Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 95

Full-Text Articles in Computer Engineering

Identifying A Computer Forensics Expert: A Study To Measure The Characteristics Of Forensic Computer Examiners, Gregory H. Carlton, Reginald Worthley Jan 2010

Identifying A Computer Forensics Expert: A Study To Measure The Characteristics Of Forensic Computer Examiners, Gregory H. Carlton, Reginald Worthley

Journal of Digital Forensics, Security and Law

The usage of digital evidence from electronic devices has been rapidly expanding within litigation, and along with this increased usage, the reliance upon forensic computer examiners to acquire, analyze, and report upon this evidence is also rapidly growing. This growing demand for forensic computer examiners raises questions concerning the selection of individuals qualified to perform this work. While courts have mechanisms for qualifying witnesses that provide testimony based on scientific data, such as digital data, the qualifying criteria covers a wide variety of characteristics including, education, experience, training, professional certifications, or other special skills. In this study, we compare task …


Adaptation Of Pyflag To Efficient Analysis Of Seized Computer Data Storage, Aleksander Byrski, Wojciech Stryjewski, Bartłomiej Czechowicz Jan 2010

Adaptation Of Pyflag To Efficient Analysis Of Seized Computer Data Storage, Aleksander Byrski, Wojciech Stryjewski, Bartłomiej Czechowicz

Journal of Digital Forensics, Security and Law

Based on existing software aimed at investigation support in the analysis of computer data storage seized during investigation (PyFlag), an extension is proposed involving the introduction of dedicated components for data identification and filtering. Hash codes for popular software contained in NIST/NSRL database are considered in order to avoid unwanted files while searching and to classify them into several categories. The extension allows for further analysis, e.g. using artificial intelligence methods. The considerations are illustrated by the overview of the system's design.


Computer Forensic Functions Testing: Media Preparation, Write Protection And Verification, Yinghua Guo, Jill Slay Jan 2010

Computer Forensic Functions Testing: Media Preparation, Write Protection And Verification, Yinghua Guo, Jill Slay

Journal of Digital Forensics, Security and Law

The growth in the computer forensic field has created a demand for new software (or increased functionality to existing software) and a means to verify that this software is truly forensic i.e. capable of meeting the requirements of the trier of fact. In this work, we review our previous work---a function oriented testing framework for validation and verification of computer forensic tools. This framework consists of three parts: function mapping, requirements specification and reference set development. Through function mapping, we give a scientific and systemized description of the fundamentals of computer forensic discipline, i.e. what functions are needed in the …


Computer Forensics For Graduate Accountants: A Motivational Curriculum Design Approach, Grover S. Kearns Jan 2010

Computer Forensics For Graduate Accountants: A Motivational Curriculum Design Approach, Grover S. Kearns

Journal of Digital Forensics, Security and Law

Computer forensics involves the investigation of digital sources to acquire evidence that can be used in a court of law. It can also be used to identify and respond to threats to hosts and systems. Accountants use computer forensics to investigate computer crime or misuse, theft of trade secrets, theft of or destruction of intellectual property, and fraud. Education of accountants to use forensic tools is a goal of the AICPA (American Institute of Certified Public Accountants). Accounting students, however, may not view information technology as vital to their career paths and need motivation to acquire forensic knowledge and skills. …


Higate (High Grade Anti-Tamper Equipment) Prototype And Application To E-Discovery, Yui Sakurai, Yuki Ashino, Tetsutaro Uehara, Hiroshi Yoshiura, Ryoichi Sasaki Jan 2010

Higate (High Grade Anti-Tamper Equipment) Prototype And Application To E-Discovery, Yui Sakurai, Yuki Ashino, Tetsutaro Uehara, Hiroshi Yoshiura, Ryoichi Sasaki

Journal of Digital Forensics, Security and Law

These days, most data is digitized and processed in various ways by computers. In the past, computer owners were free to process data as desired and to observe the inputted data as well as the interim results. However, the unrestricted processing of data and accessing of interim results even by computer users is associated with an increasing number of adverse events. These adverse events often occur when sensitive data such as personal or confidential business information must be handled by two or more parties, such as in the case of e-Discovery, used in legal proceedings, or epidemiologic studies. To solve …


