Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- HF radar (4)
- HFSWR (3)
- Adaptive control (2)
- Artificial neural network (2)
- Chaos (2)
-
- Clustering (2)
- Computer forensics (2)
- Cyber crime (2)
- Digital forensics (2)
- Disk analysis (2)
- High Frequency Surface Wave Radar (2)
- Induction machine (2)
- Nonlinear systems (2)
- OTH radar (2)
- Particle swarm optimization (2)
- Privacy (2)
- RCS (2)
- Radar (2)
- State estimation (2)
- Tracking (2)
- AIA (1)
- ANFIS (1)
- APIHook (1)
- AR model (1)
- Accounting (1)
- Accuracy enhancement (1)
- Accuracy. (1)
- Active appearance (1)
- Actuator design (1)
- Adaptive neuro-fuzzy inference system (1)
Articles 1 - 30 of 95
Full-Text Articles in Computer Engineering
Identifying A Computer Forensics Expert: A Study To Measure The Characteristics Of Forensic Computer Examiners, Gregory H. Carlton, Reginald Worthley
Identifying A Computer Forensics Expert: A Study To Measure The Characteristics Of Forensic Computer Examiners, Gregory H. Carlton, Reginald Worthley
Journal of Digital Forensics, Security and Law
The usage of digital evidence from electronic devices has been rapidly expanding within litigation, and along with this increased usage, the reliance upon forensic computer examiners to acquire, analyze, and report upon this evidence is also rapidly growing. This growing demand for forensic computer examiners raises questions concerning the selection of individuals qualified to perform this work. While courts have mechanisms for qualifying witnesses that provide testimony based on scientific data, such as digital data, the qualifying criteria covers a wide variety of characteristics including, education, experience, training, professional certifications, or other special skills. In this study, we compare task …
Adaptation Of Pyflag To Efficient Analysis Of Seized Computer Data Storage, Aleksander Byrski, Wojciech Stryjewski, Bartłomiej Czechowicz
Adaptation Of Pyflag To Efficient Analysis Of Seized Computer Data Storage, Aleksander Byrski, Wojciech Stryjewski, Bartłomiej Czechowicz
Journal of Digital Forensics, Security and Law
Based on existing software aimed at investigation support in the analysis of computer data storage seized during investigation (PyFlag), an extension is proposed involving the introduction of dedicated components for data identification and filtering. Hash codes for popular software contained in NIST/NSRL database are considered in order to avoid unwanted files while searching and to classify them into several categories. The extension allows for further analysis, e.g. using artificial intelligence methods. The considerations are illustrated by the overview of the system's design.
Computer Forensic Functions Testing: Media Preparation, Write Protection And Verification, Yinghua Guo, Jill Slay
Computer Forensic Functions Testing: Media Preparation, Write Protection And Verification, Yinghua Guo, Jill Slay
Journal of Digital Forensics, Security and Law
The growth in the computer forensic field has created a demand for new software (or increased functionality to existing software) and a means to verify that this software is truly forensic i.e. capable of meeting the requirements of the trier of fact. In this work, we review our previous work---a function oriented testing framework for validation and verification of computer forensic tools. This framework consists of three parts: function mapping, requirements specification and reference set development. Through function mapping, we give a scientific and systemized description of the fundamentals of computer forensic discipline, i.e. what functions are needed in the …
Computer Forensics For Graduate Accountants: A Motivational Curriculum Design Approach, Grover S. Kearns
Computer Forensics For Graduate Accountants: A Motivational Curriculum Design Approach, Grover S. Kearns
Journal of Digital Forensics, Security and Law
Computer forensics involves the investigation of digital sources to acquire evidence that can be used in a court of law. It can also be used to identify and respond to threats to hosts and systems. Accountants use computer forensics to investigate computer crime or misuse, theft of trade secrets, theft of or destruction of intellectual property, and fraud. Education of accountants to use forensic tools is a goal of the AICPA (American Institute of Certified Public Accountants). Accounting students, however, may not view information technology as vital to their career paths and need motivation to acquire forensic knowledge and skills. …
Higate (High Grade Anti-Tamper Equipment) Prototype And Application To E-Discovery, Yui Sakurai, Yuki Ashino, Tetsutaro Uehara, Hiroshi Yoshiura, Ryoichi Sasaki
