Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Embry-Riddle Aeronautical University

2011

Discipline
Keyword
Publication
Publication Type

Articles 31 - 60 of 102

Full-Text Articles in Engineering

Kindle Forensics: Acquisition & Analysis, Peter Hannay May 2011

Kindle Forensics: Acquisition & Analysis, Peter Hannay

Annual ADFSL Conference on Digital Forensics, Security and Law

The Amazon Kindle eBook reader supports a wide range of capabilities beyond reading books. This functionality includes an inbuilt cellular data connection known as Whispernet. The Kindle provides web browsing, an application framework, eBook delivery and other services over this connection. The historic data left by user interaction with this device may be of forensic interest. Analysis of the Amazon Kindle device has resulted in a method to reliably extract and interpret data from these devices in a forensically complete manner.

Keywords: forensics, digital forensics, kindle, mobile, embedded, ebook, ereader


Aacsb‐Accredited Schools’ Adoption Of Information Security Curriculum, Linda Lau, Cheryl Davis May 2011

Aacsb‐Accredited Schools’ Adoption Of Information Security Curriculum, Linda Lau, Cheryl Davis

Annual ADFSL Conference on Digital Forensics, Security and Law

The need to professionally and successfully conduct computer forensic investigations of incidents has never been greater. This has launched an increasing demand for a skilled computer security workforce (Locasto, et al., 2011). This paper examines the extent to which AACSB-accredited universities located in Virginia, Maryland and Washington, D.C. are working towards providing courses that will meet this demand. The authors conduct an online research of the information security courses and programs offered by the 27 AACSB-accredited business schools in the selected area.

The preliminary investigation revealed that eight of the 27 participating universities did not offer any courses in cybersecurity, …


Digital Forensics Investigation In A Collegiate Environment, Robert E. Johnston May 2011

Digital Forensics Investigation In A Collegiate Environment, Robert E. Johnston

Annual ADFSL Conference on Digital Forensics, Security and Law

Creating, building, managing a cost effective digital forensics lab including a team of qualified examiners can be a challenge for colleges [1] with multiple campuses in multiple towns, counties and states. Leaving such examination responsibilities to each of the campuses results in not only disparity in the results but more than likely excessive duplication of efforts as well as the potential for compromise of evidence. Centralizing the forensic efforts results in a team that is not subject to the political pressures of a campus and virtually eliminates the possibility of examiner favoritism. Learn what it takes to create a cost …


Backtrack In The Outback - A Preliminary Report On Cyber Security Evaluation Of Organisations In Western Australia, Craig Valli, Andrew Woodward, Peter Hannay May 2011

Backtrack In The Outback - A Preliminary Report On Cyber Security Evaluation Of Organisations In Western Australia, Craig Valli, Andrew Woodward, Peter Hannay

Annual ADFSL Conference on Digital Forensics, Security and Law

The authors were involved in extensive vulnerability assessment and penetration testing of over 15 large organisations across various industry sectors in the Perth CBD. The actual live testing involved a team of five people for approximately a four week period, and was black box testing. The scanning consisted of running network and web vulnerability tools, and in a few cases, exploiting vulnerability to establish validity of the tools. The tools were run in aggressive mode with no attempt made to deceive or avoid detection by IDS/IPS or firewalls. The aim of the testing was to determine firstly whether these organisations …


Creating Realistic Corpora For Security And Forensic Education, Kam Woods, Christopher A. Lee, Simson Garfinkel, David Dittrich, Adam Russell, Kris Kearton May 2011

Creating Realistic Corpora For Security And Forensic Education, Kam Woods, Christopher A. Lee, Simson Garfinkel, David Dittrich, Adam Russell, Kris Kearton

Annual ADFSL Conference on Digital Forensics, Security and Law

We present work on the design, implementation, distribution, and use of realistic forensic datasets to support digital forensics and security education. We describe in particular the “M57-Patents” scenario, a multi-modal corpus consisting of hard drive images, RAM images, network captures, and images from other devices typically found in forensics investigations such as USB drives and cellphones. Corpus creation has been performed as part of a scripted scenario; subsequently it is less “noisy” than real-world data but retains the complexity necessary to support a wide variety of forensic education activities. Realistic forensic corpora allow direct comparison of approaches and tools across …


