Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Computer forensics (3)
- Artificial neural networks (2)
- Cybercrime (2)
- Forensic computing (2)
- Fraud (2)
-
- Pattern recognition (2)
- Accounting curriculum development (1)
- Active Balun (1)
- Adaptive distance protection (1)
- Adaptive feedforward (1)
- Audit (1)
- Auditors (1)
- Biometric identification (1)
- Bit rate (1)
- Bluetooth (1)
- Complex analysis (1)
- Compliance (1)
- Computational intelligence (1)
- Computer crime (1)
- Computer forensics education (1)
- Computer vision (1)
- Conventional AVR (1)
- Copyright (1)
- Counter (1)
- Current Conveyors (1)
- Current-mode circuits (1)
- Cyber crime (1)
- Cyber forensics (1)
- Cyber security (1)
- Cyberforensics; Electronic Data Discovery; Electronic Records Management; Pre-Trial Discovery; Admissibility of Electronic Evidence; Information Assurance (1)
Articles 1 - 30 of 53
Full-Text Articles in Engineering
Book Review: Digital Crime And Forensic Science In Cyberspace, Gary C. Kessler
Book Review: Digital Crime And Forensic Science In Cyberspace, Gary C. Kessler
Journal of Digital Forensics, Security and Law
This issue presents the first Book Review column for the JDFSL. It is an experiment to broaden the services that the journal provides to readers, so we are anxious to get your reaction. Is the column useful and interesting? Should we include more than one review per issue? Should we also review products? Do you have suggested books/products for review and/or do you want to write a review? All of this type of feedback -- and more -- is appreciated. Please feel free to send comments to Gary Kessler (gary.kessler@champlain.edu) or Glenn Dardick (gdardick@dardick.net).
The 2006 Analysis Of Information Remaining On Disks Offered For Sale On The Second Hand Market, Andy Jones, Craig Valli, Iain Sutherland, Paula Thomas
The 2006 Analysis Of Information Remaining On Disks Offered For Sale On The Second Hand Market, Andy Jones, Craig Valli, Iain Sutherland, Paula Thomas
Journal of Digital Forensics, Security and Law
All organisations, whether in the public or private sector, use computers for the storage and processing of information relating to their business or services, their employees and their customers. A large proportion of families and individuals in their homes now also use personal computers and, both intentionally and inadvertently, often store on those computers personal information. It is clear that most organisations and individuals continue to be unaware of the information that may be stored on the hard disks that the computers contain, and have not considered what may happen to the information after the disposal of the equipment.
In …
Development Of An Ontology Based Forensic Search Mechanism: Proof Of Concept, Jill Slay, Fiona Schulz
Development Of An Ontology Based Forensic Search Mechanism: Proof Of Concept, Jill Slay, Fiona Schulz
Journal of Digital Forensics, Security and Law
This paper examines the problems faced by Law Enforcement in searching large quantities of electronic evidence. It examines the use of ontologies as the basis for new forensic software filters and provides a proof of concept tool based on an ontological design. It demonstrates that efficient searching is produced through the use of such a design and points to further work that might be carried out to extend this concept.
A Forensic Log File Extraction Tool For Icq Instant Messaging Clients, Kim Morfitt, Craig Valli
A Forensic Log File Extraction Tool For Icq Instant Messaging Clients, Kim Morfitt, Craig Valli
Journal of Digital Forensics, Security and Law
Instant messenger programs such as ICQ are often used by hackers and criminals for illicit purposes and consequently the log files from such programs are of interest in a forensic investigation. This paper outlines research that has resulted in the development of a tool for the extraction of ICQ log file entries. Detailed reconstruction of data from log files was achieved with a number of different ICQ software. There are several limitations with the current design including timestamp information not adjusted for the time zone, data could be altered, and conversations must be manually reconstructed. Future research will aim to …
A Curriculum For Teaching Information Technology Investigative Techniques For Auditors, Grover S. Kearns
A Curriculum For Teaching Information Technology Investigative Techniques For Auditors, Grover S. Kearns
Journal of Digital Forensics, Security and Law
Recent prosecutions of highly publicized white-collar crimes combined with public outrage have resulted in heightened regulation of financial reporting and greater emphasis on systems of internal control. Because both white-collar and cybercrimes are usually perpetrated through computers, internal and external auditors’ knowledge of information technology (IT) is now more vital than ever. However, preserving digital evidence and investigative techniques, which can be essential to fraud examinations, are not skills frequently taught in accounting programs and instruction in the use of computer assisted auditing tools and techniques – applications that might uncover fraudulent activity – is limited. Only a few university-level …
Development Of A National Repository Of Digital Forensic Intelligence, Mark Weiser, David P. Biros, Greg Mosier
Development Of A National Repository Of Digital Forensic Intelligence, Mark Weiser, David P. Biros, Greg Mosier
Journal of Digital Forensics, Security and Law
Many people do all of their banking online, we and our children communicate with peers through computer systems, and there are many jobs that require near continuous interaction with computer systems. Criminals, however, are also “connected”, and our online interaction provides them a conduit into our information like never before. Our credit card numbers and other fiscal information are at risk, our children's personal information is exposed to the world, and our professional reputations are on the line.
