The signature-based radiation-scanning approach to standoff detection of improvised explosive devices

被引:5
|
作者
Brewer, R. L. [1 ]
Dunn, W. L. [1 ]
Heider, S. [1 ]
Matthew, C. [1 ]
Yang, X. [1 ]
机构
[1] Kansas State Univ, Dept Mech & Nucl Engn, Manhattan, KS 66506 USA
关键词
Explosives; Detection; Neutrons; Signature analysis;
D O I
10.1016/j.apradiso.2011.11.031
中图分类号
O61 [无机化学];
学科分类号
070301 ; 081704 ;
摘要
The signature-based radiation-scanning technique for detection of improvised explosive devices is described. The technique seeks to detect nitrogen-rich chemical explosives present in a target. The technology compares a set of "signatures" obtained from a test target to a collection of "templates", sets of signatures for a target that contain an explosive in a specific configuration. Interrogation of nitrogen-rich fertilizer samples, which serve as surrogates for explosives, is shown experimentally to be able to discriminate samples of 3.8 L and larger. (C) 2011 Elsevier Ltd. All rights reserved.
引用
收藏
页码:1181 / 1185
页数:5
相关论文
共 50 条
  • [41] A survey and taxonomy of the fuzzy signature-based Intrusion Detection Systems
    Masdari, Mohammad
    Khezri, Hemn
    APPLIED SOFT COMPUTING, 2020, 92 (92)
  • [42] An aggregated signature-based fast RFID batch detection protocol
    Li, Chaoliang
    Wang, Guojun
    Zheng, Jin
    SECURITY AND COMMUNICATION NETWORKS, 2014, 7 (09) : 1364 - 1371
  • [43] A Signature-based Assistant Random Oversampling Method for Malware Detection
    Pang, Ying
    Chen, Zhenxiang
    Peng, Lizhi
    Ma, Kun
    Zhao, Chuan
    Ji, Ke
    2019 18TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS/13TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (TRUSTCOM/BIGDATASE 2019), 2019, : 256 - 263
  • [44] Using decision trees to improve signature-based intrusion detection
    Kruegel, C
    Toth, T
    RECENT ADVANCES IN INTRUSION DETECTION, PROCEEDINGS, 2003, 2820 : 173 - 191
  • [45] Signature-Based Detection of Notable Transitions in Numeric Data Streams
    Cherniak, Andrii
    Zadorozhny, Vladimir I.
    IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2013, 25 (12) : 2867 - 2879
  • [46] Advanced Intrusion Detection Combining Signature-Based and Behavior-Based Detection Methods
    Kwon, Hee-Yong
    Kim, Taesic
    Lee, Mun-Kyu
    ELECTRONICS, 2022, 11 (06)
  • [47] Novel evaluation approach for molecular signature-based deconvolution methods
    Nava, Agustin
    da Quinta, Daniela Alves
    Prato, Laura
    Girotti, Maria Romina
    Moron, Gabriel
    Llera, Andrea S.
    Fernandez, Elmer A.
    JOURNAL OF BIOMEDICAL INFORMATICS, 2023, 142
  • [48] An automated signature-based approach against polymorphic Internet worms
    Tang, Yong
    Chen, Shigang
    IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2007, 18 (07) : 879 - 892
  • [49] Watermarking approach to embedded signature-based authentication by channel statistics
    Yang, ZF
    Tsai, WH
    OPTICAL ENGINEERING, 2003, 42 (04) : 1157 - 1165
  • [50] Signature-based Detection of Privilege-Escalation Attacks on Android
    Niazi, Rafay Hassan
    Waseem, Tahir
    Shamsi, Jawwad Ahmed
    Khan, Muhammad Mubashir
    2015 CONFERENCE ON INFORMATION ASSURANCE AND CYBER SECURITY (CIACS), 2015, : 44 - 49