Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Engineering (51)
- Physical Sciences and Mathematics (48)
- Law (45)
- Computer Law (43)
- Computer Sciences (43)
-
- Information Security (43)
- Social and Behavioral Sciences (43)
- Legal Studies (32)
- Computer Engineering (31)
- Electrical and Computer Engineering (31)
- Forensic Science and Technology (31)
- Aviation (15)
- Education (9)
- Aviation Safety and Security (7)
- Psychology (6)
- Aerospace Engineering (5)
- Management and Operations (5)
- Cognition and Perception (4)
- Educational Assessment, Evaluation, and Research (4)
- Aerodynamics and Fluid Mechanics (3)
- Business (3)
- Curriculum and Instruction (3)
- Human Resources Management (3)
- Mechanical Engineering (3)
- Oceanography and Atmospheric Sciences and Meteorology (3)
- Risk Analysis (3)
- Applied Mathematics (2)
- Chemical Engineering (2)
- Civil and Environmental Engineering (2)
- Cognitive Psychology (2)
- Keyword
-
- Digital forensics (5)
- Aviation (4)
- Computer forensics (4)
- UAS (4)
- Drone (3)
-
- Education (3)
- Risk assessment (3)
- Safety (3)
- Collegiate aviation (2)
- Cyber forensics (2)
- Cyber-harassment (2)
- Digital Forensics (2)
- Forensic imaging (2)
- Fuzzy hashing (2)
- Midair collision (2)
- Perceptions (2)
- SMS (2)
- Survey (2)
- Technology (2)
- Training (2)
- UAV (2)
- 14 CFR 107 (1)
- 3PD (1)
- AMES (1)
- ASDA (1)
- ASRS (1)
- Abilities (1)
- Accident and Incident Data System (1)
- Addresses (1)
- Aircraft (1)
Articles 1 - 30 of 85
Full-Text Articles in Entire DC Network
Leveraging The Windows Amcache.Hve File In Forensic Investigations, Bhupendra Singh, Upasna Singh
Leveraging The Windows Amcache.Hve File In Forensic Investigations, Bhupendra Singh, Upasna Singh
Journal of Digital Forensics, Security and Law
The Amcache.hve is a registry hive file that is created by Microsoft® Windows® to store the information related to execution of programs. This paper highlights the evidential potential of Amcache.hve file and its application in the area of user activity analysis. The study uncovers numerous artifacts retained in Amcache.hve file when a user performs certain actions such as running host-based applications, installation of new applications, or running portable applications from external devices. The results of experiments demonstrate that Amcache.hve file stores intriguing artifacts related to applications such as timestamps of creation and last modification of any application; name, description, publisher …
The 2016 Analysis Of Information Remaining On Computer Hard Disks Offered For Sale On The Second Hand Market In The Uae, Thomas Martin, Andy Jones, Mohammed Alzaabi
The 2016 Analysis Of Information Remaining On Computer Hard Disks Offered For Sale On The Second Hand Market In The Uae, Thomas Martin, Andy Jones, Mohammed Alzaabi
Journal of Digital Forensics, Security and Law
This research describes our survey of data remaining on computer hard disks sold on the second hand market in the United Arab Emirates (UAE). This is a repetition of the first survey conducted in 2012 (Jones, Martin, & Alzaabi, 2012). Similar studies have been carried over the last ten years in the United Kingdom, Australia, USA, Germany and France: (Jones, Mee, Meyler, & Gooch, 2005), (Jones, Valli, Sutherland, & Thomas, 2006), (Jones, Valli, Dardick, & Sutherland, 2008), (Jones, Valli, Dardick, & Sutherland, 2009). This research was undertaken to gain insight into the volumes of data found on second-hand disks purchased …
The Impact Of Sha-1 File Hash Collisions On Digital Forensic Imaging: A Follow-Up Experiment, Gary C. Kessler
The Impact Of Sha-1 File Hash Collisions On Digital Forensic Imaging: A Follow-Up Experiment, Gary C. Kessler
Journal of Digital Forensics, Security and Law
A previous paper described an experiment showing that Message Digest 5 (MD5) hash collisions of files have no impact on integrity verification in the forensic imaging process. This paper describes a similar experiment applied when two files have a Secure Hash Algorithm (SHA-1) collision.