Developing A Forensic Continuous Audit Model, Grover S. Kearns, Katherine J. Barker May 2011

Developing A Forensic Continuous Audit Model, Grover S. Kearns, Katherine J. Barker

Annual ADFSL Conference on Digital Forensics, Security and Law

Despite increased attention to internal controls and risk assessment, traditional audit approaches do not seem to be highly effective in uncovering the majority of frauds. Less than 20 percent of all occupational frauds are uncovered by auditors. Forensic accounting has recognized the need for automated approaches to fraud analysis yet research has not examined the benefits of forensic continuous auditing as a method to detect and deter corporate fraud. The purpose of this paper is to show how such an approach is possible. A model is presented that supports the acceptance of forensic continuous auditing by auditors and management as …


Development Of A Distributed Print‐Out Monitoring System For Efficient Forensic Investigation, Satoshi Kai, Tetsutaro Uehara May 2011

Development Of A Distributed Print‐Out Monitoring System For Efficient Forensic Investigation, Satoshi Kai, Tetsutaro Uehara

Annual ADFSL Conference on Digital Forensics, Security and Law

If information leakage occurs, an investigator is instructed to specify what documents were leaked and who leaked them. In the present work, a distributed print-out monitoring system—which consists of a virtual printer driver and print-out policy/log management servers—was developed. For easily matching the discovered (i.e., leaked) paper document with the print-out log, the virtual printer driver acquires full-text of printed-out documents by DDI hooking technique to check the content, transforms a spool file to a picture file and creates both a thumbnail and text log for forensic investigation afterwards. The log size is as only about 0.04 times bigger than …


Mac Os X Forensics: Password Discovery, David Primeaux, Robert Dahlberg, Kamnab Keo, Stephen Larson, B. Pennell, K. Sherman May 2011

Mac Os X Forensics: Password Discovery, David Primeaux, Robert Dahlberg, Kamnab Keo, Stephen Larson, B. Pennell, K. Sherman

Annual ADFSL Conference on Digital Forensics, Security and Law

OS X provides a password-rich environment in which passwords protect OS X resources and perhaps many other resources accessed through OS X. Every password an investigator discovers in an OS X environment has the potential for use in discovering other such passwords, and any discovered passwords may also be useful in other aspects of an investigation, not directly related to the OS X environment. This research advises the use of multiple attack vectors in approaching the password problem in an OS X system, including the more generally applicable non-OS X-specific techniques such as social engineering or well-known password cracking techniques …


Software Piracy Forensics: Impact And Implications Of Post‐Piracy Modifications, Vinod Bhattathiripad, S. Santhosh Baboo May 2011

Software Piracy Forensics: Impact And Implications Of Post‐Piracy Modifications, Vinod Bhattathiripad, S. Santhosh Baboo

Annual ADFSL Conference on Digital Forensics, Security and Law

Piracy is potentially possible at any stage of the lifetime of the software. In a post-piracy situation, however, the growth of the respective versions of the software (both the original and pirated) is expected to be in different directions as a result of expectedly different implementation strategies. This paper shows how such post-piracy modifications are of special interest to a cyber crime expert investigating software piracy and suggests that the present software piracy forensic (or software copyright infringement investigation) approaches require amendments to take in such modifications. For this purpose, the paper also presents a format that is jargon-free, so …


Understanding Issues In Cloud Forensics: Two Hypothetical Case Studies, Josiah Dykstra, Alan T. Sherman May 2011

Understanding Issues In Cloud Forensics: Two Hypothetical Case Studies, Josiah Dykstra, Alan T. Sherman

Annual ADFSL Conference on Digital Forensics, Security and Law

The inevitable vulnerabilities and criminal targeting of cloud environments demand an understanding of how digital forensic investigations of the cloud can be accomplished. We present two hypothetical case studies of cloud crimes; child pornography being hosted in the cloud, and a compromised cloudbased website. Our cases highlight shortcomings of current forensic practices and laws. We describe significant challenges with cloud forensics, including forensic acquisition, evidence preservation and chain of custody, and open problems for continued research.

