Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Social and Behavioral Sciences (393)
- Physical Sciences and Mathematics (350)
- Law (314)
- Computer Sciences (313)
- Computer Engineering (311)
-
- Information Security (300)
- Electrical and Computer Engineering (299)
- Computer Law (295)
- Legal Studies (292)
- Forensic Science and Technology (291)
- Aviation (246)
- Aerospace Engineering (152)
- Aviation Safety and Security (144)
- Management and Operations (81)
- Psychology (70)
- Aviation and Space Education (47)
- Other Psychology (46)
- Political Science (44)
- Public Affairs, Public Policy and Public Administration (44)
- Other Political Science (40)
- Aerodynamics and Fluid Mechanics (38)
- Aeronautical Vehicles (38)
- Education (37)
- Business (34)
- Defense and Security Studies (31)
- Operations Research, Systems Engineering and Industrial Engineering (28)
- Navigation, Guidance, Control and Dynamics (26)
- Terrorism Studies (26)
- Peace and Conflict Studies (25)
- Keyword
-
- Aviation (36)
- Digital forensics (32)
- Safety (22)
- Aviation Security (21)
- Computer forensics (17)
-
- UAS (17)
- Digital Forensics (15)
- Digital evidence (13)
- Forensics (13)
- Security (13)
- Terrorism (13)
- Drone (11)
- UAV (11)
- Computer Forensics (9)
- Information security (8)
- Machine Learning (7)
- Privacy (7)
- Training (7)
- Aerodynamics (6)
- Aviation safety (6)
- Data recovery (6)
- Profiling (6)
- SMS (6)
- Visualization (6)
- Aerospace (5)
- Airport (5)
- Cyber crime (5)
- Cyber security (5)
- Data disposal (5)
- Disk analysis (5)
- Publication Year
- Publication
Articles 271 - 300 of 678
Full-Text Articles in Engineering
Compression Of Virtual-Machine Memory In Dynamic Malware Analysis, James E. Fowler Ph.D.
Compression Of Virtual-Machine Memory In Dynamic Malware Analysis, James E. Fowler Ph.D.
Journal of Digital Forensics, Security and Law
Lossless compression of memory dumps from virtual machines that run malware samples is considered with the goal of significantly reducing archival costs in dynamic-malware-analysis applications. Given that, in such dynamic-analysis scenarios, malware samples are typically run in virtual machines just long enough to activate any self-decryption or other detection- avoidance maneuvers, the virtual-machine memory typically changes little from that of the baseline state, with the difference being attributable in large degree to the loading of additional executables and libraries. Consequently, delta coding is proposed to compress the current virtual-machine memory dump by coding its differences with respect to a predicted …
Table Of Contents
Journal of Digital Forensics, Security and Law
No abstract provided.
Special Issue Of Best Papers From The 11th International Conference On Systematic Approaches To Digital Forensic Engineering (Sadfe 2016)
Journal of Digital Forensics, Security and Law
The SADFE series feature the different editions of the International Conference on Systematic Approaches to Digital Forensics Engineering. Now in its eleventh edition, SADFE has established itself as the premier conference for researchers and practitioners working in Systematic Approaches to Digital Forensics Engineering.
SADFE 2016, the eleventh international conference on Systematic Approaches to Digital Forensic Engineering was held in Kyoto, Japan, September 20 - 22, 2016.
