Articles: Recent submissions
Now showing items 521-540 of 863
-
Trusted Service Discovery Through Identity Management
(2013)Service oriented environments face threats from unauthorized clients and fake or compromised services. The threats exist both during service discovery and service invocation, and should be mitigated through the same security ... -
High assurance information exchange based on publish-subscribe and ABAC methods
(2014)The presented effort employs a combination of publish-subscribe distribution and ABAC (Attribute Based Access Control) methods to control the information exchange between security domains. It follows strictly the "separation ... -
The Integration of Trusted Platform Modules into a Tactical Identity Management System
(2013)The use of integrity protection mechanisms from a tactical Identity Management (IdM) system is the focus of this paper. While traditional identity management systems supports authentication, and some also access control, ... -
Communities of Trust in Tactical Coalition Networks
(2014)The need for information exchange between security domains has traditionally been approached through the use of guards and security labels. Although these technologies are thoroughly researched and exist in mature ... -
Should I Stay or Should I Go? Explaining Variation in Western Jihadists' Choice between Domestic and Foreign Fighting
(2013)This article studies variation in conflict theater choice by Western jihadists in an effort to understand their motivations. Some militants attack at home, whereas others join insurgencies abroad, but few scholars have ... -
'Abdallah 'Azzam and Palestine
(2013)ʿAbdallāh ʿAzzām (1941–1989) helped make jihadism more transnational by spearheading the effort to bring Muslim foreign fighters to Afghanistan in the 1980s. But why would a West Bank native devote himself to a war in ... -
On the Use of Computational Fluid Dynamics to Investigate Aerosol Dispersion in an Industrial Environment: A Case Study
(2012)Aerosol dispersion in the area surrounding an existing biological treatment facility is investigated using large-eddy simulation, with the objective to investigate the applicability of computational fluid dynamics to complex ... -
The Recruiter’s Dilemma: Signaling and Terrorist Recruitment Tactics
(2013)How do terrorists recruit? We know much about the profiles and pathways of recruits, but little about the strategies and tactics of recruiters. Such procedures matter because they help determine who joins. I highlight a ... -
Mid-infrared source with 0.2 J pulse energy based on nonlinear conversion of Q-switched pulses in ZnGeP2
(2014)Mid-infrared (3–5 μm) pulses with high energy are produced using nonlinear conversion in a ZnGeP2-based master oscillator-power amplifier, pumped by a Q-switched cryogenic Ho:YLF oscillator. The master oscillator is based ... -
Flow noise reduction from superhydrophobic surfaces
(2012)This work investigates how a highly (super)hydrophobic surface can be used to reduce turbulence-generated drag and noise on a towed streamer cable. The work is done by analyzing full-scale drag and flow noise measurements ... -
Challenges in Seafloor Imaging and Mapping With Synthetic Aperture Sonar
(2011)Synthetic aperture sonar (SAS) is emerging as an imaging technology that can provide centimeter resolution over hundreds-of-meter range on the seafloor. Although the principle of SAS has been known for more than 30 years, ... -
The Effect of Internal Wave-Related Features on Synthetic Aperture Sonar
(2015)In October 2012, the Centre for Maritime Research and Experimentation (CMRE, La Spezia, Italy) conducted trials from the NATO research vessel (RV) Alliance, off Elba Island, Italy. During this trial, data were collected ... -
Optimization Model for Robust Acquisition Decisions in the Norwegian Armed Forces
(2013)The Norwegian Defence Research Establishment (FFI) supports the Norwegian Ministry of Defence with quantitative analyses for its long-term defence planning. As part of this activity, FFI has developed a stochastic model ... -
Assessment of the dispersion of Legionella-containing aerosols from a biological treatment plant
(2011)Legionella was detected in aeration ponds (biological treatment plant) at Borregaard Ind. Ltd., Norway, and in air samples harvested directly above these ponds. Since 2005, three outbreaks of legionellosis occurred within ... -
Sum-frequency generation of high-energy and hig-beam-quality ultraviolet pulses
(2011)Sum-frequency generation of UV pulses exceeding 25 mJ and with beam quality has been demonstrated by mixing the third harmonic pulses of a flash lamp pumped 1.06 μm Nd:YAG laser with 1.7 μm pulses from an optical parametric ... -
How man-made interference might cause gas bubble emboli in deep diving whales
(2014)Recent cetacean mass strandings in close temporal and spatial association with sonar activity has raised the concern that anthropogenic sound may harm breath-hold diving marine mammals. Necropsy results of the stranded ... -
Energy Partition in Magnetic Reconnection in Earth's Magnetotail
(2013)The partition of energy flux in magnetic reconnection is examined experimentally using Cluster satellite observations of collisionless reconnection in Earth’s magnetotail. In this plasma regime, the dominant component of ... -
Temporal variability of the bioaerosol background at a subway station: Concentration level, size distribution, and diversity of airborne bacteria
(2014)Naturally occurring bioaerosol environments may present a challenge to biological detection-identification-monitoring (BIODIM) systems aiming at rapid and reliable warning of bioterrorism incidents. One way to improve the ... -
Comparative testing and evaluation of nine different air samplers: End-to-end sampling efficiencies as specific performance measurements for bioaerosol applications
(2014)Accurate exposure assessments are needed to evaluate health hazards caused by airborne microorganisms and require air samplers that efficiently capture representative samples. This highlights the need for samplers with ...