Keywords: Cloud computing, cloud forensics, digital forensics, case studies


A Practitioners Guide To The Forensic Investigation Of Xbox 360 Gaming Consoles, Ashley L. Podhradsky, Rob D’Ovidio, Cindy Casey May 2011

A Practitioners Guide To The Forensic Investigation Of Xbox 360 Gaming Consoles, Ashley L. Podhradsky, Rob D’Ovidio, Cindy Casey

Annual ADFSL Conference on Digital Forensics, Security and Law

Given the ubiquitous nature of computing, individuals now have nearly 24-7 access to the internet. People are not just going online through traditional means with a PC anymore, they are now frequently using nontraditional devices such as cell phones, smart phones, and gaming consoles. Given the increased use of gaming consoles for online access, there is also an increased use of gaming consoles to commit criminal activity. The digital forensic community has been tasked with creating new approaches for forensically analyzing gaming consoles. In this research paper the authors demonstrate different tools, both commercial and open source, available to forensically …


Sampling: Making Electronic Discovery More Cost Effective, Milton Luoma, Vicki Luoma May 2011

Sampling: Making Electronic Discovery More Cost Effective, Milton Luoma, Vicki Luoma

Annual ADFSL Conference on Digital Forensics, Security and Law

With the huge volumes of electronic data subject to discovery in virtually every instance of litigation, time and costs of conducting discovery have become exceedingly important when litigants plan their discovery strategies. Rather than incurring the costs of having lawyers review every document produced in response to a discovery request in search of relevant evidence, a cost effective strategy for document review planning is to use statistical sampling of the database of documents to determine the likelihood of finding relevant evidence by reviewing additional documents. This paper reviews and discusses how sampling can be used to make document review more …


Digital Forensics And The Law, Karon N. Murff, Hugh E. Gardenier, Martha L. Gardenier May 2011

Digital Forensics And The Law, Karon N. Murff, Hugh E. Gardenier, Martha L. Gardenier

Annual ADFSL Conference on Digital Forensics, Security and Law

As computers and digital devices become more entrenched in our way of life, they become tools for both good and nefarious purposes. When the digital world collides with the legal world, a vast chasm is created. This paper will reflect how the legal community is failing to meet its obligation to provide adequate representation due to a lack of education about digital (computer) forensics. Whether in a civil litigation setting or a criminal setting, attorneys, prosecutors and judges have inadequate knowledge when it comes to the important questions they need to ask regarding digital evidence. Reliance on expert witnesses is …


Optimizing High Volume Traffic Surges Using Discrete Event Simulation, Claire L. Johnson May 2011

Optimizing High Volume Traffic Surges Using Discrete Event Simulation, Claire L. Johnson

Doctoral Dissertations and Master's Theses

The purpose of this applied research study is to determine the fidelity of a discrete event simulation tool called the Evacuation Simulation Prediction Tool (ESP) in predicting transit times during a high volume surge in traffic flow. The ESP tool was developed for the purpose of predicting and optimizing large-scale evacuations of counties or regions as an aide in emergency and disaster preparedness planning. The goal of the ESP model is to ascertain the balance of traffic flow capacity by managing the human factor events that impinge upon orderly highway travel without immobilizing the travel route. The objective of this …


Classification Of Marine Vessels In A Littoral Environment Using A Novel Training Database, Robert Andrew Lister May 2011

Classification Of Marine Vessels In A Littoral Environment Using A Novel Training Database, Robert Andrew Lister

Master's Theses - Daytona Beach

Research into object classification has led to the creation of hundreds of databases for use as training sets in object classification algorithms. Datasets made up of thousands of cars, people, boats, faces and everyday objects exist for general classification techniques. However, no commercially available database exists for use with detailed classification and categorization of marine vessels commonly found in littoral environments. This research seeks to fill this void and is the combination of a multi-stage research endeavor designed to provide the missing marine vessel ontology. The first of the two stages performed to date introduces a novel training database called …


Analysis Of Effects Of Financial Factors On Profitability Of Low-Cost And Legacy Carriers, Nicholas Joseph Kleoppel May 2011

