Engineering & Technology)*; R.Nanthithaa Shree (Kamaraj College of Engineering & Technology) 93: Cross-illumination Evaluation of Hand Crafted and Deep Features for Fusion of Selfie Face and Ocular Biometrics Leena Kondapi (University of Missouri- Kansas City)*; Prof. Reza Derakhshani (University of Missouri-Kansas City); Ajita Rattani (University of Missouri - Kansas City) 2:50 PM

Break

3:20 PM Cyber 3: Embedded Systems Security 77: Detecting Safety and Security Faults in PLC Systems with Data Provenance Abdullah Al. Farooq (The University of North Carolina, Charlotte)* 25: Hardware Based Detection, Recovery, and Tamper Evident Concept to Protect from Control Flow Violations in Embedded Processing Patrick R DaSilva (Naval Undersea Warfare Center Division Newport)* Humanitarian Assistance & Disaster Relief (HADR) 3: Social Media and Community Monitoring 112: Artificial Intelligence Ethics: Governance through Social Media Jorge R Buenfil (US Army); Ross Arnold (US Army)*; benjamin a abruzzo (US Army); Christopher Korpela (United States Military Academy) 37: Challenges and Opportunities in Utilizing IoT-Based Stress Maps as a Community Mood Detector Murat Yuksel (Univ of Central FL); Wei Wang (The City University of New York); Shafaq Chaudhry (Univ of Central FL)*; Damla Turgut (Univ of Central FL); Naim Kapucu (Univ of Central FL) 89: Situational Awareness Enhanced through Social Media Analytics: A Survey of First Responders Luke S Snyder (Purdue University)* 72: A Behavior-Based Population Tracker Can Parse Aggregate Measurements to Differentiate Agents Jason H Rife (Tufts University)* Land/Maritime Borders & Critical Infrastructure Protection 3: Image and Video Analytics 20: Underwater Object Tracking Benchmark and Dataset Landry Kezebou (Tufts University)*; Victor Oludare (Tufts University); Karen Panetta (Tufts University); Sos Agaian (Tufts University) 24: 3D Navigational Insight using Mixed Reality Technology Srijith Rajeev (Tufts University)*; Arash Samani (Tufts University); Karen Panetta (Tufts University); Sos Agaian (Tufts University) 75: On-demand Forensic Video Analytics for Large-Scale Surveillance Systems Marianne DeAngelus (MIT Lincoln Laboratory)* Biometrics & Forensics 3: Assorted Topics 29: A Comparative Evaluation of Local Feature Descriptors for DeepFakes Detection Zahid Akhtar (University of Memphis)*; Dipankar Dasgupta (University of Memphis) 53: Multi-Dimensional Integrated Circuit For Water Security in Fish Farming Ponds Nazek El-Atab (King Abdullah University of Science and Technology)*; Reema Suwaidan (Princess Nourah University); Yara Alghamdi (Princess Nourah University); Alhanouf Alhazzany (Princess Nourah University); Reema Almansour (Princess Nourah University); Sohail F. Shaikh (King Abdullah University of Science and Technology); Sherjeel Khan (King Abdullah University of Science and Technology); Muhammad M. Hussain (King Abdullah University of Science and Technology); Muhammad M. Hussain (University of California, Berkeley) 45: Family Biometrics: Similar But Different Rachel Stange (Lord Fairfax Community College)* 5:20 PM