Digital forensics engineering and the curation of digital collections in cultural institutions face pressing and overlapping challenges related to provenance, chain of custody, authenticity, integrity, and identity. The generation, analysis and sustainability of digital …
In-House Fabrication Of Temperature Sensitive Paint For Turbine Cooling Research, Mayur D. Patel, Mark A. Ricklick
In-House Fabrication Of Temperature Sensitive Paint For Turbine Cooling Research, Mayur D. Patel, Mark A. Ricklick
Beyond: Undergraduate Research Journal
The Temperature Sensitive Paint (TSP) is a widely used method in measuring and visualizing flow separation and heat transfer. Compared to the cost and time consumption needed for methods such as pitot tubes, temperature sensitive paint is a cheaper alternative. Due to high usage in College of Engineering research projects, it was determined that in house fabrication of temperature sensitive paint would reduce time and cost limitations. For initial stages, literature research was performed to determine the recipe of intensity based TSP with luminophore and polymer binder that operated optimum at temperatures from 0-100°C. Europium III thenoyltrifluoroacetonate was determined to …
Professional Pilot Commercial Off-The-Shelf (Cots) Efb Usage, Policies And Reliability, Tyler A. Babb
Professional Pilot Commercial Off-The-Shelf (Cots) Efb Usage, Policies And Reliability, Tyler A. Babb
International Journal of Aviation, Aeronautics, and Aerospace
Electronic Flight Bags (EFBs) have flooded the aviation industry. Commercial off-the-shelf (COTS) tablets are now commonly used by pilots as EFBs. Operators use EFBs for ease of use, faster access to information, to remove weight from the aircraft, and to increase pilots’ quality of life. Identifying trends in EFB usage among professional pilots could benefit operators and universities with flight training programs. EFB policies and procedures may vary among operators but achieve FAA compliance. This study identified these policies and procedures. The types of devices and software vary, and identifying these devices and software could be useful. This research used …
Advances In Composite Manufacturing Of Helicopter Parts, Tobias A. Weber, Hans-Joachim K. Ruff-Stahl
Advances In Composite Manufacturing Of Helicopter Parts, Tobias A. Weber, Hans-Joachim K. Ruff-Stahl
International Journal of Aviation, Aeronautics, and Aerospace
This study investigates and compares different methods for improving standard autoclave composite manufacturing in order to find suitable approaches to a more efficient composite production. The goal is not only a reduction in manufacturing times and costs but also quality enhancement. Improved part quality while decreasing costs enables a manufacturer of composite parts to expand its market share, especially in the helicopter market, which has been constantly shrinking over the last two years. Various approaches such as improved tooling technology, the use of automated systems for lamination as well as outsourcing are examined to provide an overview of possible advancements …
Integration Of Military Unmanned Aerial Systems (Uas) Into The Us National Airspace System: The Relationship Between Uas Accidents And Safety Concerns, Omar J. Hamilton, Timm J. Bliss, Chad Depperschmidt
Integration Of Military Unmanned Aerial Systems (Uas) Into The Us National Airspace System: The Relationship Between Uas Accidents And Safety Concerns, Omar J. Hamilton, Timm J. Bliss, Chad Depperschmidt
International Journal of Aviation, Aeronautics, and Aerospace
The purpose of this study was to discover if a relationship existed between the most common safety concerns and the most common UAS accidents with regards to the integration of military unmanned aerial systems (UAS) into the National Airspace System (NAS). This study examined the most common causes of UAS accidents over a five-year period, the level of safety concerns and common concerns from UAS military pilots and sensor operators. The quantitative data was derived from the Air Force, Navy and Army Safety Offices, while the qualitative data was derived from an online questionnaire and follow-up interviews of US Air …
Integrating Fatigue Management With Safety Management Systems For Commercial Flightcrew Operations, Arnold W. Starr Jr.
Integrating Fatigue Management With Safety Management Systems For Commercial Flightcrew Operations, Arnold W. Starr Jr.
International Journal of Aviation, Aeronautics, and Aerospace
Fatigue remains a significant hazard in commercial aviation and has been a major concern among all stakeholders for decades. This review of the literature explores the current prescriptive structure of the regulatory environment (Part 117) and its effect on fatigue management. To illustrate the impact of fatigue on flight operations, this article includes a brief analysis of two National Transportation Safety Board (NTSB) accident reports where fatigue was indicated as a factor. Current research in fatigue management and efforts by the Federal Aviation Administration point to the benefits of using a Safety Management Systems (SMS) methodology to manage fatigue. Using …
Estimating Airport Operations At General Aviation Airports Using The Faa Npias Airport Categories, Mary E. Johnson, Yue Gu
Estimating Airport Operations At General Aviation Airports Using The Faa Npias Airport Categories, Mary E. Johnson, Yue Gu
International Journal of Aviation, Aeronautics, and Aerospace
The number of annual aircraft operations (take-offs and landings) is a significant concern to both airport owners and operators and to governmental agencies because operations data are one of the most important criteria used for determining future investments in airports. However, estimating the number of aircraft operations at non-towered general aviation airports is challenging work due to the lack of counts from air traffic control towers or useful estimates developed using models. Previous work in estimating annual aircraft operations has resulted in models and sampling methods that are imprecise or difficult to use. In 2014, new classification categories of 2,939 …
Finding The Balance Between Price And Protection: Establishing A Surface-To-Air Fire Risk-Reduction Training Policy For Air-Carrier Pilots, Earl W. Burress Jr., Ph.D.
