Optimising multi-layered security screening

نویسندگان

چکیده

Abstract Screening for prohibited items at airports is an example of a multi-layered screening process. Multiple layers – often comprising different technologies with complementary strengths and weaknesses are combined to create single The detection performance the overall system depends on multiple factors, including individual layers, complementarity decision rule(s) determining how outputs from combined. aim this work understand optimise Novel aspects include use realistic profiles alarm distributions based experimental observations focus influence correlation/orthogonality amongst screening. results show that cumulative architecture can outperform cascading one, yielding significant increase in system-level true positive rate only modest false rate. A process also more resilient layers. using approach maximised when positives orthogonal across correlated. process, other hand, both as possible. cost ignoring orthogonality between explored some numerical examples. underlying software model provided Jupyter Notebook supplementary material.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Multi-Layered Cryptographic Processor for Network Security

This paper presents a multi-layered architecture for the security of network and data using a layered structure of cryptographic algorithms. This architecture gives benefit of low area and high speed requirement. This paper mainly concern for security so architecture is designed in layers to avoid the possibilities of invasion from outsiders. This paper implements a combination of Private-Publi...

متن کامل

Optimising information security decision making

........................................................................................................................................ 1 Acknowledgements .................................................................................................................... 3 Table of

متن کامل

Analysing Security and Software Requirements using Multi-Layered Iterative Model

Nowadays, security is of great concern for any organization developing software systems for various requirements. Moreover, the same becomes more complicated during integration of security measures with agile software development methodology due to its lightweight informal nature. The requirements engineering is considered as one of the key element associated with any software development proce...

متن کامل

Evolving Security Requirements in Multi-layered Service-Oriented-Architectures

Due to today’s rapidly changing corporate environments, business processes are increasingly subject to dynamic configuration and evolution. The evolution of new deployment architectures, as illustrated by the move towards mobile platforms and the Internet Of Services, and the introduction of new security regulations (imposed by national and international regulatory bodies, such as SOX or BASEL)...

متن کامل

LES: Layered Encryption Security

In this paper we discuss the concept of Layered Encryption Security(LES). We analyze the need for introducing layering in a security infrastructure. Layered encryption provides us the ability to selectively disclose different parts of data to different parties that might be interested in it without compromising the security of the other parts. We have implemented a simple prototype implementati...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Journal of Transportation Security

سال: 2021

ISSN: ['1938-775X', '1938-7741']

DOI: https://doi.org/10.1007/s12198-021-00237-3