Table Of Contents
Journal of Digital Forensics, Security and Law
No abstract provided.
Bloom Filters Optimized Wu-Manber For Intrusion Detection, Monther Aldwairi, Koloud Al-Khamaiseh, Fatima Alharbi, Babar Shah
Bloom Filters Optimized Wu-Manber For Intrusion Detection, Monther Aldwairi, Koloud Al-Khamaiseh, Fatima Alharbi, Babar Shah
Journal of Digital Forensics, Security and Law
With increasing number and severity of attacks, monitoring ingress and egress network traffic is becoming essential everyday task. Intrusion detection systems are the main tools for capturing and searching network traffic for potential harm. Signature-based intrusion detection systems are the most widely used, and they simply use a pattern matching algorithms to locate attack signatures in intercepted network traffic. Pattern matching algorithms are very expensive in terms of running time and memory usage, leaving intrusion detection systems unable to detect attacks in real-time. We propose a Bloom filters optimized Wu-Manber pattern matching algorithm to speed up intrusion detection. The Bloom …
A Survey Of Social Network Forensics, Umit Karabiyik, Muhammed Abdullah Canbaz, Ahmet Aksoy, Tayfun Tuna, Esra Akbas, Bilal Gonen, Ramazan S. Aygun
A Survey Of Social Network Forensics, Umit Karabiyik, Muhammed Abdullah Canbaz, Ahmet Aksoy, Tayfun Tuna, Esra Akbas, Bilal Gonen, Ramazan S. Aygun
Journal of Digital Forensics, Security and Law
Social networks in any form, specifically online social networks (OSNs), are becoming a part of our everyday life in this new millennium especially with the advanced and simple communication technologies through easily accessible devices such as smartphones and tablets. The data generated through the use of these technologies need to be analyzed for forensic purposes when criminal and terrorist activities are involved. In order to deal with the forensic implications of social networks, current research on both digital forensics and social networks need to be incorporated and understood. This will help digital forensics investigators to predict, detect and even prevent …
The Impact Of Md5 File Hash Collisions On Digital Forensic Imaging, Gary C. Kessler
The Impact Of Md5 File Hash Collisions On Digital Forensic Imaging, Gary C. Kessler
Journal of Digital Forensics, Security and Law
The Message Digest 5 (MD5) hash is commonly used as for integrity verification in the forensic imaging process. The ability to force MD5 hash collisions has been a reality for more than a decade, although there is a general consensus that hash collisions are of minimal impact to the practice of computer forensics. This paper describes an experiment to determine the results of imaging two disks that are identical except for one file, the two versions of which have different content but otherwise occupy the same byte positions on the disk, are the same size, and have the same hash …
A New Distributed Chinese Wall Security Policy Model, Saad Fehis, Omar Nouali, Mohand-Tahar Kechadi
A New Distributed Chinese Wall Security Policy Model, Saad Fehis, Omar Nouali, Mohand-Tahar Kechadi
Journal of Digital Forensics, Security and Law
The application of the Chinese wall security policy model (CWSPM) to control the information flows between two or more competing and/or conflicting companies in cloud computing (Multi-tenancy) or in the social network, is a very interesting solution. The main goal of the Chinese Wall Security Policy is to build a wall between the datasets of competing companies, and among the system subjects. This is done by the applying to the subjects mandatory rules, in order to control the information flow caused between them. This problem is one of the hottest topics in the area of cloud computing (as a distributed …
Determination Of Aqueous Surfactant Solution Surface Tensions With A Surface Tensiometer, Remelisa Esteves, Birce Dikici Ph.D, Matthew Lehman, Qayyum Mazumder, Nonso Onukwuba
Determination Of Aqueous Surfactant Solution Surface Tensions With A Surface Tensiometer, Remelisa Esteves, Birce Dikici Ph.D, Matthew Lehman, Qayyum Mazumder, Nonso Onukwuba
Beyond: Undergraduate Research Journal
Surfactant solutions are applicable to engineering systems for cooling equipment for electronics. Surfactants can be added to water to improve heat transfer. An application of using aqueous surfactant solutions can be through microchannel heat sink. Although it is ideal to redesign these systems to reduce heat, it is a costly method. Surfactant solutions at optimal solution concentration can be able to transfer heat quickly and effectively with minimum expense. The surface tension of surfactant solutions is an important parameter for boiling heat transfer and must be taken into consideration. The purpose of this research is to measure surface tension of …