Developing Voip Honeypots: A Preliminary Investigation Into Malfeasant Activity, Craig Valli Jan 2010

Developing Voip Honeypots: A Preliminary Investigation Into Malfeasant Activity, Craig Valli

Journal of Digital Forensics, Security and Law

30 years ago PABX systems were compromised by hackers wanting to make long distance calls at some other entities expense. This activity faded as telephony became cheaper and PABX systems had countermeasures installed to overcome attacks. Now the world has moved onto the provision of telephony via broadband enabled Voice over Internet Protocol (VoIP) with this service now being provided as a replacement for conventional fixed wire telephony by major telecommunication providers worldwide. Due to increasing bandwidth it is possible for systems to support multiple voice connections simultaneously. The networked nature of the Internet allows for attackers of these VoIP …


Digital Records Forensics: A New Science And Academic Program For Forensic Readiness, Luciana Duranti, Barbara Endicott-Popovsky Jan 2010

Digital Records Forensics: A New Science And Academic Program For Forensic Readiness, Luciana Duranti, Barbara Endicott-Popovsky

Journal of Digital Forensics, Security and Law

This paper introduces the Digital Records Forensics project, a research endeavour located at the University of British Columbia in Canada and aimed at the development of a new science resulting from the integration of digital forensics with diplomatics, archival science, information science and the law of evidence, and of an interdisciplinary graduate degree program, called Digital Records Forensics Studies, directed to professionals working for law enforcement agencies, legal firms, courts, and all kind of institutions and business that require their services. The program anticipates the need for organizations to become “forensically ready,” defined by John Tan as “maximizing the ability …


Book Review: Digital Forensic Evidence Examination (2nd Ed.), Gary C. Kessler Jan 2010

Book Review: Digital Forensic Evidence Examination (2nd Ed.), Gary C. Kessler

Journal of Digital Forensics, Security and Law

On the day that I sat down to start to write this review, the following e-mail came across on one of my lists: Person A and Person B write back and forth and create an email thread. Person A then forwards the email to Person C, but changes some wording in the email exchange between A & B. What is the easiest way (and is it even possible) to find out when that earlier email message was altered before sent to Person C? Before you try to answer these questions, read Fred Cohen's Digital Forensic Evidence Examination. His book won't …


Reeling In Big Phish With A Deep Md5 Net, Brad Wardman, Gary Warner, Heather Mccalley, Sarah Turner, Anthony Skjellum Jan 2010

Reeling In Big Phish With A Deep Md5 Net, Brad Wardman, Gary Warner, Heather Mccalley, Sarah Turner, Anthony Skjellum

Journal of Digital Forensics, Security and Law

Phishing continues to grow as phishers discover new exploits and attack vectors for hosting malicious content; the traditional response using takedowns and blacklists does not appear to impede phishers significantly. A handful of law enforcement projects — for example the FBI's Digital PhishNet and the Internet Crime and Complaint Center (ic3.gov) — have demonstrated that they can collect phishing data in substantial volumes, but these collections have not yet resulted in a significant decline in criminal phishing activity. In this paper, a new system is demonstrated for prioritizing investigative resources to help reduce the time and effort expended examining this …


Solid State Drives: The Beginning Of The End For Current Practice In Digital Forensic Recovery?, Graeme B. Bell, Richard Boddington Jan 2010

Solid State Drives: The Beginning Of The End For Current Practice In Digital Forensic Recovery?, Graeme B. Bell, Richard Boddington

Journal of Digital Forensics, Security and Law

Digital evidence is increasingly relied upon in computer forensic examinations and legal proceedings in the modern courtroom. The primary storage technology used for digital information has remained constant over the last two decades, in the form of the magnetic disc. Consequently, investigative, forensic, and judicial procedures are well-established for magnetic disc storage devices (Carrier, 2005). However, a paradigm shift has taken place in technology storage and complex, transistor-based devices for primary storage are now increasingly common. Most people are aware of the transition from portable magnetic floppy discs to portable USB transistor flash devices, yet the transition from magnetic hard …


