Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Embry-Riddle Aeronautical University (181)
- Purdue University (4)
- University for Business and Technology in Kosovo (4)
- University of Georgia School of Law (4)
- Western University (2)
-
- Georgia College (1)
- Kansas State University Libraries (1)
- Kennesaw State University (1)
- Liberty University (1)
- Old Dominion University (1)
- University of Dayton (1)
- University of Nevada, Las Vegas (1)
- University of San Diego (1)
- University of South Florida (1)
- University of Tennessee, Knoxville (1)
- University of Windsor (1)
- Keyword
-
- Sustainability (2)
- Advanced Air Mobility (1)
- Advanced Air Mobility (AAM) (1)
- Aeronautical Engineering (1)
- Aerospace Technology. Public Acceptance (1)
-
- Africa (1)
- Arithmetic – Computer programs (1)
- Asteroid bennu (1)
- Asteroid mining (1)
- Aviation (1)
- Binary-coded decimal system (1)
- Categorical Imperatives (1)
- Cis-lunar resource extraction (1)
- Climate justice (1)
- Collegiality (1)
- Commercial Aviation (1)
- Communication Challenges (1)
- Community science (1)
- Computational literacy (1)
- Concept of Operations (1)
- Consumption (1)
- Cybersecurity (1)
- Dark Space Theory (1)
- Data analysis (1)
- Data literacy (1)
- Data science (1)
- Decimal system (1)
- Digital humanities (1)
- Digital literacy (1)
- Diversity (1)
- Publication Year
- Publication
-
- Annual ADFSL Conference on Digital Forensics, Security and Law (172)
- Space Traffic Management Conference (6)
- Continuing Legal Education Presentations (4)
- UBT International Conference (4)
- Purdue Road School (3)
-
- Undergraduate Student Research Internships Conference (2)
- Academic Chairpersons Conference Proceedings (1)
- Aviation / Aeronautics / Aerospace International Research Conference (1)
- Biennial Conference: The Social Practice of Human Rights (1)
- Black Issues Conference (1)
- College of Engineering: Graduate Celebration Programs (1)
- Cybersecurity Undergraduate Research Showcase (1)
- Digital Initiatives Symposium (1)
- Georgia College Student Research Events (1)
- Helm's School of Government Conference - 2021-2024 (1)
- Human Factors and Applied Psychology Student Conference (1)
- National Training Aircraft Symposium (NTAS) (1)
- OSSA Conference Archive (1)
- Purdue Workshop on Nonproliferation: Technology and Approaches (1)
- Sinkhole Conference 2015 (1)
- Symposium of Student Scholars (1)
Articles 31 - 60 of 206
Full-Text Articles in Engineering
Front Matter, Adfsl
Front Matter, Adfsl
Annual ADFSL Conference on Digital Forensics, Security and Law
No abstract provided.
Analysis Of Data Erasure Capability On Sshd Drives For Data Recovery, Andrew Blyth
Analysis Of Data Erasure Capability On Sshd Drives For Data Recovery, Andrew Blyth
Annual ADFSL Conference on Digital Forensics, Security and Law
Data Protection and Computer Forensics/Anti-Forensics has now become a critical area of concern for organizations. A key element to this is how data is sanitized at end of life. In this paper we explore Hybrid Solid State Hybrid Drives (SSHD) and the impact that various Computer Forensics and Data Recovery techniques have when performing data erasure upon a SSHD.
Knowledge Expiration In Security Awareness Training, Tianjian Zhang
Knowledge Expiration In Security Awareness Training, Tianjian Zhang
Annual ADFSL Conference on Digital Forensics, Security and Law
No abstract provided.