Analysis Of Effects Of Financial Factors On Profitability Of Low-Cost And Legacy Carriers, Nicholas Joseph Kleoppel

Doctoral Dissertations and Master's Theses

Since airline deregulation in 1978, there have been over 180 bankruptcy filings by airlines. Legacy and Low-Cost carriers are unique in how they operate and how they generate revenue; both business models have advantages and disadvantages. However, the Low-Cost carriers have shown increases in revenue and have been growing at increasing rates over the Legacy carriers. This study analyzed financial factors from four airlines in each business model to reveal which financial factors can help determine profitability of an airline. This researcher found significant differences between Legacy and Low-Cost Passenger Revenues, Maintenance Expenses, and Depreciation and Amortization Expenses. Additionally, there …


Modelling And Hazard Analysis For Contaminated Sediments Using Stamp Model, Karim Hardy, Franck Guarnieri May 2011

Modelling And Hazard Analysis For Contaminated Sediments Using Stamp Model, Karim Hardy, Franck Guarnieri

Publications

Processes for remediation (removal of pollution or contaminants) of contaminated sediments have become very efficient. These technologies, which are particularly complex, call for a comprehensive approach to risk analysis which characterises all threats (to humans, equipment, local residents, the environment etc.). The STAMP accident model (Systems-Theoretic Accident Model and Processes) is an example of such a comprehensive approach, and it has been chosen to characterise the risks associated with Novosol®, an innovative remediation process. Risk analysis is carried out through the application of STPA (STamP-based Analysis). This article is organised into three sections. The first describes the Novosol® process for …


Supervisory Autonomous Control Of Homogeneous Teams Of Unmanned Ground Vehicles, With Application To The Multi-Autonomous Ground-Robotic International Challenge, Katrina L. Corley Apr 2011

Supervisory Autonomous Control Of Homogeneous Teams Of Unmanned Ground Vehicles, With Application To The Multi-Autonomous Ground-Robotic International Challenge, Katrina L. Corley

Master's Theses - Daytona Beach

There are many different proposed methods for Supervisory Control of semi-autonomous robots. There have also been numerous software simulations to determine how many robots can be successfully supervised by a single operator, a problem known as fan-out, but only a few studies have been conducted using actual robots. As evidenced by the MAGIC 2010 competition, there is increasing interest in amplifying human capacity by allowing one or a few operators to supervise a team of robotic agents. This interest provides motivation to perform a more in-depth evaluation of many autonomous/semiautonomous robots an operator can successfully supervise. The MAGIC competition allowed …


My Adventures In Helicopters!, Dwayne Williams Apr 2011

My Adventures In Helicopters!, Dwayne Williams

ERAU Prescott Aviation History Program

Hear the remarkable story of a lifetime flying helicopters, from a flight test pilot for Bell, Heritage Aviation Ltd. and MD helicopters.


Hydrostatic Pressure Testing Of A Square-Cross Section Stainless Steel Propellant Tank Manufactured Using Selective Laser Sintering, Spencer Fuller Apr 2011

Hydrostatic Pressure Testing Of A Square-Cross Section Stainless Steel Propellant Tank Manufactured Using Selective Laser Sintering, Spencer Fuller

Master's Theses - Daytona Beach

The purpose of this study was to determine if parts manufactured using metal selective laser sintering (SLS) exhibit the same isotropic material properties as conventionally made metal parts. This was accomplished by performing a hydrostatic pressure test (HPT) of a metal SLS manufactured propellant tank, constructed for a nano-satellite of the cubesat class. Strain measurements from twelve strain gage locations on the propellant tank were recorded. A finite element analysis (FEA) model, which assumes isotropic material properties, was generated and a FEA analysis was ran at several pressure loads. The tanks strain data at the corresponding pressure loads from the …


Neural Network Prediction Of Ultimate Compression After Impact Loads In Graphite-Epoxy Coupons From Ultrasonic C-Scan Images, Nikolas L. Geiselman Apr 2011

Neural Network Prediction Of Ultimate Compression After Impact Loads In Graphite-Epoxy Coupons From Ultrasonic C-Scan Images, Nikolas L. Geiselman

