• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 7
  • 2
  • Tagged with
  • 11
  • 11
  • 5
  • 3
  • 3
  • 3
  • 3
  • 3
  • 3
  • 3
  • 3
  • 3
  • 2
  • 2
  • 2
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

Development of focal geometry with non-ideal samples

Prokopiou, D M 17 July 2015 (has links)
A novel geometry for powder X-ray diffraction (XRD), termed ‘focal construct geometry’ (FCG) is introduced and developed with both non-ideal samples and non-ideal sample conditions. FCG utilises an annular beam that has the unique feature of ‘focusing’ scattering maxima at single loci along a primary axis, hence offering diffraction data of enhanced intensity. This main advantage of FCG can be used within fields in need of rapid material identification, such as security screening in airports. A theoretical comparison between FCG and conventional transmission mode XRD showed that even though FCG suffers from broader diffraction peaks, an alternative approach to FCG data interpretation has the potential to provide narrower scattering maxima than conventional XRD. However, in order to employ this approach, discrimination between converging and diverging FCG scattering maxima is essential. Peak broadening was investigated by altering various aspects of FCG instrumentation components by either pencil beam XRD or FCG, indicating broad diffraction peaks independent of the beam geometry employed. Development of FCG resulted in the successful analysis of non-ideal samples, such as non-crystalline liquid samples, samples exhibiting preferred orientation and samples with large grain size, demonstrating advantages over conventional XRD. Furthermore, ideal samples (in terms of crystallinity, preferred orientation and grain size) were analysed by FCG under non-ideal conditions. This involved randomly orientating a single planar sample with respect to the primary axis, contrary to previous research that present FCG with a single planar sample normal to the primary axis. Sample rotation resulted in FCG scattering maxima with different xyz coordinates depending on the degree, axis and direction of rotation. Moreover, FCG analysis of multiple samples (normal to the primary axis) showed that as with all XRD arrangements, a priori knowledge of the samples’ position along the primary axis is required for effective data analysis. Investigation into the ability of FCG’s annular beam to act as a pre-sample coded aperture demonstrated an alternative method to interpret FCG images by recovering conventional XRD data. Additionally, two novel post-sample encoders (linear wire and Archimedean spiral) were considered. This enabled spatial discrimination of unknown samples along a primary axis and material identification for conventional XRD techniques. Combination of FCG with an absorbing edge post-sample encoder indicated discrimination between converging and diverging FCG scattering maxima. This ability can enable interpretation of single FCG images, as well as depth information of unknown samples within an inspection volume (e.g. airport luggage), hence enabling material identification. / © Cranfield University 2014
2

Development of focal geometry with non-ideal samples

Prokopiou, D. M. January 2015 (has links)
A novel geometry for powder X-ray diffraction (XRD), termed ‘focal construct geometry’ (FCG) is introduced and developed with both non-ideal samples and non-ideal sample conditions. FCG utilises an annular beam that has the unique feature of ‘focusing’ scattering maxima at single loci along a primary axis, hence offering diffraction data of enhanced intensity. This main advantage of FCG can be used within fields in need of rapid material identification, such as security screening in airports. A theoretical comparison between FCG and conventional transmission mode XRD showed that even though FCG suffers from broader diffraction peaks, an alternative approach to FCG data interpretation has the potential to provide narrower scattering maxima than conventional XRD. However, in order to employ this approach, discrimination between converging and diverging FCG scattering maxima is essential. Peak broadening was investigated by altering various aspects of FCG instrumentation components by either pencil beam XRD or FCG, indicating broad diffraction peaks independent of the beam geometry employed. Development of FCG resulted in the successful analysis of non-ideal samples, such as non-crystalline liquid samples, samples exhibiting preferred orientation and samples with large grain size, demonstrating advantages over conventional XRD. Furthermore, ideal samples (in terms of crystallinity, preferred orientation and grain size) were analysed by FCG under non-ideal conditions. This involved randomly orientating a single planar sample with respect to the primary axis, contrary to previous research that present FCG with a single planar sample normal to the primary axis. Sample rotation resulted in FCG scattering maxima with different xyz coordinates depending on the degree, axis and direction of rotation. Moreover, FCG analysis of multiple samples (normal to the primary axis) showed that as with all XRD arrangements, a priori knowledge of the samples’ position along the primary axis is required for effective data analysis. Investigation into the ability of FCG’s annular beam to act as a pre-sample coded aperture demonstrated an alternative method to interpret FCG images by recovering conventional XRD data. Additionally, two novel post-sample encoders (linear wire and Archimedean spiral) were considered. This enabled spatial discrimination of unknown samples along a primary axis and material identification for conventional XRD techniques. Combination of FCG with an absorbing edge post-sample encoder indicated discrimination between converging and diverging FCG scattering maxima. This ability can enable interpretation of single FCG images, as well as depth information of unknown samples within an inspection volume (e.g. airport luggage), hence enabling material identification.
3