The discipline of Digital Forensics in law enforcement agencies around the nation and world has grown to match the increased risk and …
The Role Of Power And Negotiation In Online Deception, Chad Albrecht, Conan C. Albrecht, Jonathan Wareham, Paul Fox
The Role Of Power And Negotiation In Online Deception, Chad Albrecht, Conan C. Albrecht, Jonathan Wareham, Paul Fox
Journal of Digital Forensics, Security and Law
The purpose of this paper is to advance theoretical understanding of the important role of both power and negotiation during online deception. By so doing, the paper provides insight into the relationship between perpetrator and victim in Internet fraud. The growing prevalence of Internet Fraud continues to be a burden to both society and individuals. In an attempt to better understand Internet fraud and online deception, this article attempts to build an interactive model, based upon the dimensions of power and negotiation from the management and psychology literature. Using the model presented, the article examines the effects of the Internet …
Electronic Data Discovery: Integrating Due Process Into Cyber Forensic Practice, John W. Bagby, John C. Ruhnka
Electronic Data Discovery: Integrating Due Process Into Cyber Forensic Practice, John W. Bagby, John C. Ruhnka
Journal of Digital Forensics, Security and Law
Most organizations and government agencies regularly become engaged in litigation with suppliers, customers, clients, employees, competitors, shareholders, prosecutors or regulatory agencies that nearly assures the need to organize, retain, find and produce business records and correspondence, emails, accounting records or other data relevant to disputed issues. This article discusses some high visibility cases that constrain how metadata and content is routinely made available to opposing parties in civil litigation, to prosecutors in criminal prosecutions and to agency staff in regulatory enforcement litigation. Public policy, as implemented in the rules of evidence and pretrial discovery, restrict electronic data discovery (EDD) as …
Computer Forensics Field Triage Process Model, Marcus K. Rogers, James Goldman, Rick Mislan, Timothy Wedge, Steve Debrota
Computer Forensics Field Triage Process Model, Marcus K. Rogers, James Goldman, Rick Mislan, Timothy Wedge, Steve Debrota
Journal of Digital Forensics, Security and Law
With the proliferation of digital based evidence, the need for the timely identification, analysis and interpretation of digital evidence is becoming more crucial. In many investigations critical information is required while at the scene or within a short period of time - measured in hours as opposed to days. The traditional cyber forensics approach of seizing a system(s)/media, transporting it to the lab, making a forensic image(s), and then searching the entire system for potential evidence, is no longer appropriate in some circumstances. In cases such as child abductions, pedophiles, missing or exploited persons, time is of the essence. In …
Alphaco: A Teaching Case On Information Technology Audit And Security, Hüseyin Tanriverdi, Joshua Bertsch, Jonathan Harrison, Po-Ling Hsiao, Ketan S. Mesuria, David Hendrawirawan
Alphaco: A Teaching Case On Information Technology Audit And Security, Hüseyin Tanriverdi, Joshua Bertsch, Jonathan Harrison, Po-Ling Hsiao, Ketan S. Mesuria, David Hendrawirawan
Journal of Digital Forensics, Security and Law
Recent regulations in the United States (U.S.) such as the Sarbanes-Oxley Act of 2002 require top management of a public firm to provide reasonable assurance that they institute internal controls that minimize risks over the firm’s operations and financial reporting. External auditors are required to attest to the management’s assertions over the effectiveness of those internal controls. As firms rely more on information technology (IT) in conducting business, they also become more vulnerable to IT related risks. IT is critical for initiating, recording, processing, summarizing and reporting accurate financial and non-financial data. Thus, understanding IT related risks and instituting internal …
Is Forensic Computing A Profession? Revisiting An Old Debate In A New Field, Bernd C. Stahl
Is Forensic Computing A Profession? Revisiting An Old Debate In A New Field, Bernd C. Stahl
Journal of Digital Forensics, Security and Law
Forensic Computing is a new and quickly developing field. It is in the process of becoming an academic discipline or sub-discipline with all the features from full undergraduate and postgraduate course provision to conferences and journals. An important question in this process of turning into an established discipline is whether it will coincide with the recognition of the graduates as professionals. This paper hopes to stimulate the debate as to whether forensic computing is or should be a discipline. In order to approach this question, the paper will discuss the concept of forensic computing including the most salient topics of …