Positive Identification Of Lsb Image Steganography Using Cover Image Comparisons, Michael Pelosi, Nimesh Poudel, Pratap Lamichhane, Devon Lam, Gary Kessler, Joshua Macmonagle
Positive Identification Of Lsb Image Steganography Using Cover Image Comparisons, Michael Pelosi, Nimesh Poudel, Pratap Lamichhane, Devon Lam, Gary Kessler, Joshua Macmonagle
Annual ADFSL Conference on Digital Forensics, Security and Law
In this paper we introduce a new software concept specifically designed to allow the digital forensics professional to clearly identify and attribute instances of LSB image steganography by using the original cover image in side-by-side comparison with a suspected steganographic payload image. The “CounterSteg” software allows detailed analysis and comparison of both the original cover image and any modified image, using sophisticated bit- and color-channel visual depiction graphics. In certain cases, the steganographic software used for message transmission can be identified by the forensic analysis of LSB and other changes in the payload image. The paper demonstrates usage and typical …
Exploring The Use Of Graph Databases To Catalog Artifacts For Client Forensics, Rose Shumba
Exploring The Use Of Graph Databases To Catalog Artifacts For Client Forensics, Rose Shumba
Annual ADFSL Conference on Digital Forensics, Security and Law
Cloud computing has revolutionized the methods by which digital data is stored, processed, and transmitted. It is providing users with data storage and processing services, enabling access to resources through multiple devices. Although organizations continue to embrace the advantages of flexibility and scalability offered by cloud computing, insider threats are becoming a serious concern as cited by security researchers. Insiders can use authorized access to steal sensitive information, calling for the need for an investigation. This concept paper describes research in progress towards developing a Neo4j graph database tool to enhance client forensics. The tool, with a Python interface, allows …
Unmanned Aerial Vehicle Forensic Investigation Process: Dji Phantom 3 Drone As A Case Study, Alan Roder, Kim-Kwang Raymond Choo, Nhien-A Le-Khac
Unmanned Aerial Vehicle Forensic Investigation Process: Dji Phantom 3 Drone As A Case Study, Alan Roder, Kim-Kwang Raymond Choo, Nhien-A Le-Khac
Annual ADFSL Conference on Digital Forensics, Security and Law
Drones (also known as Unmanned Aerial Vehicles – UAVs) are a potential source of evidence in a digital investigation, partly due to their increasing popularity in our society. However, existing UAV/drone forensics generally rely on conventional digital forensic investigation guidelines such as those of ACPO and NIST, which may not be entirely fit-for-purpose. In this paper, we identify the challenges associated with UAV/drone forensics. We then explore and evaluate existing forensic guidelines, in terms of their effectiveness for UAV/drone forensic investigations. Next, we present our set of guidelines for UAV/drone investigations. Finally, we demonstrate how the proposed guidelines can be …
Back Matter, Adfsl
Back Matter, Adfsl
Annual ADFSL Conference on Digital Forensics, Security and Law
No abstract provided.
Front Matter, Adfsl
Front Matter, Adfsl
Annual ADFSL Conference on Digital Forensics, Security and Law
No abstract provided.
Contents, Adfsl
Contents, Adfsl
Annual ADFSL Conference on Digital Forensics, Security and Law
No abstract provided.
Utm, Atm, Stm… Slices Of The Sky?, Ruth E. Stilwell
Utm, Atm, Stm… Slices Of The Sky?, Ruth E. Stilwell
Space Traffic Management Conference
UTM, ATM, STM… slices of the sky?
This paper will examine the functional differences between Unmanned Aircraft Traffic Management Systems, Air Traffic Management Systems, and Space Traffic Management. Understanding both the similarities between the systems and the different functional requirements of each concept is critical in the discussion and development of STM. While there are many commonalities in each area, it is important to understand how the different environments affect the ability to develop policies, procedure and technologies to manage the vehicles operating in the distinct environment. Both technical and legal frameworks will be discussed.
