This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
Protecting Transportation Infrastructure
September/October 2007 (vol. 22 no. 5)
pp. 8-11
Daniel Zeng, University of Arizona
Sudarshan S. Chawathe, University of Maine
Hua Huang, Xi'an Jiaotong University
Fei-Yue Wang, Chinese Academy of Sciences
Transportation infrastructures are a key component of a nation's critical infrastructures, covering physical assets such as airports, ports, and railway and mass transit networks as well as software systems such as traffic control systems. Because physical transportation networks attract large numbers of people, they're also high-value targets for terrorists intending to inflict heavy casualties. Protecting transportation infrastructure provides a potentially fruitful application domain for many subdisciplines of AI and closely related fields. The authors review research challenges in this domain.

1. Commission of the European Communities, Critical Infrastructure Protection in the Fight against Terrorism, Communication from the Commission to the Council and the European Parliament, Oct. 2004; http://eur-lex.europa.eu/LexUriServ/site/ en/com/2004com2004_0702en01.pdf.
2. Committee on Science and Technology for Countering Terrorism, Nat'l Research Council, Making the Nation Safer: The Role of Science and Technology in Countering Terrorism, Nat'l Academies Press, 2002.
3. W.M. Biersack et al., "An Infrastructure Vulnerability Assessment Methodology for Metropolitan Areas," Proc. 36th Ann. Int'l Carnahan Conf. Security Technology, IEEE Press, 2002, pp. 29–34.
4. S. Greiper and M. Sauter, "Beyond Aviation: The Emerging Ground Transportation Security Market," market report, Legend Merchant Group, Sept. 2006; http://legendmerchant.com/docs/20062006-09-BeyondAviation.pdf .
5. S.F. Hallowell and P.Z. Jankowski, "Transportation Security Technologies Research and Development," Proc. IEEE Military Communications Conf. (MILCOM05), IEEE Press, 2005, pp. 1753–1756.
6. M.L. Jensen et al., "Identification of Deceptive Behavioral Cues Extracted from Video," Proc. 8th Int'l IEEE Conf. Intelligent Transportation Systems (ITS 05), IEEE Press, 2005, pp. 1135–1140.
7. H. Niels and S. Khurram, "Automatic Visual Analysis for Transportation," Proc. IEEE Conf. Technologies for Homeland Security, IEEE Press, 2007, pp. 13–18.
8. US General Accounting Office, "National Preparedness: Integrating New and Existing Technology and Information Sharing into an Effective Homeland Security Strategy," Congressional Testimony, GAO-02-811T, 7 June 2002.
9. H. Chen, F.-Y. Wang, and D. Zeng, "Intelligence and Security Informatics for Homeland Security: Information, Communication, and Transportation," IEEE Trans. Intelligent Transportation Systems, vol. 5, no. 4, 2004, pp. 329–341.
10. E.V. Jones et al., "Virginia's Critical Infrastructure Protection Study," Proc. 2003 IEEE Systems and Information Eng. Design Symp., IEEE Press, 2003, pp. 177–182.

Index Terms:
AI, homeland security, security, transportation
Citation:
Daniel Zeng, Sudarshan S. Chawathe, Hua Huang, Fei-Yue Wang, "Protecting Transportation Infrastructure," IEEE Intelligent Systems, vol. 22, no. 5, pp. 8-11, Sept.-Oct. 2007, doi:10.1109/MIS.2007.92
Usage of this product signifies your acceptance of the Terms of Use.