Finding The Balance Between Price And Protection: Establishing A Surface-To-Air Fire Risk-Reduction Training Policy For Air-Carrier Pilots, Earl W. Burress Jr., Ph.D.
Journal of Aviation/Aerospace Education & Research
Currently, U.S. air carriers do not provide equipment or training necessary to mitigate the risk posed by surface-to-air fire (SAFIRE) threats. These threats consist of self-guided weapons (infrared shoulder-fired surface-to-air missiles), manually-aimed threats (small arms, recoilless grenade launchers, rockets, and light anti-aircraft artillery), and hand-held lasers. Technological solutions to counter infrared shoulder-fired missiles have been explored, but were rejected due to prohibitive equipment and maintenance costs. A lower cost option, providing air-carrier pilots with SAFIRE risk-reduction training, has not been formally addressed by the air-carrier industry or the U.S. federal government. This effort will use a business concept, the Cost-Benefit …
Exploration Of A Confidence-Based Assessment Tool Within An Aviation Training Program, Paul F. Novacek Ph.D.
Exploration Of A Confidence-Based Assessment Tool Within An Aviation Training Program, Paul F. Novacek Ph.D.
Journal of Aviation/Aerospace Education & Research
Traditional use of multiple-choice questions reward a student for guessing. This technique encourages rote memorization of questions to pass a lengthy exam, and does not promote comprehensive understanding or subject correlation. In an effort to identify guessing on answers during an exam within a safety-critical aviation pilot training course, a qualitative research study was undertaken that introduced a confidence-based element to the end-of-ground-school exam. Confidence-based assessments consist of students’ self-reported level of certainty in their responses, indicating which answers they believe are correct while also indicating how confident they feel with their selections. The research goals were to clearly identify …
Long And Short-Range Air Navigation On Spherical Earth, Nihad E. Daidzic
Long And Short-Range Air Navigation On Spherical Earth, Nihad E. Daidzic
International Journal of Aviation, Aeronautics, and Aerospace
Global range air navigation implies non-stop flight between any two airports on Earth. Such effort would require airplanes with the operational air range of at least 12,500 NM which is about 40-60% longer than anything existing in commercial air transport today. Air transportation economy requires flying shortest distance, which in the case of spherical Earth are Orthodrome arcs. Rhumb-line navigation has little practical use in long-range flights, but has been presented for historical reasons and for comparison. Database of about 50 major international airports from every corner of the world has been designed and used in testing and route validation. …
Impact Of Us Low Cost Carriers Entrance To The Airline Market In Colombia, South America, Carolina Anderson, Tamilla Curtis, Robert F. Moss, Maryjo O. Smith, Gerson Mey
Impact Of Us Low Cost Carriers Entrance To The Airline Market In Colombia, South America, Carolina Anderson, Tamilla Curtis, Robert F. Moss, Maryjo O. Smith, Gerson Mey
International Journal of Aviation, Aeronautics, and Aerospace
This study researched the impact of US low cost carriers’ entrance to the airline market in Colombia, South America. The study analyzed the overall market share between Florida and Colombia after U.S. low cost carriers entered the market and finds that the market share for the Colombian flag carrier Avianca and U.S. legacy carrier American Airlines, who used to dominate this market, has decreased; however, the total passenger demand has increased. This increase in passenger demand can be attributed in part to U.S. low cost carriers opening new city pairs and allowing passengers to fly direct to the U.S. from …
Using Conversation Analysis In Data-Driven Aviation Training With Large-Scale Qualitative Datasets, William A. Tuccio Ph.D., Maurice Nevile Ph.D.
Using Conversation Analysis In Data-Driven Aviation Training With Large-Scale Qualitative Datasets, William A. Tuccio Ph.D., Maurice Nevile Ph.D.