Development And Delivery Of Coursework: The Legal/Regulatory/Policy Environment Of Cyberforensics, John W. Bagby, John C. Ruhnka
Development And Delivery Of Coursework: The Legal/Regulatory/Policy Environment Of Cyberforensics, John W. Bagby, John C. Ruhnka
Journal of Digital Forensics, Security and Law
This paper describes a cyber-forensics course that integrates important public policy and legal issues as well as relevant forensic techniques. Cyber-forensics refers to the amalgam of multi-disciplinary activities involved in the identification, gathering, handling, custody, use and security of electronic files and records, involving expertise from the forensic domain, and which produces evidence useful in the proof of facts for both commercial and legal activities. The legal and regulatory environment in which electronic discovery takes place is of critical importance to cyber-forensics experts because the legal process imposes both constraints and opportunities for the effective use of evidence gathered through …
Designing A Data Warehouse For Cyber Crimes, Il-Yeol Song, John D. Maguire, Ki Jung Lee, Namyoun Choi, Xiaohua Hu, Peter Chen
Designing A Data Warehouse For Cyber Crimes, Il-Yeol Song, John D. Maguire, Ki Jung Lee, Namyoun Choi, Xiaohua Hu, Peter Chen
Journal of Digital Forensics, Security and Law
One of the greatest challenges facing modern society is the rising tide of cyber crimes. These crimes, since they rarely fit the model of conventional crimes, are difficult to investigate, hard to analyze, and difficult to prosecute. Collecting data in a unified framework is a mandatory step that will assist the investigator in sorting through the mountains of data. In this paper, we explore designing a dimensional model for a data warehouse that can be used in analyzing cyber crime data. We also present some interesting queries and the types of cyber crime analyses that can be performed based on …
Table Of Contents
Journal of Digital Forensics, Security and Law
No abstract provided.
Table Of Contents
Journal of Digital Forensics, Security and Law
No abstract provided.
Table Of Contents
Journal of Digital Forensics, Security and Law
No abstract provided.
Table Of Contents
Journal of Digital Forensics, Security and Law
No abstract provided.
An Ann Based Approach To Improve The Distance Relaying Algorithm, Hassan Khorashadi Zadeh, Zuyi Li
An Ann Based Approach To Improve The Distance Relaying Algorithm, Hassan Khorashadi Zadeh, Zuyi Li
Turkish Journal of Electrical Engineering and Computer Sciences
This paper presents an artificial neural network- (ANN) based approach to improve the performance of the distance relaying algorithm. The proposed distance relay uses magnitudes of voltages and currents as input signals to find fault locations. In this approach, an ANN has been included in the protection algorithm as an extension of the existing methods, which improves the reliability of the protection operation. The design procedure of the proposed relay is presented in detail. Simulation studies are performed and the influence of changing system parameters, such as fault resistance and source impedance, is studied. Performance studies show that the proposed …
Forensic Tools For Mobile Phone Subscriber Identity Modules, Wayne Jansen, Rick Ayers
Forensic Tools For Mobile Phone Subscriber Identity Modules, Wayne Jansen, Rick Ayers
Journal of Digital Forensics, Security and Law
Mobile phones and other handheld devices incorporating cellular capabilities, such as Personal Digital Assistants, are ubiquitous. Besides placing calls, these devices allow users to perform other useful tasks, including text messaging and phonebook entry management. When cell phones and cellular devices are involved in a crime or other incident, forensic specialists require tools that allow the proper retrieval and speedy examination of data present on the device. For devices conforming to the Global System for Mobile Communications (GSM) standards, certain data such as dialed numbers, text messages, and phonebook entries are maintained on a Subscriber Identity Module (SIM). This paper …
The Design Of An Undergraduate Degree Program In Computer & Digital Forensics, Gary C. Kessler, Michael E. Schirling
The Design Of An Undergraduate Degree Program In Computer & Digital Forensics, Gary C. Kessler, Michael E. Schirling
Journal of Digital Forensics, Security and Law