Higate (High Grade Anti-Tamper Equipment) Prototype And Application To E-Discovery, Yui Sakurai, Yuki Ashino, Tetsutaro Uehara, Hiroshi Yoshiura, Ryoichi Sasaki
Journal of Digital Forensics, Security and Law
These days, most data is digitized and processed in various ways by computers. In the past, computer owners were free to process data as desired and to observe the inputted data as well as the interim results. However, the unrestricted processing of data and accessing of interim results even by computer users is associated with an increasing number of adverse events. These adverse events often occur when sensitive data such as personal or confidential business information must be handled by two or more parties, such as in the case of e-Discovery, used in legal proceedings, or epidemiologic studies. To solve …
Developing Voip Honeypots: A Preliminary Investigation Into Malfeasant Activity, Craig Valli
Developing Voip Honeypots: A Preliminary Investigation Into Malfeasant Activity, Craig Valli
Journal of Digital Forensics, Security and Law
30 years ago PABX systems were compromised by hackers wanting to make long distance calls at some other entities expense. This activity faded as telephony became cheaper and PABX systems had countermeasures installed to overcome attacks. Now the world has moved onto the provision of telephony via broadband enabled Voice over Internet Protocol (VoIP) with this service now being provided as a replacement for conventional fixed wire telephony by major telecommunication providers worldwide. Due to increasing bandwidth it is possible for systems to support multiple voice connections simultaneously. The networked nature of the Internet allows for attackers of these VoIP …
Digital Records Forensics: A New Science And Academic Program For Forensic Readiness, Luciana Duranti, Barbara Endicott-Popovsky
Digital Records Forensics: A New Science And Academic Program For Forensic Readiness, Luciana Duranti, Barbara Endicott-Popovsky
Journal of Digital Forensics, Security and Law
This paper introduces the Digital Records Forensics project, a research endeavour located at the University of British Columbia in Canada and aimed at the development of a new science resulting from the integration of digital forensics with diplomatics, archival science, information science and the law of evidence, and of an interdisciplinary graduate degree program, called Digital Records Forensics Studies, directed to professionals working for law enforcement agencies, legal firms, courts, and all kind of institutions and business that require their services. The program anticipates the need for organizations to become “forensically ready,” defined by John Tan as “maximizing the ability …
Book Review: Digital Forensic Evidence Examination (2nd Ed.), Gary C. Kessler
Book Review: Digital Forensic Evidence Examination (2nd Ed.), Gary C. Kessler
Journal of Digital Forensics, Security and Law
On the day that I sat down to start to write this review, the following e-mail came across on one of my lists: Person A and Person B write back and forth and create an email thread. Person A then forwards the email to Person C, but changes some wording in the email exchange between A & B. What is the easiest way (and is it even possible) to find out when that earlier email message was altered before sent to Person C? Before you try to answer these questions, read Fred Cohen's Digital Forensic Evidence Examination. His book won't …
Reeling In Big Phish With A Deep Md5 Net, Brad Wardman, Gary Warner, Heather Mccalley, Sarah Turner, Anthony Skjellum
Reeling In Big Phish With A Deep Md5 Net, Brad Wardman, Gary Warner, Heather Mccalley, Sarah Turner, Anthony Skjellum
Journal of Digital Forensics, Security and Law
Phishing continues to grow as phishers discover new exploits and attack vectors for hosting malicious content; the traditional response using takedowns and blacklists does not appear to impede phishers significantly. A handful of law enforcement projects — for example the FBI's Digital PhishNet and the Internet Crime and Complaint Center (ic3.gov) — have demonstrated that they can collect phishing data in substantial volumes, but these collections have not yet resulted in a significant decline in criminal phishing activity. In this paper, a new system is demonstrated for prioritizing investigative resources to help reduce the time and effort expended examining this …
Solid State Drives: The Beginning Of The End For Current Practice In Digital Forensic Recovery?, Graeme B. Bell, Richard Boddington
Solid State Drives: The Beginning Of The End For Current Practice In Digital Forensic Recovery?, Graeme B. Bell, Richard Boddington
