Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 45

Full-Text Articles in Engineering

Bluetooth Hacking: A Case Study, Dennis Browning, Gary C. Kessler Jan 2009

Bluetooth Hacking: A Case Study, Dennis Browning, Gary C. Kessler

Journal of Digital Forensics, Security and Law

This paper describes a student project examining mechanisms with which to attack Bluetooth-enabled devices. The paper briefly describes the protocol architecture of Bluetooth and the Java interface that programmers can use to connect to Bluetooth communication services. Several types of attacks are described, along with a detailed example of two attack tools, Bloover II and BT Info.


Detection Of Steganography-Producing Software Artifacts On Crime-Related Seized Computers, Asawaree Kulkarni, James Goldman, Brad Nabholz, William Eyre Jan 2009

Detection Of Steganography-Producing Software Artifacts On Crime-Related Seized Computers, Asawaree Kulkarni, James Goldman, Brad Nabholz, William Eyre

Journal of Digital Forensics, Security and Law

Steganography is the art and science of hiding information within information so that an observer does not know that communication is taking place. Bad actors passing information using steganography are of concern to the national security establishment and law enforcement. An attempt was made to determine if steganography was being used by criminals to communicate information. Web crawling technology was used and images were downloaded from Web sites that were considered as likely candidates for containing information hidden using steganographic techniques. A detection tool was used to analyze these images. The research failed to demonstrate that steganography was prevalent on …


Book Review: Cyber Security And Global Information Assurance: Threat Analysis And Response Solutions, Gary C. Kessler Jan 2009

Book Review: Cyber Security And Global Information Assurance: Threat Analysis And Response Solutions, Gary C. Kessler

Journal of Digital Forensics, Security and Law

I freely admit that this book was sent to me by the publisher for the expressed purpose of my writing a review and that I know several of the chapter authors. With that disclosure out of the way, let me say that the book is well worth the review (and I get to keep my review copy).
The preface to the book cites the 2003 publication of The National Strategy to Secure Cyberspace by the White House, and the acknowledgement by the U.S. government that our economy and national security were fully dependent upon computers, networks, and the telecommunications infrastructure. …


Prevention Is Better Than Prosecution: Deepening The Defence Against Cyber Crime, Jacqueline Fick Jan 2009

Prevention Is Better Than Prosecution: Deepening The Defence Against Cyber Crime, Jacqueline Fick

Journal of Digital Forensics, Security and Law

In the paper the author proposes that effectively and efficiently addressing cyber crime requires a shift in paradigm. For businesses and government departments alike the focus should be on prevention, rather than the prosecution of cyber criminals. The Defence in Depth strategy poses a practical solution for achieving Information Assurance in today’s highly networked environments. In a world where “absolute security” is an unachievable goal, the concept of Information Assurance poses significant benefits to securing one of an organization’s most valuable assets: Information. It will be argued that the approach of achieving Information Assurance within an organisation, coupled with the …


Table Of Contents Jan 2009

Table Of Contents

Journal of Digital Forensics, Security and Law

No abstract provided.


An Intelligent Face Features Generation System From Fingerprints, Şeref Sağiroğlu, Necla Özkaya Jan 2009

An Intelligent Face Features Generation System From Fingerprints, Şeref Sağiroğlu, Necla Özkaya

Turkish Journal of Electrical Engineering and Computer Sciences

In this study, a novel intelligent system based on artificial neural networks was designed and introduced for generating faces from fingerprints with high accuracy. The proposed system has a number of modules including two feature enrolment modules for acquiring the fingerprints and faces into the system, two feature extractors for extracting the feature sets of fingerprint and face biometrics, an artificial neural network module that was configured with the help of Taguchi experimental design method for establishing relationships among the biometric features, a face re-constructor for building up face features from the results of the system, and a test module …


Analytical Regularization Method For Electromagnetic Wave Diffraction By Axially Symmetrical Thin Annular Strips, Fati̇h Di̇kmen, Yury Alexanderovich Tuchkin Jan 2009

Analytical Regularization Method For Electromagnetic Wave Diffraction By Axially Symmetrical Thin Annular Strips, Fati̇h Di̇kmen, Yury Alexanderovich Tuchkin