Champlain College formally started an undergraduate degree program in Computer & Digital Forensics in 2003. The underlying goals were that the program be multidisciplinary, bringing together the law, computer technology, and the basics of digital investigations; would be available as on online and oncampus offering; and would have a process-oriented focus. Success of this program has largely been due to working closely with practitioners, maintaining activity in events related to both industry and academia, and flexibility to respond to ever-changing needs. This paper provides an overview of how this program was conceived, developed, and implemented; its evolution over time; and …
An Experience On Problem Based Learning In An Engineering Faculty, Cüneyt Güzeli̇ş
An Experience On Problem Based Learning In An Engineering Faculty, Cüneyt Güzeli̇ş
Turkish Journal of Electrical Engineering and Computer Sciences
In 2001, Engineering Faculty of Dokuz Eylül University has started to change its undergraduate education in a radical way. As being among the first examples in the world, the Departments of Electrical and Electronics, Geological and Geophysics Engineering in 2002 and Mining Engineering Department in 2003 have adopted the so-called "modular-staged problem based active learning system". The system is based on real engineering problems which values teamwork and the integration of information from different disciplines and it places the student at the center of the learning process. The faculty has learned many things and it needs to learn many other …
Two, Three And Four-Dimensional Electromagnetics Using Differential Forms, Karl F. Warnick, Peter Russer
Two, Three And Four-Dimensional Electromagnetics Using Differential Forms, Karl F. Warnick, Peter Russer
Turkish Journal of Electrical Engineering and Computer Sciences
The exterior calculus of differential forms provides a mathematical framework for electromagnetic field theory that combines much of the generality of tensor analysis with the computational simplicity and concreteness of the vector calculus. We review the pedagogical aspects of the calculus of differential forms in providing distinct representations of field intensity and flux density, physically meaningful graphical representations for sources, fields, and fluxes, and a picture of the curl operation that is as simple and intuitive as that of the gradient and divergence. To further highlight the benefits of differential forms notation, we demonstrate the flexibility of the calculus of …
Speech Pre-Processing For Pitch And Pitch-Cylce Evolutions Smoothing, Hassan Farsi
Speech Pre-Processing For Pitch And Pitch-Cylce Evolutions Smoothing, Hassan Farsi
Turkish Journal of Electrical Engineering and Computer Sciences
In low bit rate speech coders, pitch is usually transmitted once per frame and, when needed, the intermediate pitch values are obtained by interpolation between 2 adjacent pitch values. Although pitch usually evolves slowly, sometimes it has irregular variations and the estimated pitch differs from the real one. In addition, some speech coders, e.g., waveform interpolation coders, rely on smooth pitch-cycle evolutions to extract speech model parameters in the analysis stage. However, non-stationary characteristics of speech may lead to inaccurate estimation of the parameters. This affects the synthesised speech quality. We propose a pre-processor, which modifies the residual speech signal …
Adaptive 3d Visual Servo Control Of Robot Manipulators Via Composite Camera Inputs, Türker Şahi̇n, Erkan Zergeroğlu
Adaptive 3d Visual Servo Control Of Robot Manipulators Via Composite Camera Inputs, Türker Şahi̇n, Erkan Zergeroğlu
Turkish Journal of Electrical Engineering and Computer Sciences
This paper considers the problem of position control of robot manipulators via visual servoing in the presence of uncertainty associated with the robot dynamics and the vision system. Specifically, an adaptive controller is designed to compensate for the uncertainties associated with the mechanical parameters of the robot manipulator and the intrinsic parameters of the cameras. The 3D visual information is obtained from the composite inputs of two separate cameras placed in the robot work space. Despite the uncertainties associated with the camera system and robot dynamics the proposed adaptive controller achieves asymptotic end effector position tracking. A Lyapunov based approach …
Human Identification Using Gait, Murat Eki̇nci̇
Human Identification Using Gait, Murat Eki̇nci̇
Turkish Journal of Electrical Engineering and Computer Sciences