Journal of Digital Forensics, Security and Law
Digital evidence is increasingly relied upon in computer forensic examinations and legal proceedings in the modern courtroom. The primary storage technology used for digital information has remained constant over the last two decades, in the form of the magnetic disc. Consequently, investigative, forensic, and judicial procedures are well-established for magnetic disc storage devices (Carrier, 2005). However, a paradigm shift has taken place in technology storage and complex, transistor-based devices for primary storage are now increasingly common. Most people are aware of the transition from portable magnetic floppy discs to portable USB transistor flash devices, yet the transition from magnetic hard …
Trust Account Fraud And Effective Information Security Management, Sameera Mubarak
Trust Account Fraud And Effective Information Security Management, Sameera Mubarak
Journal of Digital Forensics, Security and Law
The integrity of lawyers’ trust accounts has come under scrutiny in the last few years. There are strong possibilities of information technology security breaches happening within the firms, either accidental or deliberate. The damage caused by these security breaches could be extreme. For example, a trust account fund in an Australian law firm was misused in a security breach in which Telstra charged A$50,000 for phone usage, mainly for ISD calls to Hong Kong. Our study involved interviewing principals of ten law companies to find out solicitors’ attitudes to computer security and the possibility of breaches of their trust accounts. …
Malware Forensics: Discovery Of The Intent Of Deception, Murray Brand, Craig Valli, Andrew Woodward
Malware Forensics: Discovery Of The Intent Of Deception, Murray Brand, Craig Valli, Andrew Woodward
Journal of Digital Forensics, Security and Law
Malicious software (malware) has a wide variety of analysis avoidance techniques that it can employ to hinder forensic analysis. Although legitimate software can incorporate the same analysis avoidance techniques to provide a measure of protection against reverse engineering and to protect intellectual property, malware invariably makes much greater use of such techniques to make detailed analysis labour intensive and very time consuming. Analysis avoidance techniques are so heavily used by malware that the detection of the use of analysis avoidance techniques could be a very good indicator of the presence of malicious intent. However, there is a tendency for analysis …
The 2009 Analysis Of Information Remaining On Disks Offered For Sale On The Second Hand Market, Andy Jones, Craig Valli, Glenn S. Dardick, Iain Sutherland, G. Dabibi, Gareth Davies
The 2009 Analysis Of Information Remaining On Disks Offered For Sale On The Second Hand Market, Andy Jones, Craig Valli, Glenn S. Dardick, Iain Sutherland, G. Dabibi, Gareth Davies
Journal of Digital Forensics, Security and Law
The ever increasing use and reliance upon computers in both the public and private sector has led to enormous numbers of computers being disposed of at the end of their useful life within an organisation. As the cost of computers has dropped, their use in the home has also continued to increase. In most organisations, computers have a relatively short life and are replaced on a regular basis with the result that, if not properly cleansed of data, they are released into the public domain containing data that can be relatively up to date. This problem is exacerbated by the …
Avoiding Sanctions At The E-Discovery Meet-And-Confer In Common Law Countries, Milton Luoma, Vicki Luoma
Avoiding Sanctions At The E-Discovery Meet-And-Confer In Common Law Countries, Milton Luoma, Vicki Luoma
Journal of Digital Forensics, Security and Law
The rules of civil procedure in common law countries have been amended to better deal with the requirements of electronic discovery. One of the key changes in case management is the scheduling of a meet-and-confer session where the parties to litigation must meet early in the case before any discovery procedures have begun to exchange information regarding the nature, location, formats, and pertinent facts regarding custody and control of a party’s electronically stored information (ESI). Failure to abide by the rules and participate in good faith at the meet-and-confer session can have dire consequences for the parties and lawyers involved. …
Table Of Contents
Journal of Digital Forensics, Security and Law
No abstract provided.
Table Of Contents
Journal of Digital Forensics, Security and Law
No abstract provided.