Trust Account Fraud And Effective Information Security Management, Sameera Mubarak Jan 2010

Trust Account Fraud And Effective Information Security Management, Sameera Mubarak

Journal of Digital Forensics, Security and Law

The integrity of lawyers’ trust accounts has come under scrutiny in the last few years. There are strong possibilities of information technology security breaches happening within the firms, either accidental or deliberate. The damage caused by these security breaches could be extreme. For example, a trust account fund in an Australian law firm was misused in a security breach in which Telstra charged A$50,000 for phone usage, mainly for ISD calls to Hong Kong. Our study involved interviewing principals of ten law companies to find out solicitors’ attitudes to computer security and the possibility of breaches of their trust accounts. …


Malware Forensics: Discovery Of The Intent Of Deception, Murray Brand, Craig Valli, Andrew Woodward Jan 2010

Malware Forensics: Discovery Of The Intent Of Deception, Murray Brand, Craig Valli, Andrew Woodward

Journal of Digital Forensics, Security and Law

Malicious software (malware) has a wide variety of analysis avoidance techniques that it can employ to hinder forensic analysis. Although legitimate software can incorporate the same analysis avoidance techniques to provide a measure of protection against reverse engineering and to protect intellectual property, malware invariably makes much greater use of such techniques to make detailed analysis labour intensive and very time consuming. Analysis avoidance techniques are so heavily used by malware that the detection of the use of analysis avoidance techniques could be a very good indicator of the presence of malicious intent. However, there is a tendency for analysis …


The 2009 Analysis Of Information Remaining On Disks Offered For Sale On The Second Hand Market, Andy Jones, Craig Valli, Glenn S. Dardick, Iain Sutherland, G. Dabibi, Gareth Davies Jan 2010

The 2009 Analysis Of Information Remaining On Disks Offered For Sale On The Second Hand Market, Andy Jones, Craig Valli, Glenn S. Dardick, Iain Sutherland, G. Dabibi, Gareth Davies

Journal of Digital Forensics, Security and Law

The ever increasing use and reliance upon computers in both the public and private sector has led to enormous numbers of computers being disposed of at the end of their useful life within an organisation. As the cost of computers has dropped, their use in the home has also continued to increase. In most organisations, computers have a relatively short life and are replaced on a regular basis with the result that, if not properly cleansed of data, they are released into the public domain containing data that can be relatively up to date. This problem is exacerbated by the …


Avoiding Sanctions At The E-Discovery Meet-And-Confer In Common Law Countries, Milton Luoma, Vicki Luoma Jan 2010

Avoiding Sanctions At The E-Discovery Meet-And-Confer In Common Law Countries, Milton Luoma, Vicki Luoma

Journal of Digital Forensics, Security and Law

The rules of civil procedure in common law countries have been amended to better deal with the requirements of electronic discovery. One of the key changes in case management is the scheduling of a meet-and-confer session where the parties to litigation must meet early in the case before any discovery procedures have begun to exchange information regarding the nature, location, formats, and pertinent facts regarding custody and control of a party’s electronically stored information (ESI). Failure to abide by the rules and participate in good faith at the meet-and-confer session can have dire consequences for the parties and lawyers involved. …


Table Of Contents Jan 2010

Table Of Contents

Journal of Digital Forensics, Security and Law

No abstract provided.


Table Of Contents Jan 2010

Table Of Contents

Journal of Digital Forensics, Security and Law

No abstract provided.