Building a conceptual framework for …
Understanding Deleted File Decay On Removable Media Using Differential Analysis, James H. Jones Jr, Anurag Srivastava, Josh Mosier, Connor Anderson, Seth Buenafe
Understanding Deleted File Decay On Removable Media Using Differential Analysis, James H. Jones Jr, Anurag Srivastava, Josh Mosier, Connor Anderson, Seth Buenafe
Annual ADFSL Conference on Digital Forensics, Security and Law
Digital content created by picture recording devices is often stored internally on the source device, on either embedded or removable media. Such storage media is typically limited in capacity and meant primarily for interim storage of the most recent image files, and these devices are frequently configured to delete older files as necessary to make room for new files. When investigations involve such devices and media, it is sometimes these older deleted files that would be of interest. It is an established fact that deleted file content may persist in part or in its entirety after deletion, and identifying the …
Harnessing Predictive Models For Assisting Network Forensic Investigations Of Dns Tunnels, Irvin Homem, Panagiotis Papapetrou
Harnessing Predictive Models For Assisting Network Forensic Investigations Of Dns Tunnels, Irvin Homem, Panagiotis Papapetrou
Annual ADFSL Conference on Digital Forensics, Security and Law
In recent times, DNS tunneling techniques have been used for malicious purposes, however network security mechanisms struggle to detect them. Network forensic analysis has been proven effective, but is slow and effort intensive as Network Forensics Analysis Tools struggle to deal with undocumented or new network tunneling techniques. In this paper, we present a machine learning approach, based on feature subsets of network traffic evidence, to aid forensic analysis through automating the inference of protocols carried within DNS tunneling techniques. We explore four network protocols, namely, HTTP, HTTPS, FTP, and POP3. Three features are extracted from the DNS tunneled traffic: …
Developing And Supporting The Diversity Of Chairperson Roles, Jean Pawl, Richard Griner, Deborah Richardson, Elizabeth Nesmith
Developing And Supporting The Diversity Of Chairperson Roles, Jean Pawl, Richard Griner, Deborah Richardson, Elizabeth Nesmith
Academic Chairpersons Conference Proceedings
A monthly Chair Professional Development program at Augusta University provides opportunity to mentor new chairpersons and foster collegiality amongst all chairpersons at a university with both liberal arts and health sciences programs. The merits and challenges of this program that addresses needs of such a diverse group will be highlighted
Spaceways: Airspace In Outer Space, Scott Haeffelin
Spaceways: Airspace In Outer Space, Scott Haeffelin
Space Traffic Management Conference
Forecasted future demand in space travel is driving the need for the development of space traffic management. Currently, orbital space traffic is mostly unregulated with internationally agreed upon best practices and self-interest driving space operators to avoid collisions with other spacecraft. This paper explores the future of space travel by presenting a concept of creating “airspace in space” or spaceways to manage the ever growing volumes of space traffic. Spaceways are analogous to airspace for aircraft with the goal of increasing levels of safety and reducing probabilities of collision. These goals can be achieved by creating traffic rules, defining valuable …
A Novel Approach For Controlled Deorbiting And Reentry Of Small Spacecraft, Larry H. Fineberg, Justin Treptow, Timothy Bass, Scott Clark, Yusef Johnson, Bradley Poffenberger
A Novel Approach For Controlled Deorbiting And Reentry Of Small Spacecraft, Larry H. Fineberg, Justin Treptow, Timothy Bass, Scott Clark, Yusef Johnson, Bradley Poffenberger
Space Traffic Management Conference
No abstract provided.