Risk Assessment of Aviation Security and Evaluation of Aviation Security Policies

Yalcinkaya, Ramazan 08 1900 (has links)
Comprising many airplanes, airports, aircrew, and employees, aviation industry is a large sector that is very vulnerable to attacks, whether it is from terrorists or criminals. Aviation history is fraught with examples of airport bombings, hijackings, and sabotage terrorist attacks. The most destructive of which is the tragedy of September 11, 2001, the cornerstone of today's aviation security policies. This study uses risk assessment tools to determine the dimensions of danger and threats against the aviation industry and addresses how vulnerable the aviation sector is. After vulnerabilities and threats are examined, possible impacts of attacks against the aviation security are discussed. This study also explores the pre and post September 11 policies that governments and policy makers develop to reduce risks in aviation sector. In addition, it discusses weaknesses and strengths of these policies which surfaced during the implementations. Finally, this study proposes some recommendations based on vulnerabilities and threats of aviation security.
4

Privacy Concerns Regarding the Use of Biometrics in Trusted Traveler Programs

Merlano, Shari 01 January 2016 (has links)
One of the objectives of the U.S. government is to balance the individual’s right to privacy and national security interests. Trusted Traveler programs create a risk-based security model where the traveling public is categorized into low or high risk. There are, however, some privacy concerns related to the acceptance of the use of biometric technology in the adoption of expedited security screening procedures in commercial airports. The theoretical construct of this case study of the TSA Pre-Check Program is based on Ajzen and Fischbein’s theory of reasoned action, specifically through Davis’ technology acceptance model. The purpose of this case study was to explore the perceptions of the traveling public regarding the protection of privacy and the use of biometric technologies. Data for this study included 325 social media postings, 50 privacy complaints reported to the Department of Homeland Security between 2009 and 2014, and publicly available data from the Government Accountability Office about expedited screening for the years 2011 – 2014. Data were coded into a priori themes and then subjected to a content analysis procedure. Findings indicate that the traveling public generally support expedited security screening and consent to waiving certain privacy rights in order to facilitate expedited screening. Complaints from travelers were also primarily related to wait times and secondary screening, and not privacy concerns. The positive social change implications stemming from this study include recommendations to the TSA to expand the Trusted Traveler programs such that the primary concern of the traveling public, reduction of wait time is balanced against privacy concerns about the collection of biometric data as part of a measured response to aviation security.
5

Anomalous Behavior Detection in Aircraft based Automatic Dependent Surveillance–Broadcast (ADS-B) system using Deep Graph Convolution and Generative model (GA-GAN)