Remote Sensing Applications Of Hf Skywave Radar: The Australian Experience, Stuart Anderson
Remote Sensing Applications Of Hf Skywave Radar: The Australian Experience, Stuart Anderson
Turkish Journal of Electrical Engineering and Computer Sciences
Australia has conducted research into over-the-horizon radar (OTHR) for almost sixty years. Early programs focused exclusively on military capabilities, such as the detection of aircraft, missiles and ships, but in 1974 a team was formed to design a new OTHR for which a remote sensing mission was proposed. Oceanic wind mapping experiments in 1977-78 yielded promising results so remote sensing became a recognised mission assigned to the new radar, known as Jindalee Stage B. This capability was progressively expanded over the period 1982-87 to include mapping of wave height and other oceanographic variables. A real-time data link to the Australian …
Determination Of Autoregressive Model Orders For Seizure Detection, Serap Aydin
Determination Of Autoregressive Model Orders For Seizure Detection, Serap Aydin
Turkish Journal of Electrical Engineering and Computer Sciences
In the present study, a step-wise least square estimation algorithm (SLSA), implemented in a Matlab package called as ARfit, has been newly applied to clinical data for estimation of the accurate Auto-Regressive (AR) model orders of both normal and ictal EEG series where the power spectral density (PSD) estimations are provided by the Burg Method. The ARfit module is found to be usefull in comparison to a large variety of traditional methods such as Forward Prediction Error (FPE), Akaike's Information Criteria (AIC), Minimum Description Lenght (MDL), and Criterion of Autoregressive Transfer function (CAT) for EEG discrimination. According to tests, the …
Effect Of Transformer On Stochastic Estimation Of Voltage Sag Due To Faults In The Power System: A Pscad/Emtdc Simulation, Nita R. Patne, K. L. Thakre
Effect Of Transformer On Stochastic Estimation Of Voltage Sag Due To Faults In The Power System: A Pscad/Emtdc Simulation, Nita R. Patne, K. L. Thakre
Turkish Journal of Electrical Engineering and Computer Sciences
Voltage sags in the electric power system are mostly due to faults in the power system. Voltage sag is characterized by its magnitude (the retained voltage), phase-angle jump, unbalance in the sag in the three phases, and duration. Type of transformers in the electrical system is the important parameter influencing the characteristic of sag at the node where sensitive loads are connected. For sensitive loads it is necessary to estimate how many times in a year the voltage at their terminal will experience sag to avoid tripping of operation. In this paper the effect of transformer on stochastic estimation of …
Improved Analytical Modulation Transfer Function For Image Intensified Charge Coupled Devices*, Nebi̇ Gül, Murat Efe
Improved Analytical Modulation Transfer Function For Image Intensified Charge Coupled Devices*, Nebi̇ Gül, Murat Efe
Turkish Journal of Electrical Engineering and Computer Sciences
The basic problem of simulation and modeling of Image Intensified Charge Coupled Device (ICCD) is the difference between the analytical Modulation Transfer Function (MTF) formulation used in the model and the experimentally obtained MTF. An investigation into the MTF of ICCD sub-components reveal that the MTF of the Image Intensifier Tube (IIT) is the main factor in this deviation. In this study, a regulation factor for the MTF of 3^{rd} generation IITs has been developed. A commonly used MTF formulation for IITs has been modified to include a regulation factor which has helped produce more precise MTF values for the …
P2p Collaborative Filtering With Privacy, Ci̇han Kaleli̇, Hüseyi̇n Polat
P2p Collaborative Filtering With Privacy, Ci̇han Kaleli̇, Hüseyi̇n Polat
Turkish Journal of Electrical Engineering and Computer Sciences
With the evolution of the Internet and e-commerce, collaborative filtering (CF) and privacy-preserving collaborative filtering (PPCF) have become popular. The goal in CF is to generate predictions with decent accuracy, efficiently. The main issue in PPCF, however, is achieving such a goal while preserving users' privacy. Many implementations of CF and PPCF techniques proposed so far are centralized. In centralized systems, data is collected and stored by a central server for CF purposes. Centralized storage poses several hazards to users because the central server controls users' data. In this work, we investigate how to produce naïve Bayesian classifier (NBC)-based recommendations …
Comparison Of Daubechies Wavelets For Hurst Parameter Estimation, Cebrai̇l Çi̇ftli̇kli̇, Ali̇ Gezer
Comparison Of Daubechies Wavelets For Hurst Parameter Estimation, Cebrai̇l Çi̇ftli̇kli̇, Ali̇ Gezer
Turkish Journal of Electrical Engineering and Computer Sciences