Designing Laboratories For Small Scale Digital Device Forensics, Richard P. Mislan, Tim Wedge
Designing Laboratories For Small Scale Digital Device Forensics, Richard P. Mislan, Tim Wedge
Annual ADFSL Conference on Digital Forensics, Security and Law
The ubiquity of small scale digital devices (SSDD), the public’s ever increasing societal dependence on SSDD, and the continual presence of SSDD at all types of crime scenes, including non-technical and violent crimes, demand a formalized curriculum for the education and training of future cyber forensic examiners. This paper presents the various SSDD forensics labs currently in use and under development for future use at the Purdue University Cyber Forensics Laboratory. The primary objective of each module is to provide specific real-world cases for the learning, comprehension, and understanding of hands-on investigative techniques and methodologies. The purpose of this paper …
Network Forensic Investigation Of Internal Misuse/Crime In Saudi Arabia: A Hacking Case, Abdulrazaq Al-Murjan, Konstantinos Xynos
Network Forensic Investigation Of Internal Misuse/Crime In Saudi Arabia: A Hacking Case, Abdulrazaq Al-Murjan, Konstantinos Xynos
Annual ADFSL Conference on Digital Forensics, Security and Law
There are ad-hoc guidelines and a limited policy on computer incident response that does not include computer forensic preparation procedures (e.g. logging incidents). In addition, these guidelines do not consider the requirement of Islamic law for admissible evidence at an organisational level in Saudi Arabia. Network forensic investigation might breach the Saudi law if they follow ad-hoc or international digital forensic standards such as Association of Chief Police Officers (ACPO) guidelines. This might put the organisation in a costly situation when a malicious employee sues an Islamic court. This is because the law of Saudi Arabia is complying with Islamic …
Paper Session Ii: Computer Forensics Field Triage Process Model, Marcus K. Rogers, James Goldman, Rick Mislan, Timothy Wedge, Steve Debrota
Paper Session Ii: Computer Forensics Field Triage Process Model, Marcus K. Rogers, James Goldman, Rick Mislan, Timothy Wedge, Steve Debrota
Annual ADFSL Conference on Digital Forensics, Security and Law
With the proliferation of digital based evidence, the need for the timely identification, analysis and interpretation of digital evidence is becoming more crucial. In many investigations critical information is required while at the scene or within a short period of time - measured in hours as opposed to days. The traditional cyber forensics approach of seizing a system(s)/media, transporting it to the lab, making a forensic image(s), and then searching the entire system for potential evidence, is no longer appropriate in some circumstances. In cases such as child abductions, pedophiles, missing or exploited persons, time is of the essence. In …
Development Of A National Repository Of Digital Forensic Intelligence, Mark Weiser, David P. Biros, Greg Mosier
Development Of A National Repository Of Digital Forensic Intelligence, Mark Weiser, David P. Biros, Greg Mosier
Annual ADFSL Conference on Digital Forensics, Security and Law
Many people do all of their banking online, we and our children communicate with peers through computer systems, and there are many jobs that require near continuous interaction with computer systems. Criminals, however, are also “connected”, and our online interaction provides them a conduit into our information like never before. Our credit card numbers and other fiscal information are at risk, our children's personal information is exposed to the world, and our professional reputations are on the line.
The discipline of Digital Forensics in law enforcement agencies around the nation and world has grown to match the increased risk and …
Designing A Data Warehouse For Cyber Crimes, Il-Yeol Song, John D. Maguire, Ki Jung Lee, Namyoun Choi, Xiaohua Hu, Peter Chen
Designing A Data Warehouse For Cyber Crimes, Il-Yeol Song, John D. Maguire, Ki Jung Lee, Namyoun Choi, Xiaohua Hu, Peter Chen
Annual ADFSL Conference on Digital Forensics, Security and Law
One of the greatest challenges facing modern society is the rising tide of cyber crimes. These crimes, since they rarely fit the model of conventional crimes, are difficult to investigate, hard to analyze, and difficult to prosecute. Collecting data in a unified framework is a mandatory step that will assist the investigator in sorting through the mountains of data. In this paper, we explore designing a dimensional model for a data warehouse that can be used in analyzing cyber crime data. We also present some interesting queries and the types of cyber crime analyses that can be performed based on …
Assessing The Gap: Measure The Impact Of Phishing On An Organization, Brad Wardman
Assessing The Gap: Measure The Impact Of Phishing On An Organization, Brad Wardman
Annual ADFSL Conference on Digital Forensics, Security and Law
Phishing has become one of the most recognized words associated with cybercrime. As more organizations are being targeted by phishing campaigns, there are more options within the industry to deter such attacks. However, there is little research into how much damage these campaigns are causing organizations. This paper will show how financial organizations can be impacted by phishing and present a method for accurately quantifying resultant monetary losses. The methodology presented in this paper can be adapted to other organizations in order to quantify phishing losses across industries.