Welcome Reception, Exhibits, and Poster Session Presentations

Cyber Posters 101: Threat analyses using vulnerability databases - Possibility of utilizing past analysis results Katsuyuki Umezawa (Shonan Institute of Technology)*; Yusuke Mishina (National Institute of Advanced Industrial Science and Technology); Kazuo Takaragi (National Institute of Advanced Industrial Science and Technology) Land/Maritime Borders & Critical Infrastructure Protection Posters 36: Enhanced SNM identification with ScintiClear detectors Ivan Khodyuk (CapeSym, Inc.)* 48: Identification of Critical Airports from The Perspective of Delay and Disruption Propagation in Air Travel Networks Arun V Sathanur (Pacific Northwest National Labs)*; Mahantesh Halappanavar (Pacific Northwest National Laboratory); Samrat Chatterjee (Pacific Northwest National Laboratory); Auroop Ganguly (Northeastern University); Kevin Clark (VOLPE National Transportation Systems) 56: End to End V2I/I2V Secured Communications Platform Tamer Omar (California State Polytechnic University, Pomona)*; Melvin Hayes (Indiana State University) 64: On the use of Deep Learning for the Detection of Firearms in X-ray Baggage Security Imagery Yona Falinie A. Gaus (Durham University)*; Neelanjan Bhowmik (Durham University); Toby Breckon  (Durham University) 95: Automated Damage Assessment of Critical Infrastructure Using Online Mapping Technique with Small Unmanned Aircraft Systems Zhong Mao (Northeastern University)*; Taskin Padir (Northeastern University); Yujie Yan (Northeastern university); Jiahao Wu (northeastern university); Jerome Hajjar (Northeastern university)

Technical Program Wednesday, November 6 , 2019

7:00 AM

Registration Opens

8:00 AM

Open Networking Breakfast

9:30 AM

Break

10:00 AM Cyber 4: Machine Learning and Analytics for Cyber Security 82: Cybersecurity Analytics using Smart Inverters in Distribution Power System: Proactive Intrusion Detection and Corrective Control Action Mitchell Easley (Kansas State University); Amin Yousefzadeh Fard (Kansas State University); Mohammad Shadmand (Kansas State University)* 59: Adversarial Machine Learning for Network Security Yi Shi (Intelligent Automation, Inc.); Hui Zeng (Intelligent Automation, Inc.)*; Tung Nguyen (Intelligent Automation, Inc.) 23: DNS Tunneling Detection with Supervised Learning Richard H Preston (MITRE)* Humanitarian Assistance & Disaster Relief (HADR) 4: Response 98: CPSX: Using AI-Machine Learning for Mapping Human-Human Interaction and Measurement of CPS Teamwork Skills Pravin V Chopade (ACTNext ACT Inc)*; David Edwards (ACTNext ACT Inc); Saad Khan (ACTNext ACT Inc); Alejandro Andrade (ACTNext ACT Inc); Scott Pu (ACTNext ACT Inc) 80: System Design for Quadrant-Based Indoor Localization of Emergency Responders Srinivas Karuparthi (Northeastern University)*; Taskin Padir (Northeastern University) Land/Maritime Borders & Critical Infrastructure Protection 4: Radiation Detection and Screening 61: Security X-ray Screening with Modulated-Energy Pulses Anatoli Arodzero (RadiaBeam Technologies)* 97: Detecting, Identifying, and Localizing Radiological Material in Urban Environments using Scan Statistics Michael Porter (University of Virginia)* 103: Decontamination strategies optimized for speed of reducing dangerous levels Horia Teodorescu (Technical University Iasi)*

Frontier Technologies

19: Ensuring Flexibility and Security in SDN-Based Spacecraft Communication Networks through Risk Assessment Dylan Baker (University of Massachusetts Dartmouth)*; Hong Liu (Univ of Massachusetts Dartmouth); Christopher Roberts (NASA) 52: A Novel Method for RF Tomography and Acquiring Dielectric Signatures for Homeland Security Applications Tim Cargol (Spectrohm)*; Scott Teare (New Mexico Institute of Mining and Technology) 60: A Lightweight, Low-Cost, Wideband Software-Defined Radio Test Bed Nicholas E Donatelli (Stevens Institute of Technology)*; Timothy Flynn (Stevens Institute of Technology); Michael Macari (Stevens Institute of Technology) 11:30 AM

Plenary Session

James Flavin MIT Lincoln Laboratory

Speaker

André Hentz Deputy Under Secretary (Acting) for Science and Technology, U.S. Department of Homeland Security 12:15 PM

Lunch (12:15-1:15)