Kenaudekar, Jayesh January 2022 (has links)
The Automatic Dependent Surveillance-Broadcast (ADS-B) is a key component of the Next Generation Air Transportation System (Next Gen) that manages the increasingly congested airspace and operation. From Jan 2020, the U.S. Federal Aviation Administration (FAA) mandated the use of (ADS-B) as a key component of Next Gen project. ADS-Bprovides accurate aircraft localization via satellite navigation and efficient air traffic management, and also improves the safety of thousands of passengers travelling worldwide. While the benefits of ADS-B are well known, the fact that ADS-B is an open protocol introduces various exploitable security vulnerabilities. One practical threat is the ADS-B spoofing attack that targets the ground station, in which the ground-based attacker manipulates the International Civil Aviation Organization (ICAO) address (which is a unique identifierfor each aircraft) in the ADS-B forwarded messages to fake the appearance of non-existent aircraft or masquerade as a trusted aircraft. As a result, this type of attack can confuseand misguide the aircraft pilots or the air traffic control personnel and cause dangerous maneuvers. In this project, we intend to build a robust Intrusion Detection System (IDS) to detectanomalous behavior and classify attacks in an aircraft ADS-B protocol in real time duringair-ground communication. The IDS system we propose is a 3 stage deep learning framework built using Spatial Graph Convolution Networks and Deep auto-regressive generative model. In stage 1 we use a Graph convolution network architecture to classify the dataas attacked or normal in the entire airspace of an operating aircraft. In stage 2 we analyze the sequences of air-space states to identify anomalies using a generative Wavenet modeland simultaneously output feature under attack. Final stage consist of aircraft (ICAO) classification module based on unique RF transmitter signal characteristics of an aircraft. This allows the ground station operator to examine each incoming message based on the Phylayer features as well as message data field (such as, position, velocity, altitude) and flagsuspicious messages. The model is trained in a supervised fashion using federated learning where the data remains private to the data owner, i.e.: aircraft-ground station without data being explicitly sent to the cloud server. The server only receives the learned parameters for inference, there by training the entire model on the edge, thus preserving data-privacyand potential adversarial attacks. We aim to achieve a high precision real-time IDS system, with very low false alarm rate for real world deployment
6

Hacking the airport X-ray machine

Zuber, Felix January 2024 (has links)
Recent and frequent reports of important systems being hacked are being presented almost daily, and the fact that our digitized society has fallen behind on securing these systems is becoming more and more obvious. Vital infrastructure - systems that we depend on for our safety. The security of these systems is of utmost importance, but how well are they protected? Even systems that are supposed to be isolated and never exposed to the general public have shown through history to be vulnerable. This thesis analyzed the security of such a vital system, namely a common unit among X-ray security scanners (Smiths Detection HI-SCAN 6040i) that are not only used by airports to search bags and belongings but also by an increasing multitude of applications such as prisons, jails, courts, government buildings, hotels and public events. In order to structure the work and present the attack vectors, a threat model was determined for the target system. In total, 11 vulnerabilities were found in the system. Most of them grant access to the X-ray machine, where it is also possible to escalate privileges to root access. This work will also show that once one has gained access to the network connecting these machines, there are multiple paths to gaining full access to the system. When access has then been obtained, it will also be demonstrated how to manipulate the scanning function of the X-ray machine in such a way that one could bring prohibited items through the security checkpoint unknowingly of the security operators, concluding that the system is vulnerable and that the impact of successful exploitation could have catastrophic consequences. / Nya rapporter om samhällsviktiga system som blivit hackade kommer hela tiden, och faktumet att vårat digitaliserade samhälle har hamnat på efterkälken med att säkra upp dessa system blir mer och mer tydligt. Kritisk infrastruktur - system som vi är beroende av för vår säkerhet. Säkerheten i dessa system är av yttersta betydelse, men hur säkra är dem? Även system förment att vara isolerade och aldrig exponerade för allmänheten har visat sig genom historien vara sårbara. Denna uppsats har analyserat säkerheten för att sådant kritiskt system, nämligen ett vanligt använt röntgenanalyssystem (Smiths Detection HI-SCAN 6040i) som används frekvent på flygplatser för att skanna handbagage men finns även på en tilltagande skara sektorer såsom kriminalvårdsanstalter, häkten, domstolar, samhällsviktiga byggnader, hotel och publika evenemang. I syfte att strukturera arbetet samt att presentera attackvektorerna, bestämdes en hotmodell för målsystemet. Totalt hittades 11 sårbarheter i systemet. De flesta av dem resulterade i tillträde till röntgenmaskinen, där det även var möjligt att eskalera privilegierna till root-behörighet. Det här arbetet kommer även visa att när tillträde erhållits till nätverket som sammankopplar dessa maskiner, så finns det flera vägar att nå full tillgång till systemet. När sådan tillgång erhållits, kommer det även demonstreras hur det är möjligt att manipulera skanningsfunktionen på röntgenmaskinen på ett sådant sätt att det vore möjligt att få igenom otillåtna föremål genom säkerhetskontrollen utan att säkerhetspersonalen märker någonting. Slutsatsen blir att systemet är sårbart och att resultatet av att framgångsrikt utnyttja en sådan sårbarhet kan få katastrofala konsekvenser.
7