Journal of Aviation/Aerospace Education & Research
This paper contributes to a growing body of work related to the Conversation Analytic Role-play Method (CARM) by studying the primary flight instruction environment to create training interventions related to radio communications and flight instruction practices. Framed in the context of conversation analysis, an approach to the detailed analysis of naturally occurring interaction, the large-scale, long-duration qualitative audio/video data collection and coding methodology is discussed, followed by trends identified in the ongoing study. The concept of CARM “trainables” are discussed with examples. The study shows that large-scale qualitative datasets may be leveraged to produce valuable data-driven training interventions.
The Value Of A Collegiate Far Part 141 Jeopardy-Crew Resource Management (Crm)-Simulation Event, Samuel M. Vance
The Value Of A Collegiate Far Part 141 Jeopardy-Crew Resource Management (Crm)-Simulation Event, Samuel M. Vance
Journal of Aviation/Aerospace Education & Research
This article explores the viability of using a FAR Part 141 collegiate crew resource management (CRM) flight simulator scenario event as a jeopardy event (a graded, syllabus item) in an upper-level professional pilot curriculum course. Ultimately, the objective is to suggest this approach as a value-added curriculum consideration for other collegiate professional pilot programs. The selection of four CRM criteria to be examined was made by the course professor. Using the four principles, the students assembled the grading rubric for their event. The simulator scenario placed students in airspace, geography and weather dissimilar to that in which they were training …
Broadening Traditional Aviation Meteorology Education To Support Spaceflight Operations, Thomas A. Guinn, Nicholas J. Stapleton, Katherine A. Winters, Bradley M. Muller, Debbie M. Schaum
Broadening Traditional Aviation Meteorology Education To Support Spaceflight Operations, Thomas A. Guinn, Nicholas J. Stapleton, Katherine A. Winters, Bradley M. Muller, Debbie M. Schaum
Journal of Aviation/Aerospace Education & Research
The purpose of this paper is to examine the expansion of traditional aviation meteorology education necessary to support the growing commercial space-operations industry. While spaceflight meteorological considerations do overlap with those of traditional aviation operations, there are notable differences schools must address for appropriate education and training of both meteorologists and operators. These include knowledge of increased weather sensitivities, space-weather impacts, triggered lightning, triboelectrification, and high-resolution vertical wind-profile analyses. An added challenge in the educational process is the more limited amount of publicly available weather and space-weather products necessary to support spaceflight education. Furthermore, in comparison with traditional aviation meteorology, …
Forecasting The Air Race Classic: Lessons In Interdisciplinary Aviation Weather Support And Decision-Making, Shawn M. Milrad, Debbie Schaum
Forecasting The Air Race Classic: Lessons In Interdisciplinary Aviation Weather Support And Decision-Making, Shawn M. Milrad, Debbie Schaum
Journal of Aviation/Aerospace Education & Research
The Air Race Classic (ARC) is an all-female Visual Flight Rules air race held each June. Embry-Riddle Aeronautical University Daytona Beach (ERAU-DB) has had primarily student race teams participate and frequently place strongly in the ARC since 1996. The ERAU-DB Meteorology Program has provided successful weather support to ERAU-DB race team(s) for the past decade, including as the terminus host institution in 2016. In 2014, the weather support was formalized as a three-credit interdisciplinary summer course, incorporating a mix of aeronautical science (pilot), dispatch, and meteorology students. Using concepts of service and experiential learning, the ARC course has successfully integrated …
Bloom Filters Optimized Wu-Manber For Intrusion Detection, Monther Aldwairi, Koloud Al-Khamaiseh, Fatima Alharbi, Babar Shah
Bloom Filters Optimized Wu-Manber For Intrusion Detection, Monther Aldwairi, Koloud Al-Khamaiseh, Fatima Alharbi, Babar Shah
Journal of Digital Forensics, Security and Law
