Process detection in homeland security and defense applications

Process detection is a fundamental problem arising in a variety of homeland security, national defense and commercial applications, including network security, sensor network data fusion, dynamic social network analysis and video tracking of kinematic objects. Our approach to process detection is based on a generic algorithmic approach called Process Query Systems which has been developed at Dartmouth over the past 3 years. This paper surveys the general area of process detection, its applications and recent progress made in various implementations.

[1]  Vincent H. Berk,et al.  Detection of complex cyber attacks , 2006, SPIE Defense + Commercial Sensing.

[2]  Vincent H. Berk,et al.  Process query systems for network security monitoring , 2005, SPIE Defense + Commercial Sensing.

[3]  Glenn T. Nofsinger,et al.  Plume source detection using a process query system , 2004, SPIE Defense + Commercial Sensing.

[4]  Vincent H. Berk,et al.  Implementing Large-Scale Autonomic Server Monitoring Using Process Query Systems , 2005, Second International Conference on Autonomic Computing (ICAC'05).

[5]  Valentine Crespi,et al.  Decentralized sensing and tracking for UAV scheduling , 2004, SPIE Defense + Commercial Sensing.

[6]  Alex Barsamian,et al.  Target tracking and localization using infrared video imagery , 2006, SPIE Defense + Commercial Sensing.

[7]  Vincent H. Berk,et al.  Data exfiltration and covert channels , 2006, SPIE Defense + Commercial Sensing.

[8]  Vincent H. Berk,et al.  Process query systems , 2007, Computer.

[9]  Vincent H. Berk,et al.  An overview of process query systems , 2004, SPIE Defense + Commercial Sensing.

[10]  Valentino Crespi,et al.  Sampling theory for process detection with applications to surveillance and tracking , 2004, SPIE Defense + Commercial Sensing.

[11]  G. Nofsinger,et al.  Distributed chemical plume process detection: MILCOM 2005 #1644 , 2005, MILCOM 2005 - 2005 IEEE Military Communications Conference.

[12]  Vincent H. Berk,et al.  Covert Channel Detection Using Process Query Systems , 2005 .

[13]  Paul Thompson,et al.  Weak models for insider threat detection , 2004, SPIE Defense + Commercial Sensing.