The impact of the application of international air cargo security regulations in South Africa

Nevo, Eitan Manuel Damian January 2015 (has links)
Text in English / This research project, within the context of security risk management in general and aviation security in particular, aimed to explore the impact of the application of international and local air cargo security regulations on South Africa, with specific reference to the regulations of the International Civil Aviation Organisation (ICAO), as well as the European Union (EU) and the United States of America (USA). In South Africa, since the early 2000s, the South African Civil Aviation Authority (SACAA) has been the lead agency for dealing with and managing the needs for air cargo security. This oversight by SACAA culminated in 2009 with the promulgation of the SACAA Regulation commonly known as Part 108. Accordingly the primary research focus was on the impact Part 108 has had on the air cargo industry in South Africa. In addition, it compared the South African regulations with those of the USA and EU regulations; explored the compliance of the various roleplayers; sought to understand the enforcement of the regulations; and examined the effectiveness of the available security and screening methods. Furthermore, the research attempted to determine whether these regulations had any effect on preventing or deterring crime in the air cargo sector. / Criminology and Security Science / M. Tech. (Security Management)
8

Analyse de l'évolution de l'Administration canadienne de la sûreté du transport aérien

Chaparro, Natalia 08 1900 (has links)
La présente étude a analysé l’évolution de l’Administration Canadienne de la Sureté du Transport Aérien (ACSTA) depuis sa mise en place jusqu’aujourd’hui, ainsi que les acteurs individuels ou institutionnels impliqués dans ce processus. L’ACSTA gravite dans un champ organisationnel ‐ensemble d’organisations qui constituent un domaine reconnu de la vie institutionnelle (DiMaggio et Powell, 1983)-­ au sein duquel agissent différents acteurs qui ont influencé non seulement sa création, mais qui ont continué à jouer un rôle important tout au long de son évolution. Nous avons défini le champ de la sûreté aérienne et au sein de celui‐ci, nous avons analysé les mécanismes institutionnels, tout en identifiant et définissant le rôle des différents acteurs en présence. Il ressort de nos analyses que principalement deux types de contraintes institutionnelles (DiMaggio et Powell, 1983) ont influencé la création et le développement de l’ACSTA. Premièrement, mis à part les contraintes coercitives émanant de la règlementation internationale de l’Organisation de l’Aviation Civile Internationale, il apparait que d’autres contraintes du même type proviennent du gouvernement américain, par le biais de pressions visant à la mise en place de mesures sécuritaires, tant au moment de la création que tout le long de l’évolution de l’organisation. Il est à noter, cependant, le rôle du terrorisme et des tentatives d’attentat comme provocant de telles contraintes. Deuxièmement, nous avons identifié des contraintes du type normatif, c’est-à‐dire celles qui proviennent des valeurs, des normes et du bagage professionnel lié à la sécurité et à la sureté aérienne. Il apparait que les contraintes normatives agissent constamment alors que les contraintes coercitives surgissent ponctuellement tout au long de la période analysée. / This study analyzed the evolution of the Canadian Air Transport Security Administration (CATSA) since its creation up to today, as well as the individual and / or institutional actors implied in this process. CATSA gravitates in an organizational field ‐the group of organizations that constitute a recognized area of institutional life (DiMaggio and Powell, 1983)- in which different actors, who not only influenced its creation, continued to play an important role all along its evolution. We have defined the air transport security field and within, we have analyzed the institutional mechanisms while identifying and defining the role of the different actors. Our analysis suggests that mainly two types of institutional isomorphisms (DiMaggio and Powell, 1983) have influenced the creation and the evolution of CATSA. Besides the coercive constraints coming from the International Civil Aviation Organization’s international regulation, it appears that other similar pressures emanate from the government of the United States by the means of coercive isomorphism, aiming the establishment of security measures all along CATSA’s evolution. It should be noted, however, the role of terrorists and their attempts to attack, as the catalyst actors and events of such coercive isomorphism. Second of all, we have also identified normative pressures originating from the values and standards from the professional network, or branch, linked to air transport security. It appears that the normative pressures appear regularly, while the coercive pressures emerge punctually all along the analyzed time period.
9

