Optimising multi-layered security screening
نویسندگان
چکیده
Abstract Screening for prohibited items at airports is an example of a multi-layered screening process. Multiple layers – often comprising different technologies with complementary strengths and weaknesses are combined to create single The detection performance the overall system depends on multiple factors, including individual layers, complementarity decision rule(s) determining how outputs from combined. aim this work understand optimise Novel aspects include use realistic profiles alarm distributions based experimental observations focus influence correlation/orthogonality amongst screening. results show that cumulative architecture can outperform cascading one, yielding significant increase in system-level true positive rate only modest false rate. A process also more resilient layers. using approach maximised when positives orthogonal across correlated. process, other hand, both as possible. cost ignoring orthogonality between explored some numerical examples. underlying software model provided Jupyter Notebook supplementary material.
منابع مشابه
Multi-Layered Cryptographic Processor for Network Security
This paper presents a multi-layered architecture for the security of network and data using a layered structure of cryptographic algorithms. This architecture gives benefit of low area and high speed requirement. This paper mainly concern for security so architecture is designed in layers to avoid the possibilities of invasion from outsiders. This paper implements a combination of Private-Publi...
متن کاملOptimising information security decision making
........................................................................................................................................ 1 Acknowledgements .................................................................................................................... 3 Table of
متن کاملAnalysing Security and Software Requirements using Multi-Layered Iterative Model
Nowadays, security is of great concern for any organization developing software systems for various requirements. Moreover, the same becomes more complicated during integration of security measures with agile software development methodology due to its lightweight informal nature. The requirements engineering is considered as one of the key element associated with any software development proce...
متن کاملEvolving Security Requirements in Multi-layered Service-Oriented-Architectures
Due to today’s rapidly changing corporate environments, business processes are increasingly subject to dynamic configuration and evolution. The evolution of new deployment architectures, as illustrated by the move towards mobile platforms and the Internet Of Services, and the introduction of new security regulations (imposed by national and international regulatory bodies, such as SOX or BASEL)...
متن کاملLES: Layered Encryption Security
In this paper we discuss the concept of Layered Encryption Security(LES). We analyze the need for introducing layering in a security infrastructure. Layered encryption provides us the ability to selectively disclose different parts of data to different parties that might be interested in it without compromising the security of the other parts. We have implemented a simple prototype implementati...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of Transportation Security
سال: 2021
ISSN: ['1938-775X', '1938-7741']
DOI: https://doi.org/10.1007/s12198-021-00237-3