Gait refers to the style of walking of an individual. This paper presents a view-invariant approach for human identification at a distance, using gait recognition. Recognition of a person from their gait is a biometric of increasing interest. Based on principal component analysis (PCA), this paper describes a simple, but efficient approach to gait recognition. Binarized silhouettes of a motion object are represented by 1-D signals, which are the basic image features called distance vectors. The distance vectors are differences between the bounding box and silhouette, and are extracted using 4 projections of the silhouette. Based on normalized correlation of …
State Of The Art For Differential Circuits In Wireless Transceivers: A New Wideband Active Balun In Sige Bicmos Technology, Balwant Godara, Alain Fabre
State Of The Art For Differential Circuits In Wireless Transceivers: A New Wideband Active Balun In Sige Bicmos Technology, Balwant Godara, Alain Fabre
Turkish Journal of Electrical Engineering and Computer Sciences
The aim of this paper is 3-fold: firstly, to provide a comprehensive overview of the use of differential circuits for analogue signal processing in wireless transceivers; secondly, to describe, in detail, single-ended signal to differential conversion, and the corresponding theory of such devices, their characterisation, various methods of implementation, and comparative analyses of their performance; lastly, to propose a new transistor-based solution for wideband baluns. This novel solution is based on the current conveyor and has been modelled using the transistor parameters of a 0.35 \mu m SiGe BiCMOS technology. The salient features of the new implementation are: (a) stable …
Statistical Model Of Hot-Carrier Degradation And Lifetime Prediction For P-Mos Transistors, Firat Kaçar, Ayten Kuntman, Hakan Kuntman
Statistical Model Of Hot-Carrier Degradation And Lifetime Prediction For P-Mos Transistors, Firat Kaçar, Ayten Kuntman, Hakan Kuntman
Turkish Journal of Electrical Engineering and Computer Sciences
Along with advances in microelectronics, and computer and space technologies, device dimensions are becoming smaller; as a result, hot-carrier effect, lifetime prediction, and reliability become more important concepts for MOS transistors. In this paper, the degradation in the drain current and threshold voltage of P-MOS transistors are observed by operating the devices under voltage stress conditions. Using the observation results, the effect of hot-carriers was investigated statistically and a new statistical method for modeling was proposed as an alternative to those given in the literature. The linear regression method is used to estimate the power, Weibull, and logarithmic parameters, and …
The Effect Of Collector Doping On Inp-Based Double Heterojunction Bipolar Transistors, Serkan Topaloğlu, Jörn Driesen, Werner Prost, Franz Josef Tegude
The Effect Of Collector Doping On Inp-Based Double Heterojunction Bipolar Transistors, Serkan Topaloğlu, Jörn Driesen, Werner Prost, Franz Josef Tegude
Turkish Journal of Electrical Engineering and Computer Sciences
High current effects on double heterojunction bipolar transistor (DHBT) performance were investigated. Three DHBTs with different collector doping densities were grown and processed. DC and RF measurements were performed to evaluate the influence of collector doping and the related Kirk effect on HBT performance. In addition to these samples, the Kirk effect was proven on SHBTs and the delay of this effect on submicron HBTs was investigated.
Engineering Education In The 21st Century: Issues And Perspectives, Leopold B. Felsen
Engineering Education In The 21st Century: Issues And Perspectives, Leopold B. Felsen
Turkish Journal of Electrical Engineering and Computer Sciences
No abstract provided.
A Labview-Based Virtual Instrument For Engineering Education: A Numerical Fourier Transform Tool, Levent Sevgi̇, Çağatay Uluişik
A Labview-Based Virtual Instrument For Engineering Education: A Numerical Fourier Transform Tool, Levent Sevgi̇, Çağatay Uluişik
Turkish Journal of Electrical Engineering and Computer Sciences
Engineering is based on practice. The minima of this practice should be given during the university education. This has become more and more comprehensive and expensive parallel to high-technology devices developed and presented to societies. Computers, microprocessor-based devices, programmable systems on Chip (PSoC), etc., make engineering education not only very complex but interdisciplinary as well. Building undergraduate labs has become more and more expensive if only physical experimentation and hands-on training are targeted. On the other hand, simple, comparatively much cheaper software may turn a regular personal computer (PC) into a virtual lab. The key question therefore is, to establish …