Stem Education Discrepancy In The United States And Singapore, Elizabeth K. Worsham, Aaron Clevenger, Kelly A. Whealan-George
Stem Education Discrepancy In The United States And Singapore, Elizabeth K. Worsham, Aaron Clevenger, Kelly A. Whealan-George
Beyond: Undergraduate Research Journal
One of the hottest topics over the past several years has been science, technology, engineering and mathematics (STEM) education. The United States is lagging behind in the STEM education rankings as compared to its counterparts in Europe and Asia, including Singapore, ranked second overall in math and science based on the Program of International Student Assessment. Even as such a small country, Singapore has one of the best education systems in the world, one of the busiest ports, and is a leader in the science and technology market. One factor of this is the family life and the culture that …
Determination Of Surfactant Solution Viscosities With A Rotational Viscometer, Remelisa Esteves, Nonso Onukwuba, Birce Dikici Ph.D
Determination Of Surfactant Solution Viscosities With A Rotational Viscometer, Remelisa Esteves, Nonso Onukwuba, Birce Dikici Ph.D
Beyond: Undergraduate Research Journal
Aqueous surfactant solutions are used in engineering systems for improving boiling heat transfer. The purpose of this research is to determine the viscosities of surfactant solutions and to investigate the effect of composition on viscosity. The results obtained can possibly be used as reference for further study in the effects of surfactant solution viscosities on nucleate boiling. A rotational viscometer was used to determine the viscosities of three surfactant solutions – SLS, EH-14, and SA-9 – of various compositions at room temperature. It was discovered that the viscosities of SLS, EH-14, and SA-9 had a nearly consistent pattern as their …
Sms Derived Vs. Public Perceived Risk In Aviation Technology Acceptance (Literature Review), Paul L. Myers Iii
Sms Derived Vs. Public Perceived Risk In Aviation Technology Acceptance (Literature Review), Paul L. Myers Iii
International Journal of Aviation, Aeronautics, and Aerospace
Aviation technology progressed from the first airplane flight to landing on the moon in just 63 years with continued progress today. Thus, organizations like commercial airlines and the National Aeronautics and Space Agency (NASA) that use a Safety Management System (SMS) are periodically implementing technology changes. Typically, two different processes are used to derive SMS and public perceived risk. Disparity between the two processes coupled with dissimilar influencing factors has, at times, frequently slowed or halted technology implementation. Understanding both processes and influencing factors using a literature review allows for a more proactive approach in implementing technology, aids in gauging …
A Validation Of The Efficacy Of Descriptive Instrumental Collective Case Study Research Methodology For Examining Pilot Cognitive Functioning, Clint R. Balog
A Validation Of The Efficacy Of Descriptive Instrumental Collective Case Study Research Methodology For Examining Pilot Cognitive Functioning, Clint R. Balog
International Journal of Aviation, Aeronautics, and Aerospace
The research conducted developed a descriptive understanding of how the cognitive processes of risk assessment, problem solving, and decision making, as well as other supportive processes, are employed by pilots-in-command (PICs) during the experience of extended, extreme, in-flight emergencies. This understanding is then applied to similar dynamic, operational environments. The research also validated the applicability and efficacy of Robert Stake’s 1995 descriptive, instrumental, collective case study methodology as a tool for investigating such phenomenon and developing such an understanding. Specifically, the research details the necessary procedures for employing this methodology successfully, and provides example of those procedures, and their results, …
Stress Coping Strategies In Indian Military Pilots-Preliminary Observations, Catherine Joseph
Stress Coping Strategies In Indian Military Pilots-Preliminary Observations, Catherine Joseph
International Journal of Aviation, Aeronautics, and Aerospace
ABSTRACT
In aviators, stress coping has been linked to flying performance and has a bearing on flight safety and mission effectiveness. The objective of this research was to study coping strategies utilized by Indian military pilots. A sample of 160 military pilots was asked to complete a demographic data sheet and the Stress Coping Checklist. Preliminary findings suggest that, Indian pilots use flexible problem and emotion focussed coping strategies. This issue needs to be taken into account in both occupational and clinical realms of future research investigations on aviators.