Remote Sensing Applications Of Hf Skywave Radar: The Australian Experience, Stuart Anderson Jan 2010

Remote Sensing Applications Of Hf Skywave Radar: The Australian Experience, Stuart Anderson

Turkish Journal of Electrical Engineering and Computer Sciences

Australia has conducted research into over-the-horizon radar (OTHR) for almost sixty years. Early programs focused exclusively on military capabilities, such as the detection of aircraft, missiles and ships, but in 1974 a team was formed to design a new OTHR for which a remote sensing mission was proposed. Oceanic wind mapping experiments in 1977-78 yielded promising results so remote sensing became a recognised mission assigned to the new radar, known as Jindalee Stage B. This capability was progressively expanded over the period 1982-87 to include mapping of wave height and other oceanographic variables. A real-time data link to the Australian …


Determination Of Autoregressive Model Orders For Seizure Detection, Serap Aydin Jan 2010

Determination Of Autoregressive Model Orders For Seizure Detection, Serap Aydin

Turkish Journal of Electrical Engineering and Computer Sciences

In the present study, a step-wise least square estimation algorithm (SLSA), implemented in a Matlab package called as ARfit, has been newly applied to clinical data for estimation of the accurate Auto-Regressive (AR) model orders of both normal and ictal EEG series where the power spectral density (PSD) estimations are provided by the Burg Method. The ARfit module is found to be usefull in comparison to a large variety of traditional methods such as Forward Prediction Error (FPE), Akaike's Information Criteria (AIC), Minimum Description Lenght (MDL), and Criterion of Autoregressive Transfer function (CAT) for EEG discrimination. According to tests, the …


Effect Of Transformer On Stochastic Estimation Of Voltage Sag Due To Faults In The Power System: A Pscad/Emtdc Simulation, Nita R. Patne, K. L. Thakre Jan 2010

Effect Of Transformer On Stochastic Estimation Of Voltage Sag Due To Faults In The Power System: A Pscad/Emtdc Simulation, Nita R. Patne, K. L. Thakre

Turkish Journal of Electrical Engineering and Computer Sciences

Voltage sags in the electric power system are mostly due to faults in the power system. Voltage sag is characterized by its magnitude (the retained voltage), phase-angle jump, unbalance in the sag in the three phases, and duration. Type of transformers in the electrical system is the important parameter influencing the characteristic of sag at the node where sensitive loads are connected. For sensitive loads it is necessary to estimate how many times in a year the voltage at their terminal will experience sag to avoid tripping of operation. In this paper the effect of transformer on stochastic estimation of …


Improved Analytical Modulation Transfer Function For Image Intensified Charge Coupled Devices*, Nebi̇ Gül, Murat Efe Jan 2010

Improved Analytical Modulation Transfer Function For Image Intensified Charge Coupled Devices*, Nebi̇ Gül, Murat Efe

Turkish Journal of Electrical Engineering and Computer Sciences

The basic problem of simulation and modeling of Image Intensified Charge Coupled Device (ICCD) is the difference between the analytical Modulation Transfer Function (MTF) formulation used in the model and the experimentally obtained MTF. An investigation into the MTF of ICCD sub-components reveal that the MTF of the Image Intensifier Tube (IIT) is the main factor in this deviation. In this study, a regulation factor for the MTF of 3^{rd} generation IITs has been developed. A commonly used MTF formulation for IITs has been modified to include a regulation factor which has helped produce more precise MTF values for the …


P2p Collaborative Filtering With Privacy, Ci̇han Kaleli̇, Hüseyi̇n Polat Jan 2010

P2p Collaborative Filtering With Privacy, Ci̇han Kaleli̇, Hüseyi̇n Polat

Turkish Journal of Electrical Engineering and Computer Sciences

With the evolution of the Internet and e-commerce, collaborative filtering (CF) and privacy-preserving collaborative filtering (PPCF) have become popular. The goal in CF is to generate predictions with decent accuracy, efficiently. The main issue in PPCF, however, is achieving such a goal while preserving users' privacy. Many implementations of CF and PPCF techniques proposed so far are centralized. In centralized systems, data is collected and stored by a central server for CF purposes. Centralized storage poses several hazards to users because the central server controls users' data. In this work, we investigate how to produce naïve Bayesian classifier (NBC)-based recommendations …


Comparison Of Daubechies Wavelets For Hurst Parameter Estimation, Cebrai̇l Çi̇ftli̇kli̇, Ali̇ Gezer Jan 2010