Turkish Journal of Electrical Engineering and Computer Sciences

A new mathematically rigorous and numerically efficient method based on the combination of Orthogonal Polynomials Method, and Analytical Regularization Method, for electromagnetic wave diffraction by a model structure for various antennae such as Fresnel zone plates is proposed. It can be used as validation tool for the other (more general or less accurate) numerical methods and physical approaches. The initial boundary value problem is equivalently reduced to the infinite system of the linear algebraic equations of the second kind, i.e. to an equation of the type (I+H) x=b in the space l_2 with compact operator H. This equation can be …


Emc Education At The University Of Technology Zurich, Gökhan Apaydin, Ni̇yazi̇ Ari Jan 2009

Emc Education At The University Of Technology Zurich, Gökhan Apaydin, Ni̇yazi̇ Ari

Turkish Journal of Electrical Engineering and Computer Sciences

This paper illustrates educational issues in electromagnetic compatibility (EMC) engineering in Switzerland and presents the contents of courses and practical materials for EMC education at the University of Technology Zurich. After giving the fundamentals of theoretical part, practical applications have been given to make students and engineers aware of EMC issues and its problems.


Variance And Kurtosis-Based Characterization Of Resonances In Stochastic Transmission Lines: Local Versus Global Random Geometries, Ousmane Sy, Martijn Van Beurden, Bastiaan Michielsen, Antonius Tijhuis Jan 2009

Variance And Kurtosis-Based Characterization Of Resonances In Stochastic Transmission Lines: Local Versus Global Random Geometries, Ousmane Sy, Martijn Van Beurden, Bastiaan Michielsen, Antonius Tijhuis

Turkish Journal of Electrical Engineering and Computer Sciences

A stochastic method is proposed to characterize electromagnetic couplings involving geometrically perturbed transmission lines. A combined exploitation of suitably defined statistical tools is presented to appreciate the intensity of the dispersion of response variables both physically via the variance, and statistically through the kurtosis or fourth-order moment. The usefulness of this method to analyze resonances is illustrated by the study of a transmission line affected by two different types of random geometrical perturbations, viz. a local deformation modeled by a wavelet and global sinusoidal undulations.


Polymorphic Worm Detection Using Strong Token-Pair Signatures, Burak Bayoğlu, İbrahi̇m Soğukpinar Jan 2009

Polymorphic Worm Detection Using Strong Token-Pair Signatures, Burak Bayoğlu, İbrahi̇m Soğukpinar

Turkish Journal of Electrical Engineering and Computer Sciences

Malicious software has become a big threat to information systems, which are widely used to store, transfer and process information for many critical assets. Worms are one of the most harmful network-enabled malicious software that can threaten networks and applications. Two main characteristics of worms distinguish them from the well-known virus programs and as a result are much more dangerous than the virus programs. First, they do not need to attach themselves to an existing program. Second, worms do not require end-user interaction to realize the intended attack. Therefore, a large number of victims can be infected in a short …


Experimantal Characterization And Equivalent Circuit Extraction Of Nanowires For Signal Integrity Applications, Giulio Antonini, Marco Di Clerico, Antonio Orlandi, Vittorio Ricchiuti, Maurizio Passacantando, Sandro Santucci Jan 2009

Experimantal Characterization And Equivalent Circuit Extraction Of Nanowires For Signal Integrity Applications, Giulio Antonini, Marco Di Clerico, Antonio Orlandi, Vittorio Ricchiuti, Maurizio Passacantando, Sandro Santucci

Turkish Journal of Electrical Engineering and Computer Sciences

This paper illustrates the design steps of a printed circuit board used as test vehicles for the measurement of the electrical properties of carbon nanotube's deposit. The board has been built and used for the measurements. The measured data are post-processed in order to extract the required properties of the only nanotubes. An equivalent circuit is extracted for further use in EDA simulators and the IEEE P1597 Standard is used to compare the results.


