Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 3 of 3

Full-Text Articles in Entire DC Network

Unveiling The Digital Shadows: Cybersecurity And The Art Of Digital Forensics, Derek Beardall Jul 2023

Unveiling The Digital Shadows: Cybersecurity And The Art Of Digital Forensics, Derek Beardall

Cyber Operations and Resilience Program Graduate Projects

This paper navigates the symbiotic relationship between cybersecurity and digital forensics, exploring the profound role of digital forensic methodologies in addressing cyber incidents. Beginning with foundational definitions and historical evolution, this study delves into diverse types of methodologies and their applications across law enforcement and cybersecurity domains. The mechanics of cyber incident response illuminates the strategic orchestration of digital forensic methodologies. Amidst triumphs, challenges emerge from the shadows: swift threat evolution, digital ecosystem complexity, standardization gaps, resource limitations, and legal intricacies. Best practices guide experts through this intricate terrain, culminating in an enhanced understanding of the inseparable bond between cybersecurity …


Authentication Protocols Based On Advanced Encryption Standard (Aes), Michael Smith, Brandon Barker, Liljana Babinkostova Apr 2015

Authentication Protocols Based On Advanced Encryption Standard (Aes), Michael Smith, Brandon Barker, Liljana Babinkostova

College of Arts and Sciences Presentations

For the last three decades, hash functions have been an essential element of the cryptography used for securing computers and electronic communications. The SmartDongle is a flash drive produced by MicroWorks and is meant to secure data and assure authorized use of software. In this project, we investigate the security of certain cryptographic techniques used in the current implementation of the SmartDongle’s authentication protocol. In particular, we analyze how the use of Merkle-Damgard hash functions based on a simplified version of the Advanced Encryption Standard (AES) can affect the SmartDongle's security. Our study involves extensive computational experimentation and analysis that …


An Mpi-Cuda Implementation For Massively Parallel Incompressible Flow Computations On Multi-Gpu Clusters, Dana A. Jacobsen, Julien C. Thibault, Inanc Senocak Jan 2010

An Mpi-Cuda Implementation For Massively Parallel Incompressible Flow Computations On Multi-Gpu Clusters, Dana A. Jacobsen, Julien C. Thibault, Inanc Senocak

Mechanical and Biomedical Engineering Faculty Publications and Presentations

Modern graphics processing units (GPUs) with many-core architectures have emerged as general-purpose parallel computing platforms that can accelerate simulation science applications tremendously. While multi-GPU workstations with several TeraFLOPS of peak computing power are available to accelerate computational problems, larger problems require even more resources. Conventional clusters of central processing units (CPU) are now being augmented with multiple GPUs in each compute-node to tackle large problems. The heterogeneous architecture of a multi-GPU cluster with a deep memory hierarchy creates unique challenges in developing scalable and efficient simulation codes. In this study, we pursue mixed MPI-CUDA implementations and investigate three strategies to …