Applying The Technology Acceptance Model To Understand Aviation Students’ Perceptions Toward Augmented Reality Maintenance Training Instruction, Yu Wang, Amadou Anne, Tim Ropp
Applying The Technology Acceptance Model To Understand Aviation Students’ Perceptions Toward Augmented Reality Maintenance Training Instruction, Yu Wang, Amadou Anne, Tim Ropp
International Journal of Aviation, Aeronautics, and Aerospace
Augmented Reality (AR) Technology, since its inception, has been enhanced significantly by software and hardware developers, and has been widely utilized in various fields such as manufacturing, entertainment, architecture, commerce and education. In recent years, maintenance instructions developed on the basis of AR technology have demonstrated their potential to positively impact maintenance training and technical tasks in aviation. Features of AR maintenance instructions include interactive content, user-friendly operation interface, enhanced visualization and real-time data feeds. The researchers conducted a case study of forty-one aviation maintenance students at a Midwestern university. The purpose of this study was twofold: to evaluate the …
Investigation Into Unmanned Aircraft System Incidents In The National Airspace System, Rohan S. Sharma
Investigation Into Unmanned Aircraft System Incidents In The National Airspace System, Rohan S. Sharma
International Journal of Aviation, Aeronautics, and Aerospace
With the promulgation of Federal Aviation Regulations for small unmanned aircraft systems, the volume of unmanned flight operations is expected to increase, which demands an analysis of potential hazards to the National Airspace System. Descriptive statistics were used to investigate reports archived in the Aviation Safety Information and Analysis and Sharing system involving unmanned aircraft systems, as well as the FAA UAS Sightings Reports database. The frequency of reports involving airspace violations, and Near Mid-air Collisions by unmanned aircraft systems as well as an analysis of the location, sponsor category, phase of flight, altitude, and airspace type in which the …
Table Of Contents
Journal of Digital Forensics, Security and Law
No abstract provided.
Special Issue On Cyberharassment Investigation: Advances And Trends, Joanne Bryce, Virginia N. L. Franqueira, Andrew Marrington
Special Issue On Cyberharassment Investigation: Advances And Trends, Joanne Bryce, Virginia N. L. Franqueira, Andrew Marrington
Journal of Digital Forensics, Security and Law
Empirical and anecdotal evidence indicates that cyberharassment is more prevalent as the use of social media becomes increasingly widespread, making geography and physical proximity irrelevant. Cyberharassment can take different forms (e.g., cyberbullying, cyberstalking, cybertrolling), and be motivated by the objectives of inflicting distress, exercising control, impersonation, and defamation. Little is currently known about the modus operandi of offenders and their psychological characteristics. Investigation of these behaviours is particularly challenging because it involves digital evidence distributed across the devices of both alleged offenders and victims, as well as online service providers, sometimes over an extended period of time. This special issue …
Differentiating Cyberbullies And Internet Trolls By Personality Characteristics And Self-Esteem, Lauren A. Zezulka, Kathryn C. Seigfried-Spellar
Differentiating Cyberbullies And Internet Trolls By Personality Characteristics And Self-Esteem, Lauren A. Zezulka, Kathryn C. Seigfried-Spellar
Journal of Digital Forensics, Security and Law
Cyberbullying and internet trolling are both forms of online aggression or cyberharassment; however, research has yet to assess the prevalence of these behaviors in relationship to one another. In addition, the current study was the first to investigate whether individual differences and self-esteem discerned between self-reported cyberbullies and/or internet trolls (i.e., Never engaged in either, Cyberbully-only, Troll-only, Both Cyberbully and Troll). Of 308 respondents solicited from Mechanical Turk, 70 engaged in cyberbullying behaviors, 20 engaged in only trolling behaviors, 129 self-reported both behaviors, and 89 self-reported neither behavior. Results yielded low self-esteem, low conscientiousness, and low internal moral values for …
The Impact Of Low Self-Control On Online Harassment: Interaction With Opportunity., Hyunin Baek, Michael M. Losavio, George E. Higgins
The Impact Of Low Self-Control On Online Harassment: Interaction With Opportunity., Hyunin Baek, Michael M. Losavio, George E. Higgins