Keywords: phishing, cybercrime, economics
Sim Card Forensics: Digital Evidence, Nada Ibrahim, Nuha Al Naqbi, Farkhund Iqbal, Omar Alfandi
Sim Card Forensics: Digital Evidence, Nada Ibrahim, Nuha Al Naqbi, Farkhund Iqbal, Omar Alfandi
Annual ADFSL Conference on Digital Forensics, Security and Law
With the rapid evolution of the smartphone industry, mobile device forensics has become essential in cybercrime investigation. Currently, evidence forensically-retrieved from a mobile device is in the form of call logs, contacts, and SMSs; a mobile forensic investigator should also be aware of the vast amount of user data and network information that are stored in the mobile SIM card such as ICCID, IMSI, and ADN. The aim of this study is to test various forensic tools to effectively gather critical evidence stored on the SIM card. In the first set of experiments, we compare the selected forensic tools in …
Wban Security Management In Healthcare Enterprise Environments, Karina Bahena, Manghui Tu
Wban Security Management In Healthcare Enterprise Environments, Karina Bahena, Manghui Tu
Annual ADFSL Conference on Digital Forensics, Security and Law
As healthcare data are pushed online, consumers have raised big concerns on the breach of their personal information. Law and regulations have placed businesses and public organizations under obligations to take actions to prevent such data breaches. Various vulnerabilities have been identified in healthcare enterprise environments, in which the Wireless Body Area Networks (WBAN) remains to be a major vulnerability, which can be easily taken advantage of by determined adversaries. Thus, vulnerabilities of WBAN systems and the effective countermeasure mechanisms to secure WBAN are urgently needed. In this research, first, the architecture of WBAN system has been explored, and the …
Reverse Engineering A Nit That Unmasks Tor Users, Matthew Miller, Joshua Stroschein, Ashley Podhradsky
Reverse Engineering A Nit That Unmasks Tor Users, Matthew Miller, Joshua Stroschein, Ashley Podhradsky
Annual ADFSL Conference on Digital Forensics, Security and Law
This paper is a case study of a forensic investigation of a Network Investigative Technique (NIT) used by the FBI to deanonymize users of a The Onion Router (Tor) Hidden Service. The forensic investigators were hired by the defense to determine how the NIT worked. The defendant was ac- cused of using a browser to access illegal information. The authors analyzed the source code, binary files and logs that were used by the NIT. The analysis was used to validate that the NIT collected only necessary and legally authorized information. This paper outlines the publicly available case details, how the …
Forensics Analysis Of Privacy Of Portable Web Browsers, Ahmad Ghafarian
Forensics Analysis Of Privacy Of Portable Web Browsers, Ahmad Ghafarian
Annual ADFSL Conference on Digital Forensics, Security and Law
Web browser vendors offer a portable web browser option which is considered as one of the features that provides user privacy. Portable web browser is a browser that can be launched from a USB flash drive without the need for its installation on the host machine. Most popular web browsers have portable versions of their browsers as well. Portable web browsing poses a great challenge to computer forensic investigators who try to reconstruct the past browsing history, in case of any computer incidence. This research examines various sources in the host machine such as physical memory, temporary, recent, event files, …
Malware In The Mobile Device Android Environment, Diana Hintea, Robert Bird, Andrew Walker
Malware In The Mobile Device Android Environment, Diana Hintea, Robert Bird, Andrew Walker
Annual ADFSL Conference on Digital Forensics, Security and Law
exploit smartphone operating systems has exponentially expanded. Android has become the main target to exploit due to having the largest install base amongst the smartphone operating systems and owing to the open access nature in which application installations are permitted. Many Android users are unaware of the risks associated with a malware infection and to what level current malware scanners protect them. This paper tests how efficient the currently available malware scanners are. To achieve this, ten representative Android security products were selected and tested against a set of 5,560 known and categorized Android malware samples. The tests were carried …