Time scale dependence on the working nature of wavelet analysis makes it a valuable tool for Hurst parameter estimation. Similar to other wavelet-based signal processing applications, the selection of a particular wavelet type and vanishing moment in wavelet based Hurst estimation is a challenging problem. In this paper, we investigate the best Daubechies wavelet in wavelet based Hurst estimation for an exact self similar process, fractional Gaussian noise and how Daubechies vanishing moment affects the Hurst estimation accuracy. Daubechies wavelets are preferred in analysis because increasing vanishing moment does not cause excessive increase of time support of Daubechies wavelets. Thus, …
Stochastic Stability Of The Discrete-Time Constrained Extended Kalman Filter, Levent Özbek, Esi̇n Köksal Babacan, Murat Efe
Stochastic Stability Of The Discrete-Time Constrained Extended Kalman Filter, Levent Özbek, Esi̇n Köksal Babacan, Murat Efe
Turkish Journal of Electrical Engineering and Computer Sciences
In this paper, stability of the projection-based constrained discrete-time extended Kalman filter (EKF) as applied to nonlinear systems in a stochastic framework has been studied. It has been shown that like the unconstrained EKF, the estimation error of the EKF with known constraints on the states remains bounded when the initial error and noise terms are small, and the solution of the Riccati difference equation remains positive definite and bounded. Stability results are verified and performance of the constrained EKF is demonstrated through simulations on a nonlinear engineering example.
K-Anonymity Based Framework For Privacy Preserving Data Collection In Wireless Sensor Networks, Hayretdi̇n Bahşi̇, Albert Levi̇
K-Anonymity Based Framework For Privacy Preserving Data Collection In Wireless Sensor Networks, Hayretdi̇n Bahşi̇, Albert Levi̇
Turkish Journal of Electrical Engineering and Computer Sciences
In this paper, k-anonymity notion is adopted to be used in wireless sensor networks (WSN) as a security framework with two levels of privacy. A base level of privacy is provided for the data shared with semi-trusted sink and a deeper level of privacy is provided against eavesdroppers. In the proposed method, some portions of data are encrypted and the rest is generalized. Generalization shortens the size of the data transmitted in the network causing energy saving at the cost of information loss. On the other hand, encryption provides anonymization with no information loss and without saving energy. Thus, there …
A Power Quality Monitoring System Based On Matlab Server Pages, Bülent Vural, Ali̇ Kizil, Mehmet Uzunoğlu
A Power Quality Monitoring System Based On Matlab Server Pages, Bülent Vural, Ali̇ Kizil, Mehmet Uzunoğlu
Turkish Journal of Electrical Engineering and Computer Sciences
The power quality (PQ) requirement is one of the most important issues for power companies and their customers. Continuously monitoring the PQ from remote and distributed centers will help to improve the PQ. In this study, a remote power quality monitoring system for low voltage sub-networks is developed using MATLAB Server Pages (MSP). MATLAB Server Pages, which is an open source technical web programming language, combines MATLAB with integrated J2EE specifications. The proposed PQ monitoring system uses the MATLAB HTML tag library and the data captured by the DAQ hardware to evaluate the Power Quality parameters. The proposed system can …
Nonlinear Dynamic Analysis Of Mitral Valve Doppler Signals: Surrogate Data Analysis, Esma Uzunhi̇sarcikli
Nonlinear Dynamic Analysis Of Mitral Valve Doppler Signals: Surrogate Data Analysis, Esma Uzunhi̇sarcikli
Turkish Journal of Electrical Engineering and Computer Sciences
In our study, the nonlinear dynamics of mitral valve Doppler signals from 32 healthy and 28 patients with mitral valve stenosis was evaluated using by the computation of Lyapunov exponents, correlation dimension values and surrogate data analysis. Two chaotic features are compared for healthy and patient subjects. It was found that the largest Lyapunov exponent and correlation dimension values derived from patient subjects were larger than that of healthy subjects (\rho < 0.005). Surrogate data analysis was performed to determine the chaotic dynamics of Doppler signals. It was observed that the original and surrogate data have similar spectral features. Receiver operating characteristic (ROC) curves were used to evaluate the nonlinearity character Area Under the curve (AUC) values were obtained as 0.99 and 0.978 for the largest Lyapunov exponent and correlation dimension values, respectively. According to these results, Doppler signals have a nonlinear dynamic property and the largest Lyapunov exponent. Correlation dimension features can be used to detect the change in blood flow velocity of patients with mitral valve stenosis.