With increasing number and severity of attacks, monitoring ingress and egress network traffic is becoming essential everyday task. Intrusion detection systems are the main tools for capturing and searching network traffic for potential harm. Signature-based intrusion detection systems are the most widely used, and they simply use a pattern matching algorithms to locate attack signatures in intercepted network traffic. Pattern matching algorithms are very expensive in terms of running time and memory usage, leaving intrusion detection systems unable to detect attacks in real-time. We propose a Bloom filters optimized Wu-Manber pattern matching algorithm to speed up intrusion detection. The Bloom …
The Impact Of Md5 File Hash Collisions On Digital Forensic Imaging, Gary C. Kessler
The Impact Of Md5 File Hash Collisions On Digital Forensic Imaging, Gary C. Kessler
Journal of Digital Forensics, Security and Law
The Message Digest 5 (MD5) hash is commonly used as for integrity verification in the forensic imaging process. The ability to force MD5 hash collisions has been a reality for more than a decade, although there is a general consensus that hash collisions are of minimal impact to the practice of computer forensics. This paper describes an experiment to determine the results of imaging two disks that are identical except for one file, the two versions of which have different content but otherwise occupy the same byte positions on the disk, are the same size, and have the same hash …
Leveraging The Windows Amcache.Hve File In Forensic Investigations, Bhupendra Singh, Upasna Singh
Leveraging The Windows Amcache.Hve File In Forensic Investigations, Bhupendra Singh, Upasna Singh
Journal of Digital Forensics, Security and Law
The Amcache.hve is a registry hive file that is created by Microsoft® Windows® to store the information related to execution of programs. This paper highlights the evidential potential of Amcache.hve file and its application in the area of user activity analysis. The study uncovers numerous artifacts retained in Amcache.hve file when a user performs certain actions such as running host-based applications, installation of new applications, or running portable applications from external devices. The results of experiments demonstrate that Amcache.hve file stores intriguing artifacts related to applications such as timestamps of creation and last modification of any application; name, description, publisher …
The 2016 Analysis Of Information Remaining On Computer Hard Disks Offered For Sale On The Second Hand Market In The Uae, Thomas Martin, Andy Jones, Mohammed Alzaabi
The 2016 Analysis Of Information Remaining On Computer Hard Disks Offered For Sale On The Second Hand Market In The Uae, Thomas Martin, Andy Jones, Mohammed Alzaabi
Journal of Digital Forensics, Security and Law
This research describes our survey of data remaining on computer hard disks sold on the second hand market in the United Arab Emirates (UAE). This is a repetition of the first survey conducted in 2012 (Jones, Martin, & Alzaabi, 2012). Similar studies have been carried over the last ten years in the United Kingdom, Australia, USA, Germany and France: (Jones, Mee, Meyler, & Gooch, 2005), (Jones, Valli, Sutherland, & Thomas, 2006), (Jones, Valli, Dardick, & Sutherland, 2008), (Jones, Valli, Dardick, & Sutherland, 2009). This research was undertaken to gain insight into the volumes of data found on second-hand disks purchased …
A New Distributed Chinese Wall Security Policy Model, Saad Fehis, Omar Nouali, Mohand-Tahar Kechadi
A New Distributed Chinese Wall Security Policy Model, Saad Fehis, Omar Nouali, Mohand-Tahar Kechadi
Journal of Digital Forensics, Security and Law
The application of the Chinese wall security policy model (CWSPM) to control the information flows between two or more competing and/or conflicting companies in cloud computing (Multi-tenancy) or in the social network, is a very interesting solution. The main goal of the Chinese Wall Security Policy is to build a wall between the datasets of competing companies, and among the system subjects. This is done by the applying to the subjects mandatory rules, in order to control the information flow caused between them. This problem is one of the hottest topics in the area of cloud computing (as a distributed …
The Impact Of Sha-1 File Hash Collisions On Digital Forensic Imaging: A Follow-Up Experiment, Gary C. Kessler
The Impact Of Sha-1 File Hash Collisions On Digital Forensic Imaging: A Follow-Up Experiment, Gary C. Kessler
Journal of Digital Forensics, Security and Law
A previous paper described an experiment showing that Message Digest 5 (MD5) hash collisions of files have no impact on integrity verification in the forensic imaging process. This paper describes a similar experiment applied when two files have a Secure Hash Algorithm (SHA-1) collision.