Forensic Analysis Of Smartphone Applications For Privacy Leakage, Diana Hintea, Chrysanthi Taramonli, Robert Bird, Rezhna Yusuf
Forensic Analysis Of Smartphone Applications For Privacy Leakage, Diana Hintea, Chrysanthi Taramonli, Robert Bird, Rezhna Yusuf
Annual ADFSL Conference on Digital Forensics, Security and Law
Smartphone and tablets are personal devices that have diffused to near universal ubiquity in recent years. As Smartphone users become more privacy-aware and -conscious, research is needed to understand how “leakage” of private information (personally identifiable information – PII) occurs. This study explores how leakage studies in Droid devices should be adapted to Apple iOS devices. The OWASP Zed Attack Proxy (ZAP) is examined for 50 apps in various categories. This study confirms that: (1) most apps transmit unencrypted sensitive PII, (2) SSL is used by some recipient websites, but without corresponding app compliance with SSL, and (3) most apps …
Inferring Previously Uninstalled Applications From Residual Partial Artifacts, Jim Jones, Tahir Khan, Kathryn Laskey, Alex Nelson, Mary Laamanen, Douglas White
Inferring Previously Uninstalled Applications From Residual Partial Artifacts, Jim Jones, Tahir Khan, Kathryn Laskey, Alex Nelson, Mary Laamanen, Douglas White
Annual ADFSL Conference on Digital Forensics, Security and Law
In this paper, we present an approach and experimental results to suggest the past presence of an application after the application has been uninstalled and the system has remained in use. Current techniques rely on the recovery of intact artifacts and traces, e.g., whole files, Windows Registry entries, or log file entries, while our approach requires no intact artifact recovery and leverages trace evidence in the form of residual partial files. In the case of recently uninstalled applications or an instrumented infrastructure, artifacts and traces may be intact and complete. In most cases, however, digital artifacts and traces are al- …
One-Time Pad Encryption Steganography System, Michael J. Pelosi, Gary Kessler, Michael Scott S. Brown
One-Time Pad Encryption Steganography System, Michael J. Pelosi, Gary Kessler, Michael Scott S. Brown
Annual ADFSL Conference on Digital Forensics, Security and Law
In this paper we introduce and describe a novel approach to adaptive image steganography which is combined with One-Time Pad encryption, and demonstrate the software which implements this methodology. Testing using the state-of-the-art steganalysis software tool StegExpose concludes the image hiding is reliably secure and undetectable using reasonably-sized message payloads (≤25% message bits per image pixel; bpp). Payload image file format outputs from the software include PNG, BMP, JP2, JXR, J2K, TIFF, and WEBP. A variety of file output formats is empirically important as most steganalysis programs will only accept PNG, BMP, and possibly JPG, as the file inputs.
Keywords: …
Applying Grounded Theory Methods To Digital Forensics Research, Ahmed Almarzooqi, Andrew Jones, Richard Howley
Applying Grounded Theory Methods To Digital Forensics Research, Ahmed Almarzooqi, Andrew Jones, Richard Howley
Annual ADFSL Conference on Digital Forensics, Security and Law
Deciding on a suitable research methodology is challenging for researchers. In this paper, grounded theory is presented as a systematic and comprehensive qualitative methodology in the emergent field of digital forensics research. This paper applies grounded theory in a digital forensics research project undertaken to study how organisations build and manage digital forensics capabilities. This paper gives a step-by-step guideline to explain the procedures and techniques of using grounded theory in digital forensics research. The paper gives a detailed explanation of how the three grounded theory coding methods (open, axial, and selective coding) can be used in digital forensics research. …