Analyse de l'évolution de l'Administration canadienne de la sûreté du transport aérien

Chaparro, Natalia 08 1900 (has links)
La présente étude a analysé l’évolution de l’Administration Canadienne de la Sureté du Transport Aérien (ACSTA) depuis sa mise en place jusqu’aujourd’hui, ainsi que les acteurs individuels ou institutionnels impliqués dans ce processus. L’ACSTA gravite dans un champ organisationnel ‐ensemble d’organisations qui constituent un domaine reconnu de la vie institutionnelle (DiMaggio et Powell, 1983)-­ au sein duquel agissent différents acteurs qui ont influencé non seulement sa création, mais qui ont continué à jouer un rôle important tout au long de son évolution. Nous avons défini le champ de la sûreté aérienne et au sein de celui‐ci, nous avons analysé les mécanismes institutionnels, tout en identifiant et définissant le rôle des différents acteurs en présence. Il ressort de nos analyses que principalement deux types de contraintes institutionnelles (DiMaggio et Powell, 1983) ont influencé la création et le développement de l’ACSTA. Premièrement, mis à part les contraintes coercitives émanant de la règlementation internationale de l’Organisation de l’Aviation Civile Internationale, il apparait que d’autres contraintes du même type proviennent du gouvernement américain, par le biais de pressions visant à la mise en place de mesures sécuritaires, tant au moment de la création que tout le long de l’évolution de l’organisation. Il est à noter, cependant, le rôle du terrorisme et des tentatives d’attentat comme provocant de telles contraintes. Deuxièmement, nous avons identifié des contraintes du type normatif, c’est-à‐dire celles qui proviennent des valeurs, des normes et du bagage professionnel lié à la sécurité et à la sureté aérienne. Il apparait que les contraintes normatives agissent constamment alors que les contraintes coercitives surgissent ponctuellement tout au long de la période analysée. / This study analyzed the evolution of the Canadian Air Transport Security Administration (CATSA) since its creation up to today, as well as the individual and / or institutional actors implied in this process. CATSA gravitates in an organizational field ‐the group of organizations that constitute a recognized area of institutional life (DiMaggio and Powell, 1983)- in which different actors, who not only influenced its creation, continued to play an important role all along its evolution. We have defined the air transport security field and within, we have analyzed the institutional mechanisms while identifying and defining the role of the different actors. Our analysis suggests that mainly two types of institutional isomorphisms (DiMaggio and Powell, 1983) have influenced the creation and the evolution of CATSA. Besides the coercive constraints coming from the International Civil Aviation Organization’s international regulation, it appears that other similar pressures emanate from the government of the United States by the means of coercive isomorphism, aiming the establishment of security measures all along CATSA’s evolution. It should be noted, however, the role of terrorists and their attempts to attack, as the catalyst actors and events of such coercive isomorphism. Second of all, we have also identified normative pressures originating from the values and standards from the professional network, or branch, linked to air transport security. It appears that the normative pressures appear regularly, while the coercive pressures emerge punctually all along the analyzed time period.
10

The impact of the application of international air cargo security regulations in South Africa

Nevo, Eitan Manuel Damian January 2015 (has links)
Text in English / This research project, within the context of security risk management in general and aviation security in particular, aimed to explore the impact of the application of international and local air cargo security regulations on South Africa, with specific reference to the regulations of the International Civil Aviation Organisation (ICAO), as well as the European Union (EU) and the United States of America (USA). In South Africa, since the early 2000s, the South African Civil Aviation Authority (SACAA) has been the lead agency for dealing with and managing the needs for air cargo security. This oversight by SACAA culminated in 2009 with the promulgation of the SACAA Regulation commonly known as Part 108. Accordingly the primary research focus was on the impact Part 108 has had on the air cargo industry in South Africa. In addition, it compared the South African regulations with those of the USA and EU regulations; explored the compliance of the various roleplayers; sought to understand the enforcement of the regulations; and examined the effectiveness of the available security and screening methods. Furthermore, the research attempted to determine whether these regulations had any effect on preventing or deterring crime in the air cargo sector. / Criminology and Security Science / M. Tech. (Security Management)

Page generated in 0.1318 seconds