Graduate Accounting Students' Perception Of It Forensics: A Multi-Dimensional Analysis, Grover S. Kearns Jan 2009

Graduate Accounting Students' Perception Of It Forensics: A Multi-Dimensional Analysis, Grover S. Kearns

Journal of Digital Forensics, Security and Law

Forensics and information technology (IT) have become increasingly important to accountants and auditors. Undergraduate accounting students are introduced to general IT topics but discussion of forensic knowledge is limited. A few schools have introduced an undergraduate major in forensic accounting. Some graduate schools offer accounting students an emphasis in forensic or fraud accounting that includes instruction in forensics and information technology. When students do not view the IT topics as being equally important to their careers as traditional accounting topics, these attitudes may reduce the quality of the course. In an effort to assess student attitudes, a survey of 46 …


Continuous Fraud Detection In Enterprise Systems Through Audit Trail Analysis, Peter J. Best, Pall Rikhardsson, Mark Toleman Jan 2009

Continuous Fraud Detection In Enterprise Systems Through Audit Trail Analysis, Peter J. Best, Pall Rikhardsson, Mark Toleman

Journal of Digital Forensics, Security and Law

Enterprise systems, real time recording and real time reporting pose new and significant challenges to the accounting and auditing professions. This includes developing methods and tools for continuous assurance and fraud detection. In this paper we propose a methodology for continuous fraud detection that exploits security audit logs, changes in master records and accounting audit trails in enterprise systems. The steps in this process are: (1) threat monitoringsurveillance of security audit logs for ‘red flags’, (2) automated extraction and analysis of data from audit trails, and (3) using forensic investigation techniques to determine whether a fraud has actually occurred. We …


Defining A Forensic Audit, G. S. Smith, D. L. Crumbley Jan 2009

Defining A Forensic Audit, G. S. Smith, D. L. Crumbley

Journal of Digital Forensics, Security and Law

Disclosures about new financial frauds and scandals are continually appearing in the press. As a consequence, the accounting profession's traditional methods of monitoring corporate financial activities are under intense scrutiny. At the same time, there is recognition that principles-based GAAP from the International Accounting Standards Board will become the recognized standard in the U.S. The authors argue that these two factors will change the practices used to fight corporate malfeasance as investigators adapt the techniques of accounting into a forensic audit engagement model.


Table Of Contents Jan 2009

Table Of Contents

Journal of Digital Forensics, Security and Law

No abstract provided.


Visualisation Of Honeypot Data Using Graphviz And Afterglow, Craig Valli Jan 2009

Visualisation Of Honeypot Data Using Graphviz And Afterglow, Craig Valli

Journal of Digital Forensics, Security and Law

This research in progress paper explores the use of Graphviz and Afterglow for the analysis of data emanating from a honeypot system. Honeypot systems gather a wide range of data that is often difficult to readily search for patterns and trends using conventional log file analysis techniques. The data from the honeypots has been statically extracted and processed through Afterglow scripts to produce inputs suitable for use by the DOT graph based tools contained within Graphviz. This paper explores some of the benefits and drawbacks of currently using this type of approach.


Correlating Orphaned Windows Registry Data Structures, Damir Kahvedžić, Tahar Kechadi Jan 2009

Correlating Orphaned Windows Registry Data Structures, Damir Kahvedžić, Tahar Kechadi

Journal of Digital Forensics, Security and Law

Recently, it has been shown that deleted entries of the Microsoft Windows registry (keys) may still reside in the system files once the entries have been deleted from the active database. Investigating the complete keys in context may be extremely important from both a Forensic Investigation point of view and a legal point of view where a lack of context can bring doubt to an argument. In this paper we formalise the registry behaviour and show how a retrieved value may not maintain a relation to the part of the registry it belonged to and hence lose that context. We …


The Impact Of Hard Disk Firmware Steganography On Computer Forensics, Iain Sutherland, Gareth Davies, Nick Pringle, Andrew Blyth Jan 2009

The Impact Of Hard Disk Firmware Steganography On Computer Forensics, Iain Sutherland, Gareth Davies, Nick Pringle, Andrew Blyth

Journal of Digital Forensics, Security and Law

The hard disk drive is probably the predominant form of storage media and is a primary data source in a forensic investigation. The majority of available software tools and literature relating to the investigation of the structure and content contained within a hard disk drive concerns the extraction and analysis of evidence from the various file systems which can reside in the user accessible area of the disk. It is known that there are other areas of the hard disk drive which could be used to conceal information, such as the Host Protected Area and the Device Configuration Overlay. There …


Table Of Contents Jan 2009

Table Of Contents

Journal of Digital Forensics, Security and Law

No abstract provided.