1:20 PM Cyber 5: Policy, Regulation, & Workforce Development 115: Implications of Decentralized Autonomous Organization on Political Campaign Finance Regulations Ayzha D Ward (University of Houston)*; Keshav Kasichainula (University of Houston); Weidong Shi (University of Houston) 28: Cybersecurity Associate Degree Program Curriculum Melissa Stange (Lord Fairfax Community College)*; Cara Tang (Portland Community College); Cindy Tucker (Bluegrass Community & Technical College); Christian Servin (El Paso Community College); Markus Geissler (Cosumnes River College) Humanitarian Assistance & Disaster Relief (HADR) 5: Cyber and Community Resilience 55: Going Beyond The ‘Waffle House’ Index: Using Food Systems as an Indicator of Community Health and Sustainability Sarah A Dobie (Rochester Institute of Technology)*; Jennifer L Schneider (RIT); Avery Szafranski (Rochester Institute of Technology) 71: Translation of Process Safety to Cyber Incidents within The Emergency Management Arc Jennifer L Schneider (Rochester Institute of Technology)*; Sarah Dobie (Rochester Institute of Technology); Salim Ghettas (Rochester Institute of Technology) Land/Maritime Borders & Critical Infrastructure Protection 5: Nuclear Threats 22: A Synthesized Global Neutron Background Map Anthony L Hutcheson (U.S. Naval Research Laboratory)*; Bernard Phlips (Naval Research Laboratory); Lee Mitchell (U.S. Naval Research Laboratory); Byron Leas (General Dynamics Information Technology, Inc.) 26: Improving Radiation Transport Simulation Capabilities for Nuclear Threat Detection Using SWORD Wade S Duvall (U.S. Naval Research Laboratory); Bernard Phlips (Naval Research Laboratory); Anthony L Hutcheson (U.S. Naval Research Laboratory); Ryan Cordes (Praxis Inc.); Joseph Hartsell (Praxis Inc.); Mark Strickman* (George Mason University) 2:50 PM

Break

3:20 PM Cyber Security 6: Authentication, Detection, and Forensics 100: A Robust, Non-blind High Capacity & Secure Digital Watermarking Scheme for Image Authentication and Tampering Localization and Recovery via the Discrete Wavelet Transform Dalila B. Megherbi (CMINDS center /ECE, UMASS Lowell)*; Swapnil Swapnil (CMINDS) 86: Volatile Memory Extraction-Based Approach for Level 0-1 CPS Forensics Rima Asmar Awad (Oak Ridge National Laboratory); Mike Rogers (Tennessee Technological University); Juan Lopez (Oak Ridge National Laboratory); Kalyan Perumalla (Oak Ridge National Laboratory)* 27: Malware Detection using Behavioral Whitelisting of Computer Systems Spiros Mancoridis (Drexel University)*; Saumya Saxena (Drexel University) Land/Maritime Borders & Critical Infrastructure Protection 6: Risk and Threat Assessment 92: Multi-Stakeholder Resilient Infrastructure Decision Support under Dynamic Environmental and Adaptive Adversarial Settings Mary Elizabeth Warner (Northeastern University)*; Samrat Chatterjee (Pacific Northwest National Laboratory); Auroop Ganguly (Northeastern University); Robert Brigantic (Pacific Northwest National Laboratory) 104: Cascaded Neural Networks for Identification and Posture-Based Threat Assessment of Armed People Benjamin A Abruzzo (US Army)*; Kevin Carey (United States Military Academy); Christopher Lowrance (United States Military Academy); Eric Struzinger (United States Military Academy); Christopher Korpela (USMA); Ross Arnold (US Army) 105: Full Body Beamsteered Wi-Fi Imaging and Threat Classifier for Public Transportation Paul C. Proffitt (UMass Dartmouth)*, Dr. Honggang Wang (UMass Dartmouth) 96: Recognizing Radicalization Indicators in Text Documents Using Human-in-the-Loop Information Extraction and Natural Language Processing Techniques Benjamin W.K. Hung*, Shashika R. Muramudalige, Anura P. Jayasumana (Colorado State University); Jytte Klausen, Rosanne Libretti, Evan Moloney, Priyanka Renugopalakrishnan (Brandeis University)