Comparison Of Daubechies Wavelets For Hurst Parameter Estimation, Cebrai̇l Çi̇ftli̇kli̇, Ali̇ Gezer

Turkish Journal of Electrical Engineering and Computer Sciences

Time scale dependence on the working nature of wavelet analysis makes it a valuable tool for Hurst parameter estimation. Similar to other wavelet-based signal processing applications, the selection of a particular wavelet type and vanishing moment in wavelet based Hurst estimation is a challenging problem. In this paper, we investigate the best Daubechies wavelet in wavelet based Hurst estimation for an exact self similar process, fractional Gaussian noise and how Daubechies vanishing moment affects the Hurst estimation accuracy. Daubechies wavelets are preferred in analysis because increasing vanishing moment does not cause excessive increase of time support of Daubechies wavelets. Thus, …


Stochastic Stability Of The Discrete-Time Constrained Extended Kalman Filter, Levent Özbek, Esi̇n Köksal Babacan, Murat Efe Jan 2010

Stochastic Stability Of The Discrete-Time Constrained Extended Kalman Filter, Levent Özbek, Esi̇n Köksal Babacan, Murat Efe

Turkish Journal of Electrical Engineering and Computer Sciences

In this paper, stability of the projection-based constrained discrete-time extended Kalman filter (EKF) as applied to nonlinear systems in a stochastic framework has been studied. It has been shown that like the unconstrained EKF, the estimation error of the EKF with known constraints on the states remains bounded when the initial error and noise terms are small, and the solution of the Riccati difference equation remains positive definite and bounded. Stability results are verified and performance of the constrained EKF is demonstrated through simulations on a nonlinear engineering example.


K-Anonymity Based Framework For Privacy Preserving Data Collection In Wireless Sensor Networks, Hayretdi̇n Bahşi̇, Albert Levi̇ Jan 2010

K-Anonymity Based Framework For Privacy Preserving Data Collection In Wireless Sensor Networks, Hayretdi̇n Bahşi̇, Albert Levi̇

Turkish Journal of Electrical Engineering and Computer Sciences

In this paper, k-anonymity notion is adopted to be used in wireless sensor networks (WSN) as a security framework with two levels of privacy. A base level of privacy is provided for the data shared with semi-trusted sink and a deeper level of privacy is provided against eavesdroppers. In the proposed method, some portions of data are encrypted and the rest is generalized. Generalization shortens the size of the data transmitted in the network causing energy saving at the cost of information loss. On the other hand, encryption provides anonymization with no information loss and without saving energy. Thus, there …


A Power Quality Monitoring System Based On Matlab Server Pages, Bülent Vural, Ali̇ Kizil, Mehmet Uzunoğlu Jan 2010

A Power Quality Monitoring System Based On Matlab Server Pages, Bülent Vural, Ali̇ Kizil, Mehmet Uzunoğlu

Turkish Journal of Electrical Engineering and Computer Sciences

The power quality (PQ) requirement is one of the most important issues for power companies and their customers. Continuously monitoring the PQ from remote and distributed centers will help to improve the PQ. In this study, a remote power quality monitoring system for low voltage sub-networks is developed using MATLAB Server Pages (MSP). MATLAB Server Pages, which is an open source technical web programming language, combines MATLAB with integrated J2EE specifications. The proposed PQ monitoring system uses the MATLAB HTML tag library and the data captured by the DAQ hardware to evaluate the Power Quality parameters. The proposed system can …


Nonlinear Dynamic Analysis Of Mitral Valve Doppler Signals: Surrogate Data Analysis, Esma Uzunhi̇sarcikli Jan 2010

Nonlinear Dynamic Analysis Of Mitral Valve Doppler Signals: Surrogate Data Analysis, Esma Uzunhi̇sarcikli