Insecurity By Obscurity: A Review Of Soho Router Literature From A Network Security Perspective, Patryk Szewczyk, Craig Valli Jan 2009

Insecurity By Obscurity: A Review Of Soho Router Literature From A Network Security Perspective, Patryk Szewczyk, Craig Valli

Journal of Digital Forensics, Security and Law

Because of prevalent threats to SoHo based ADSL Routers, many more devices are compromised. Whilst an end-user may be at fault for not applying the appropriate security mechanisms to counter these threats, vendors should equally share the blame. This paper reveals that the lack of security related content and poor overall design could impact on end-users’ interpretation and willingness to implement security controls on their ADSL router. It argues that whilst the number of threats circulating the Internet is increasing, vendors are not improving their product literature.


Electronic Forms-Based Computing For Evidentiary Analysis, Andy Luse, Brian Mennecke, Anthony M. Townsend Jan 2009

Electronic Forms-Based Computing For Evidentiary Analysis, Andy Luse, Brian Mennecke, Anthony M. Townsend

Journal of Digital Forensics, Security and Law

The paperwork associated with evidentiary collection and analysis is a highly repetitive and time-consuming process which often involves duplication of work and can frequently result in documentary errors. Electronic entry of evidencerelated information can facilitate greater accuracy and less time spent on data entry. This manuscript describes a general framework for the implementation of an electronic tablet-based system for evidentiary processing. This framework is then utilized in the design and implementation of an electronic tablet-based evidentiary input prototype system developed for use by forensic laboratories which serves as a verification of the proposed framework. The manuscript concludes with a discussion …


To License Or Not To License Revisited: An Examination Of State Statutes Regarding Private Investigators And Digital Examiners, Thomas Lonardo, Doug White, Alan Rea Jan 2009

To License Or Not To License Revisited: An Examination Of State Statutes Regarding Private Investigators And Digital Examiners, Thomas Lonardo, Doug White, Alan Rea

Journal of Digital Forensics, Security and Law

In this update to the previous year's study, the authors examine statutes that regulate, license, and enforce investigative functions in each US state. After identification and review of Private Investigator licensing requirements, the authors find that very few state statutes explicitly differentiate between Private Investigators and Digital Examiners. After contacting all state agencies the authors present a distinct grouping organizing state approaches to professional Digital Examiner licensing. The authors conclude that states must differentiate between Private Investigator and Digital Examiner licensing requirements and oversight.


Online Child Sexual Abuse: The French Response, Mohamed Chawki Jan 2009

Online Child Sexual Abuse: The French Response, Mohamed Chawki

Journal of Digital Forensics, Security and Law

Online child sexual abuse is an increasingly visible problem in society today. The introduction, growth and utilization of information and telecommunication technologies (ICTs) have been accompanied by an increase in illegal activities. With respect to cyberspace the Internet is an attractive environment to sex offenders. In addition to giving them greater access to minors, extending their reach from a limited geographical area to victims all around the world, it allows criminals to alter or conceal their identities. Sexual predators, stalkers, child pornographers and child traffickers can use various concealment techniques to make it more difficult for investigators to identify them …


A Synopsis Of Proposed Data Protection Legislation In Sa, Francis S. Cronjé Jan 2009

A Synopsis Of Proposed Data Protection Legislation In Sa, Francis S. Cronjé

Journal of Digital Forensics, Security and Law

Privacy International1 made the following statement regarding South Africa’s financial sector in its 2005 world survey: “South Africa has a well-developed financial system and banking infrastructure. Despite the sophistication of the financial sector, the privacy of financial information is weakly regulated by a code of conduct for banks issued by the Banking Council.” This extract highlights some of the problems South Africa are experiencing with its current status on privacy as viewed from an International perspective. In recent years the International society has stepped up its efforts in creating a global village wherein the individual could be assured of having …


Telecommunications Liberalisation In Africa: Proposed Regulatory Model For The Sadc Region, Z. N. Jobodwana Jan 2009

Telecommunications Liberalisation In Africa: Proposed Regulatory Model For The Sadc Region, Z. N. Jobodwana

Journal of Digital Forensics, Security and Law

The liberalisation of the telecommunication industry in Africa, and the further development of the region’s physical infrastructure was accompanied by the further development of Africa’s information, communication and technology infrastructure. Competition within the industry stimulated heavy economic investment in other sectors of the economy. The outcome of liberalisation also included the establishment of community-based structures that continue to enable communities to manage their own development and gain access to information and communication technologies (ICTs) in an unprecedented manner. The telecommunication infrastructure further stimulated the fast development of other related services, for example, ecommerce and mobile commerce (m-commerce), e-government, internet banking, …


Table Of Contents Jan 2009

Table Of Contents

Journal of Digital Forensics, Security and Law

No abstract provided.