Journal of Digital Forensics, Security and Law
Developing Internet technology has increased the rates of youth online harassment. This study examines online harassment from adolescents with low self-control and the moderating effect of opportunity. The data used in this study were collected by the Korea Institute of Criminology in 2009. The total sample size was 1,091. The results indicated that low self-control, opportunity, and gender have a significant influence on online harassment. However, these results differed according to gender; for males, low self-control significantly impacted online harassment; for females, however, only low self-control significantly impacted online harassment. Furthermore, the interaction between low self-control and opportunity did not …
Toward Online Linguistic Surveillance Of Threatening Messages, Brian H. Spitzberg, Jean Mark Gawron
Toward Online Linguistic Surveillance Of Threatening Messages, Brian H. Spitzberg, Jean Mark Gawron
Journal of Digital Forensics, Security and Law
Threats are communicative acts, but it is not always obvious what they communicate or when they communicate imminent credible and serious risk. This paper proposes a research- and theory-based set of over 20 potential linguistic risk indicators that may discriminate credible from non-credible threats within online threat message corpora. Two prongs are proposed: (1) Using expert and layperson ratings to validate subjective scales in relation to annotated known risk messages, and (2) Using the resulting annotated corpora for automated machine learning with computational linguistic analyses to classify non-threats, false threats, and credible threats. Rating scales are proposed, existing threat corpora …
A Legal Examination Of Revenge Pornography And Cyber-Harassment, Thomas Lonardo, Tricia Martland, Doug White
A Legal Examination Of Revenge Pornography And Cyber-Harassment, Thomas Lonardo, Tricia Martland, Doug White
Journal of Digital Forensics, Security and Law
This paper examines the current state of the statutes in the United States as they relate to cyber-harassment in the context of "revenge porn". Revenge porn refers to websites which cater to those wishing to exploit, harass, or otherwise antagonize their ex partners using pornographic images and videos which were obtained during their relationships. The paper provide examples and illustrations as well as a summary of current statute in the United States. The paper additionally explores some of the various legal remedies available to victims of revenge pornography.
Seeing The Threat: Pilot Visual Detection Of Small Unmanned Aircraft Systems In Visual Meteorological Conditions, Jon M. Loffi, Ryan J. Wallace, Jamey D. Jacob, Jared C. Dunlap
Seeing The Threat: Pilot Visual Detection Of Small Unmanned Aircraft Systems In Visual Meteorological Conditions, Jon M. Loffi, Ryan J. Wallace, Jamey D. Jacob, Jared C. Dunlap
International Journal of Aviation, Aeronautics, and Aerospace
One key challenge of integrating Unmanned Aircraft Systems (UAS) platforms into the National Airspace System (NAS) is the potential for midair collisions between manned aircraft and the unmanned system. The lack of an established UAS benchmark for Detect, Sense & Avoid Systems put the preponderance of avoidance efforts on manned aircraft pilots to visually see and avoid potential collision threats. The small size, unusual configurations, and diverse operational applications of unmanned systems make UAS platforms difficult to visually identify. This paper sought to determine the mean visibility distance of small UAS systems (sUAS) to an alerted pilot flying a general …
Breakdown Of Itcz-Like Pv Patterns, Ajay Raghavendra, Thomas A. Guinn
Breakdown Of Itcz-Like Pv Patterns, Ajay Raghavendra, Thomas A. Guinn
Beyond: Undergraduate Research Journal
The Inter-Tropical Convergence Zone (ITCZ) is a zonal belt of intense convection, responsible for the genesis of over 80% of all tropical cyclones. This region of intense diabatic heating and shear results in a maximum of Ertel's potential vorticity (PV) meeting Rayleigh's necessary condition for barotropic instability. A fundamental issue is understanding the necessary precursor events leading to the breakdown of the ITCZ and subsequent formation of tropical cyclones. Our research examines the non-linear PV dynamics of the breakdown of both finite-length and infinite-length vorticity strips of varying widths and shapes, simulating the ITCZ found near the tropical eastern Pacific …