A Survey Of Social Network Forensics, Umit Karabiyik, Muhammed Abdullah Canbaz, Ahmet Aksoy, Tayfun Tuna, Esra Akbas, Bilal Gonen, Ramazan S. Aygun
A Survey Of Social Network Forensics, Umit Karabiyik, Muhammed Abdullah Canbaz, Ahmet Aksoy, Tayfun Tuna, Esra Akbas, Bilal Gonen, Ramazan S. Aygun
Journal of Digital Forensics, Security and Law
Social networks in any form, specifically online social networks (OSNs), are becoming a part of our everyday life in this new millennium especially with the advanced and simple communication technologies through easily accessible devices such as smartphones and tablets. The data generated through the use of these technologies need to be analyzed for forensic purposes when criminal and terrorist activities are involved. In order to deal with the forensic implications of social networks, current research on both digital forensics and social networks need to be incorporated and understood. This will help digital forensics investigators to predict, detect and even prevent …
Table Of Contents
Journal of Digital Forensics, Security and Law
No abstract provided.
Determination Of Aqueous Surfactant Solution Surface Tensions With A Surface Tensiometer, Remelisa Esteves, Birce Dikici Ph.D, Matthew Lehman, Qayyum Mazumder, Nonso Onukwuba
Determination Of Aqueous Surfactant Solution Surface Tensions With A Surface Tensiometer, Remelisa Esteves, Birce Dikici Ph.D, Matthew Lehman, Qayyum Mazumder, Nonso Onukwuba
Beyond: Undergraduate Research Journal
Surfactant solutions are applicable to engineering systems for cooling equipment for electronics. Surfactants can be added to water to improve heat transfer. An application of using aqueous surfactant solutions can be through microchannel heat sink. Although it is ideal to redesign these systems to reduce heat, it is a costly method. Surfactant solutions at optimal solution concentration can be able to transfer heat quickly and effectively with minimum expense. The surface tension of surfactant solutions is an important parameter for boiling heat transfer and must be taken into consideration. The purpose of this research is to measure surface tension of …
Determination Of Surfactant Solution Viscosities With A Rotational Viscometer, Remelisa Esteves, Nonso Onukwuba, Birce Dikici Ph.D
Determination Of Surfactant Solution Viscosities With A Rotational Viscometer, Remelisa Esteves, Nonso Onukwuba, Birce Dikici Ph.D
Beyond: Undergraduate Research Journal
Aqueous surfactant solutions are used in engineering systems for improving boiling heat transfer. The purpose of this research is to determine the viscosities of surfactant solutions and to investigate the effect of composition on viscosity. The results obtained can possibly be used as reference for further study in the effects of surfactant solution viscosities on nucleate boiling. A rotational viscometer was used to determine the viscosities of three surfactant solutions – SLS, EH-14, and SA-9 – of various compositions at room temperature. It was discovered that the viscosities of SLS, EH-14, and SA-9 had a nearly consistent pattern as their …
Applying The Technology Acceptance Model To Understand Aviation Students’ Perceptions Toward Augmented Reality Maintenance Training Instruction, Yu Wang, Amadou Anne, Tim Ropp
Applying The Technology Acceptance Model To Understand Aviation Students’ Perceptions Toward Augmented Reality Maintenance Training Instruction, Yu Wang, Amadou Anne, Tim Ropp
International Journal of Aviation, Aeronautics, and Aerospace
Augmented Reality (AR) Technology, since its inception, has been enhanced significantly by software and hardware developers, and has been widely utilized in various fields such as manufacturing, entertainment, architecture, commerce and education. In recent years, maintenance instructions developed on the basis of AR technology have demonstrated their potential to positively impact maintenance training and technical tasks in aviation. Features of AR maintenance instructions include interactive content, user-friendly operation interface, enhanced visualization and real-time data feeds. The researchers conducted a case study of forty-one aviation maintenance students at a Midwestern university. The purpose of this study was twofold: to evaluate the …
Investigation Into Unmanned Aircraft System Incidents In The National Airspace System, Rohan S. Sharma
Investigation Into Unmanned Aircraft System Incidents In The National Airspace System, Rohan S. Sharma
International Journal of Aviation, Aeronautics, and Aerospace
With the promulgation of Federal Aviation Regulations for small unmanned aircraft systems, the volume of unmanned flight operations is expected to increase, which demands an analysis of potential hazards to the National Airspace System. Descriptive statistics were used to investigate reports archived in the Aviation Safety Information and Analysis and Sharing system involving unmanned aircraft systems, as well as the FAA UAS Sightings Reports database. The frequency of reports involving airspace violations, and Near Mid-air Collisions by unmanned aircraft systems as well as an analysis of the location, sponsor category, phase of flight, altitude, and airspace type in which the …