Master's Theses - Daytona Beach

The purpose of this project was to investigate how accurately an artificial neural network could predict the ultimate compressive loads of impact damaged 24-ply graphite-epoxy coupons from ultrasonic C-scan images. The 24-ply graphite-epoxy coupons were manufactured with bidirectional preimpregnated tape and cut into 21 coupons, 4 inches by 6 inches each. The coupons were impacted at known impact energies of 10, 12, 14, 16, 18, and 20 Joules in order to create barely visible impact damage (BVID). The coupons were then scanned with an ultrasonic C-scan system to create an image of the damaged area. Each coupon was then compressed …


Guidance, Navigation And Control Of A Fly-By-Wire Transport Category Airship Designed For Hover Cargo Delivery, Harshad H. Lalan Apr 2011

Guidance, Navigation And Control Of A Fly-By-Wire Transport Category Airship Designed For Hover Cargo Delivery, Harshad H. Lalan

Master's Theses - Daytona Beach

The purpose of this thesis is to develop fly-by-wire pilot controls for a transport category airship propelled with six thrust vectoring engines, and to develop control laws to maintain position, heading, and attitude during hover and cargo operations. Owing to the large body area, most airships require that they be pointed into the wind to maintain their position. This research aims at controlling an airship attitude and position during hover cargo delivery, irrespective of the wind direction.

Control laws were developed for two primary modes of the airship: Flight (High Speed Mode) and Hover (Cargo Delivery Mode). Different sets of …


Development Of Multidisciplinary Design Optimization Process For A Large Scale Hybrid Composite Wind Turbine Blade, Jin Woo Lee Apr 2011

Development Of Multidisciplinary Design Optimization Process For A Large Scale Hybrid Composite Wind Turbine Blade, Jin Woo Lee

Master's Theses - Daytona Beach

Development of a multidisciplinary design optimization (MDO) of a large scale hybrid composite wind turbine blade is performed. Multiple objectives are considered in the MDO process to maximize annual energy production and lifetime profit, minimize weight and power production rate. A wind turbine blade is divided into regions and the layup sequences for each region are considered as design variables. The scale of wind turbine blade is also considered to find the optimum size of a wind turbine blade. Applied loads due to extreme wind conditions for rotor rotation and rotor stop condition are considered for finite element analysis (FEA) …


Nurturing Systems Thinking: Developing A Framework Based On The Human Factors Analysis And Classification System (Hfacs) To Improve Systems Development Processes, Arjun Vijayanarayanan Apr 2011

Nurturing Systems Thinking: Developing A Framework Based On The Human Factors Analysis And Classification System (Hfacs) To Improve Systems Development Processes, Arjun Vijayanarayanan

Doctoral Dissertations and Master's Theses

Large systems engineering projects have an astonishingly high failure rate. The reasons hypothesized for such a high failure rate include the neglect of nonsalient system elements such as social and human or organizational aspects of systems. Social and human factors have long been known to be critical elements of systems that are frequently ignored (e.g., Goguen, 1994). Systems engineering processes can benefit and be improved by effective utilization of a framework that helps developers expand their attention and efforts beyond the salient aspects of the system and the development process. In the aviation field, the Human Factors Analysis and Classification …


The Effect Of Shift Turnover Strategy And Time Pressure On Aviation Maintenance Technician Performance, William R. Warren Apr 2011

The Effect Of Shift Turnover Strategy And Time Pressure On Aviation Maintenance Technician Performance, William R. Warren

Doctoral Dissertations and Master's Theses

Aviation maintenance technicians (AMTs) provide the technical and applied knowledge required to maintain airworthiness in aircraft. In commercial aviation, maintenance tasks are performed across multiple shifts. When AMTs share a maintenance task between shifts, the shift turnover strategy used may determine if information is effectively transferred between AMTs. Ineffective shift turnover strategies are a contributing factor in many aviation accidents and incidents. Additionally, time constraints on certain maintenance tasks may cause AMTs to commit error when performing a task. The present study examined the effect of shift turnover strategy (face-to-face or written) and time pressure on error capture, accuracy, and …