A Novel Ep Approach For Multi-Area Economic Dispatch With Multiple Fuel Options, P. S. Manoharan, P. S. Kannan, V. Ramanathan Jan 2009

A Novel Ep Approach For Multi-Area Economic Dispatch With Multiple Fuel Options, P. S. Manoharan, P. S. Kannan, V. Ramanathan

Turkish Journal of Electrical Engineering and Computer Sciences

This paper presents a novel approach to multi-area economic dispatch problems with multiple fuel options using a hybrid evolutionary programming method. The objective is to minimize the operation cost of the entire system while satisfying the tie line constraints. In this paper, EP-LMO (Evolutionary Programming with Levenberg-Marquardt Optimization) technique is proposed to solve multi-area economic dispatch problems with multiple fuel options. The EP-LMO is developed in such a way that a simple evolutionary programming (EP) is applied as a base level search to find the direction of the optimal global region. And Levenberg-Marquardt Optimization (LMO) method is used as a …


Electronic Differential With Direct Torque Fuzzy Control For Vehicle Propulsion System, Kada Hartani, Mohamed Bourahla, Yahia Miloud, Mohamed Sekour Jan 2009

Electronic Differential With Direct Torque Fuzzy Control For Vehicle Propulsion System, Kada Hartani, Mohamed Bourahla, Yahia Miloud, Mohamed Sekour

Turkish Journal of Electrical Engineering and Computer Sciences

We model an electronic differential that will offer the best vehicle stability on a curved road. The proposed traction system consists of two permanent magnet synchronous (PMS) machines that ensure the drive of two back-driving wheels. The contribution of each wheel to the advance of the vehicle is represented by an element conveying the accumulation of mechanical coupling. The proposed control structure is based on the direct torque fuzzy control for each wheel-motor. Different simulations have been carried out: vehicle driven ons straight road, vehicle driven on straight road with slope, and vehicle driven over a road curved left and …


Insulation Condition Assessment Of Power Transformers Using Accelerated Ageing Tests, Mohammad Mirzaie, Ahmad Gholami, Hamid Reza Tayebi Jan 2009

Insulation Condition Assessment Of Power Transformers Using Accelerated Ageing Tests, Mohammad Mirzaie, Ahmad Gholami, Hamid Reza Tayebi

Turkish Journal of Electrical Engineering and Computer Sciences

Thermal stress due to losses and environment temperature causes degradation to paper/oil insulation systems in transformers, even at operating temperature. Experience indicates that thermal ageing of oil and paper in power transformers leads to the change of some insulation characteristics. In this paper, insulating papers immersed in oil have been acceleratory aged at 140, 150, and 160 °C under laboratory conditions. Some of the oil properties, such as water content, breakdown voltage, acidity, together with the aged insulating paper properties such as electric strength, dielectric dissipation factor and tensile strength were measured and analyzed. Also, insulation system conditions under thermal …


Accurate Prediction Of Crosstalk For Rc Interconnects, Selahatti̇n Sayil, Merlyn Rudrapati Jan 2009

Accurate Prediction Of Crosstalk For Rc Interconnects, Selahatti̇n Sayil, Merlyn Rudrapati

Turkish Journal of Electrical Engineering and Computer Sciences

This work proposes an accurate crosstalk noise estimation method in the presence of multiple RC lines for use in design automation tools. The method correctly models the loading effects of non switching aggressors and aggressor tree branches using resistive shielding effect and realistic exponential input waveform. Noise peak and width expressions derived show very good results in comparison to HSPICE results. Results show that average error for noise peak is 4.1% and for the width is 6.8% while allowing for very fast analysis.