Turkish Journal of Electrical Engineering and Computer Sciences

In our study, the nonlinear dynamics of mitral valve Doppler signals from 32 healthy and 28 patients with mitral valve stenosis was evaluated using by the computation of Lyapunov exponents, correlation dimension values and surrogate data analysis. Two chaotic features are compared for healthy and patient subjects. It was found that the largest Lyapunov exponent and correlation dimension values derived from patient subjects were larger than that of healthy subjects (\rho < 0.005). Surrogate data analysis was performed to determine the chaotic dynamics of Doppler signals. It was observed that the original and surrogate data have similar spectral features. Receiver operating characteristic (ROC) curves were used to evaluate the nonlinearity character Area Under the curve (AUC) values were obtained as 0.99 and 0.978 for the largest Lyapunov exponent and correlation dimension values, respectively. According to these results, Doppler signals have a nonlinear dynamic property and the largest Lyapunov exponent. Correlation dimension features can be used to detect the change in blood flow velocity of patients with mitral valve stenosis.


Dual-Use Of Compact Hf Radars For The Detection Of Mid- And Large-Size Vessels, Hugh Roarty, Don Barrick, Josh Kohut, Scott Glenn Jan 2010

Dual-Use Of Compact Hf Radars For The Detection Of Mid- And Large-Size Vessels, Hugh Roarty, Don Barrick, Josh Kohut, Scott Glenn

Turkish Journal of Electrical Engineering and Computer Sciences

This paper describes the development of the SeaSonde High Frequency Radar system into a dual-use application for the mapping of ocean surface currents and detection of ships at sea. This development entailed the creation of a new radar waveform that would permit this dual-use as well as a detection algorithm to identify the ships in the radar spectra. The detection algorithm utilizes two methods for calculating a background signal level: an infinite impulse response (IIR) filter and a two-dimensional median filter. These two methods are employed simultaneously with multiple length averaging times to maximize the number of detections. The initial …


Modeling And Simulation Strategies In High Frequency Surface Wave Radars, Levent Sevgi̇ Jan 2010

Modeling And Simulation Strategies In High Frequency Surface Wave Radars, Levent Sevgi̇

Turkish Journal of Electrical Engineering and Computer Sciences

Surface Wave High Frequency Radars (SWHFR) are taken into account in the content of modeling and simulation challenges. Examples related to multi-mixed path surface wave propagation, radar cross section (RCS) prediction, and total radar echo showing target, clutter, noise, and interference are presented.


A Review Of High Frequency Surface Wave Radar For Detection And Tracking Of Ships, Tony Ponsford, Jian Wang Jan 2010

A Review Of High Frequency Surface Wave Radar For Detection And Tracking Of Ships, Tony Ponsford, Jian Wang

Turkish Journal of Electrical Engineering and Computer Sciences

In today's resource-driven economy, maritime nations are claiming economic borders that extend beyond the continental shelf or the 200 nautical mile (nm) Exclusive Economic Zone (EEZ). However, claiming such large economic area places responsibilities on the parent nation to exercise jurisdiction through surveillance and enforcement. The requirement to see beyond the horizon has long been a goal of maritime security forces. Today, this is largely dependent on cooperative vessels voluntarily communicating their intentions to local shore-side authorities, as well as on those vessel sightings reported by patrollers. Recent advances in technology provide maritime nations with options to provide more systematic …


Implementation Of Method For Operating Multiple High Frequency Surface Wave Radars On A Common Carrier Frequency, Ryan Riddolls Jan 2010

Implementation Of Method For Operating Multiple High Frequency Surface Wave Radars On A Common Carrier Frequency, Ryan Riddolls

Turkish Journal of Electrical Engineering and Computer Sciences

The increasing use of High Frequency Surface Wave Radar (HFSWR) for the surveillance of coastal regions is faced with the problem of limited channel availability in the electromagnetic spectrum. Thus, there is a need for multiple radars to share a common frequency channel. Proof-of-concept work is presented here for a method to operate multiple radar systems on a common carrier frequency. A review is provided of an existing concept where a common waveform is modulated by tones varying by a few hertz across the different radars. The signals from the different radars are separated by either pulse-domain filtering or Doppler …