Addressing Water Quality Issues In Rural Cameroon With Household Biosand Filters, Laine Klopfensten, Laura Petrasky, Valerie Winton, Jeff Brown Apr 2011

Addressing Water Quality Issues In Rural Cameroon With Household Biosand Filters, Laine Klopfensten, Laura Petrasky, Valerie Winton, Jeff Brown

Publications

This paper describes an ongoing collaboration between the Hope College student chapter of Engineers Without Borders – USA and the rural community of Nkuv in the Northwest Province of Cameroon related to improving drinking water quality using Manz biosand filters. The collaboration began in 2006 and focused on developing a community-based construction and distribution model for household water treatment units. Results from microbiology testing of the constructed filters indicate that this water treatment method is effective for improving water quality in rural areas. The results also highlight the need for ongoing assessment and adapting community education programs to provide necessary …


Ultimate Compression After Impact Load Prediction In Graphite/Epoxy Coupons Using Neural Network And Multivariate Statistical Analyses, Alexandre David Grégoire Apr 2011

Ultimate Compression After Impact Load Prediction In Graphite/Epoxy Coupons Using Neural Network And Multivariate Statistical Analyses, Alexandre David Grégoire

Doctoral Dissertations and Master's Theses

The goal of this research was to accurately predict the ultimate compressive load of impact damaged graphite/epoxy coupons using a Kohonen self-organizing map (SOM) neural network and multivariate statistical regression analysis (MSRA). An optimized use of these data treatment tools allowed the generation of a simple, physically understandable equation that predicts the ultimate failure load of an impacted damaged coupon based uniquely on the acoustic emissions it emits at low proof loads. Acoustic emission (AE) data were collected using two 150 kHz resonant transducers which detected and recorded the AE activity given off during compression to failure of thirty-four impacted …


Effects Of Online Training On Aircrew Monitoring Behaviors: A Field Study, Brian A. Potter Apr 2011

Effects Of Online Training On Aircrew Monitoring Behaviors: A Field Study, Brian A. Potter

Doctoral Dissertations and Master's Theses

Data from aircraft accidents and line observation studies indicate that inadequate pilot monitoring is a growing safety concern. In the cockpit environment, pilots who fail to properly manage their workload commit more monitoring errors. Given the lack of training and educational programs available to pilots which emphasize improving their monitoring skills, more research is needed to assess the usefulness of types of training that can be used to improve pilots' monitoring. This research project sets out to determine if the potential exists to enhance pilots' monitoring skills through online training. For this study, 40 military helicopter pilots (participants) were divided …


Analysis Of Airport Security Screening Checkpoints Using Queuing Networks And Discrete Event Simulation: A Theoretical And Empirical Approach, Stephen Louis Dorton Apr 2011

Analysis Of Airport Security Screening Checkpoints Using Queuing Networks And Discrete Event Simulation: A Theoretical And Empirical Approach, Stephen Louis Dorton

Doctoral Dissertations and Master's Theses

This study utilized discrete event simulation (DES) and queuing networks to investigate the effects of baggage volume and alarm rate at the Security Screening Checkpoint (SSCP) of a small origin and destination airport. A Jackson queuing network was considered for a theoretical assessment to SSCP performance. A DES model using Arena version 12 was utilized for an empirical approach. Data was collected from both literature and by manual collection methods. Manual data was collected during the peak operating time of 6am-7am local time at the airport being modeled. The simulation model was verified and validated qualitatively and quantitatively by statistical …


Preliminary Design Of An Asteroid Hopping Mission, Michael D. Scheppa Apr 2011

Preliminary Design Of An Asteroid Hopping Mission, Michael D. Scheppa

Doctoral Dissertations and Master's Theses

In 2010, NASA announced that its new vision is to support private space launch operations. It is anticipated that this new direction will create the need for new and innovative ideas that push the current boundaries of space exploration and contain the promise of substantial gain, both in research and capital.

The purpose of the study is to plan and estimate the feasibility of a mission to visit a number of near Earth asteroids (NEAs). The mission would take place before the end of the 21st century, and would only use commercially available technology. Throughout the mission design process, while …