Tag: Detection

Detection of Liquid Explosives and Flammable Agents in Connection with Terrorism


Free Download Hiltmar Schubert, Andrey Kuznetsov, "Detection of Liquid Explosives and Flammable Agents in Connection with Terrorism"
English | 2008 | pages: 235 | ISBN: 1402084641, 140208465X | PDF | 4,0 mb
The organization of an Advanced Research Workshop with the title "Detection and Disposal of Liquid Explosives and Flammable Agents in Connection with Terrorism" was motivated by international findings about activities in this field of application. This ARW followed a meeting about the "Detection of Disposal Improvised Explosives" (St. Petersburg, 2005). Both items show the logistic problems as one of the lessons, terrorists have to overcome. These problems are connected with the illegal supply and transport of explosives and fuels and as counter-measure the detection of these materials. The invention of liquid explosives goes back to the middle of the 19th century and was used for special purposes in the commercial field of application. Because of the high sensitivity of liquid explosives against mechanical shock, caused by adiabatic compression of air-bobbles producing "hot spots" as origin of initiation the commercial application was not very successful. Because of this high risk, liquid explosives are not used in military or commercial application with some exceptions. In the commercial field explosives as slurries or emulsions consisting of suitable salts (Ammoniumnitrate etc.) and water are used to a large extend because of their high insensitivity. In many cases these slurries or emulsions were unfit for terrorist actions, because of their low sensitivity, large critical diameter and using in confinement. In the military field liquid explosives are used in World War I and II as bomb-fillings.

(more…)

Detection and Disposal of Improvised Explosives


Free Download Hiltmar Schubert, Andrey Kuznetsov, "Detection and Disposal of Improvised Explosives"
English | 2006 | pages: 243 | ISBN: 1402048858, 1402048866 | PDF | 21,3 mb
These proceedings contain the presentations and results of several discussions of the workshop on "Detection and Disposal of Improvised Explosives" held in St.-Petersburg, Russia, September 7-9, 2005. This Advanced Research Workshop was the fourth event concerning Detection of Explosives in connection with counter terrorism. After the first three workshops, dealing with vapor and trace detection, electronic nose detection and detection of bulk explosives, this workshop was devoted to the detection of Improvise Explosives including: Methods of detection of Improvised Explosives (IE). Methods of detection of Improvised explosives devices (IED). Disposal and safe handling of ID and IED. The treatment of detection methods may be divided in the following groups: Overview about the different methods; Trace- and vapor detection; Electromagnetic methods; Neutron methods; Laser techniques. Because of different definitions of Improvised Explosives the parti- pants of the workshop agreed after some discussions with the following definition: An Improvised Explosive (IE) can be any chemical compound or mixture capable of an explosive reaction. They are normally easily prepared by a knowledgeable layman under simple conditions. Components of IE are typically inorganic salts containing molecular bound oxygen like nitrates, chlorates or perchlorates etc. or organic compounds with nitro-, nitami- or nitrate-groups or peroxides. Admixtures of military or commercial explosive materials are also used. From the chemical point of view IE can be divided into the following types: Salts containing chemical groups with oxygen (like nitrates, chlorates or perchlorates etc.) in mixtures with combustible substances like carbon-hydrogen compounds.

(more…)

Computer Intrusion Detection and Network Monitoring A Statistical Viewpoint


Free Download Computer Intrusion Detection and Network Monitoring: A Statistical Viewpoint by David J. Marchette
English | PDF | 2001 | 339 Pages | ISBN : 0387952810 | 29 MB
In the fall of 1999, I was asked to teach a course on computer intrusion detection for the Department of Mathematical Sciences of The Johns Hopkins University. That course was the genesis of this book. I had been working in the field for several years at the Naval Surface Warfare Center, in Dahlgren, Virginia, under the auspices of the SHADOW program, with some funding by the Office of Naval Research. In designing the class, I was concerned both with giving an overview of the basic problems in computer security, and with providing information that was of interest to a department of mathematicians. Thus, the focus of the course was to be more on methods for modeling and detecting intrusions rather than one on how to secure one’s computer against intrusions. The first task was to find a book from which to teach. I was familiar with several books on the subject, but they were all at either a high level, focusing more on the political and policy aspects of the problem, or were written for security analysts, with little to interest a mathematician. I wanted to cover material that would appeal to the faculty members of the department, some of whom ended up sitting in on the course, as well as providing some interesting problems for students. None of the books on the market at the time had an adequate discussion of mathematical issues related to intrusion detection.

(more…)

Phishing Detection Using Content-Based Image Classification


Free Download Phishing Detection Using Content-Based Image Classification by Shekhar Khandelwal, Rik Das
English | June 1st, 2022 | ISBN: 1032108533 | 130 pages | True EPUB | 3.80 MB
Phishing Detection Using Content-Based Image Classification is an invaluable resource for any deep learning and cybersecurity professional and scholar trying to solve various cybersecurity tasks using new age technologies like Deep Learning and Computer Vision. With various rule-based phishing detection techniques at play which can be bypassed by phishers, this book provides a step-by-step approach to solve this problem using Computer Vision and Deep Learning techniques with significant accuracy.

(more…)

Detection and Prevention of Identity-Based Bullying Social Justice Perspectives


Free Download Britney Brinkman, "Detection and Prevention of Identity-Based Bullying: Social Justice Perspectives "
English | ISBN: 0415719526 | 2015 | 144 pages | PDF | 1068 KB
Bullying in schools has become the focus of a growing body of literature; however, much of that work diminishes the role of social context, social identities, and prejudices despite extensive research evidence suggesting that many victims of bullying are targeted because of an aspect of their social identity. This book demonstrates how the prevention and intervention of this phenomenon, termed identity-based bullying, is a social justice issue.

(more…)