Dual-Use Of Compact Hf Radars For The Detection Of Mid- And Large-Size Vessels, Hugh Roarty, Don Barrick, Josh Kohut, Scott Glenn
Dual-Use Of Compact Hf Radars For The Detection Of Mid- And Large-Size Vessels, Hugh Roarty, Don Barrick, Josh Kohut, Scott Glenn
Turkish Journal of Electrical Engineering and Computer Sciences
This paper describes the development of the SeaSonde High Frequency Radar system into a dual-use application for the mapping of ocean surface currents and detection of ships at sea. This development entailed the creation of a new radar waveform that would permit this dual-use as well as a detection algorithm to identify the ships in the radar spectra. The detection algorithm utilizes two methods for calculating a background signal level: an infinite impulse response (IIR) filter and a two-dimensional median filter. These two methods are employed simultaneously with multiple length averaging times to maximize the number of detections. The initial …
Modeling And Simulation Strategies In High Frequency Surface Wave Radars, Levent Sevgi̇
Modeling And Simulation Strategies In High Frequency Surface Wave Radars, Levent Sevgi̇
Turkish Journal of Electrical Engineering and Computer Sciences
Surface Wave High Frequency Radars (SWHFR) are taken into account in the content of modeling and simulation challenges. Examples related to multi-mixed path surface wave propagation, radar cross section (RCS) prediction, and total radar echo showing target, clutter, noise, and interference are presented.
A Review Of High Frequency Surface Wave Radar For Detection And Tracking Of Ships, Tony Ponsford, Jian Wang
A Review Of High Frequency Surface Wave Radar For Detection And Tracking Of Ships, Tony Ponsford, Jian Wang
Turkish Journal of Electrical Engineering and Computer Sciences
In today's resource-driven economy, maritime nations are claiming economic borders that extend beyond the continental shelf or the 200 nautical mile (nm) Exclusive Economic Zone (EEZ). However, claiming such large economic area places responsibilities on the parent nation to exercise jurisdiction through surveillance and enforcement. The requirement to see beyond the horizon has long been a goal of maritime security forces. Today, this is largely dependent on cooperative vessels voluntarily communicating their intentions to local shore-side authorities, as well as on those vessel sightings reported by patrollers. Recent advances in technology provide maritime nations with options to provide more systematic …
Implementation Of Method For Operating Multiple High Frequency Surface Wave Radars On A Common Carrier Frequency, Ryan Riddolls
Implementation Of Method For Operating Multiple High Frequency Surface Wave Radars On A Common Carrier Frequency, Ryan Riddolls
Turkish Journal of Electrical Engineering and Computer Sciences
The increasing use of High Frequency Surface Wave Radar (HFSWR) for the surveillance of coastal regions is faced with the problem of limited channel availability in the electromagnetic spectrum. Thus, there is a need for multiple radars to share a common frequency channel. Proof-of-concept work is presented here for a method to operate multiple radar systems on a common carrier frequency. A review is provided of an existing concept where a common waveform is modulated by tones varying by a few hertz across the different radars. The signals from the different radars are separated by either pulse-domain filtering or Doppler …