Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 424

Full-Text Articles in Computer Engineering

An Ml Based Digital Forensics Software For Triage Analysis Through Face Recognition, Gaurav Gogia, Parag H. Rughani Jul 2023

An Ml Based Digital Forensics Software For Triage Analysis Through Face Recognition, Gaurav Gogia, Parag H. Rughani

Journal of Digital Forensics, Security and Law

Since the past few years, the complexity and heterogeneity of digital crimes has increased exponentially, which has made the digital evidence & digital forensics paramount for both criminal investigation and civil litigation cases. Some of the routine digital forensic analysis tasks are cumbersome and can increase the number of pending cases especially when there is a shortage of domain experts. While the work is not very complex, the sheer scale can be taxing. With the current scenarios and future predictions, crimes are only going to become more complex and the precedent of collecting and examining digital evidence is only going …


Integrated Organizational Machine Learning For Aviation Flight Data, Michael J. Pritchard, Paul Thomas, Eric Webb, Jon Martin, Austin Walden Jan 2023

Integrated Organizational Machine Learning For Aviation Flight Data, Michael J. Pritchard, Paul Thomas, Eric Webb, Jon Martin, Austin Walden

National Training Aircraft Symposium (NTAS)

An increased availability of data and computing power has allowed organizations to apply machine learning techniques to various fleet monitoring activities. Additionally, our ability to acquire aircraft data has increased due to the miniaturization of small form factor computing machines. Aircraft data collection processes contain many data features in the form of multivariate time-series (continuous, discrete, categorical, etc.) which can be used to train machine learning models. Yet, three major challenges still face many flight organizations 1) integration and automation of data collection frameworks, 2) data cleanup and preparation, and 3) embedded machine learning framework. Data cleanup and preparation has …


An Evaluation Framework For Digital Image Forensics Tools, Zainab Khalid, Sana Qadir Oct 2022

An Evaluation Framework For Digital Image Forensics Tools, Zainab Khalid, Sana Qadir

Journal of Digital Forensics, Security and Law

The boom of digital cameras, photography, and social media has drastically changed how humans live their day-to-day, but this normalization is accompanied by malicious agents finding new ways to forge and tamper with images for unlawful monetary (or other) gains. Disinformation in the photographic media realm is an urgent threat. The availability of a myriad of image editing tools renders it almost impossible to differentiate between photo-realistic and original images. The tools available for image forensics require a standard framework against which they can be evaluated. Such a standard framework can aid in evaluating the suitability of an image forensics …


A Combined Approach For Private Indexing Mechanism, Pranita Maruti Desai Ms., Vijay Maruti Shelake Mr. Mar 2022

A Combined Approach For Private Indexing Mechanism, Pranita Maruti Desai Ms., Vijay Maruti Shelake Mr.

Journal of Digital Forensics, Security and Law

Private indexing is a set of approaches for analyzing research data that are similar or resemble similar ones. This is used in the database to keep track of the keys and their values. The main subject of this research is private indexing in record linkage to secure the data. Because unique personal identification numbers or social security numbers are not accessible in most countries or databases, data linkage is limited to attributes such as date of birth and names to distinguish between the number of records and the real-life entities they represent. For security reasons, the encryption of these identifiers …


Robotic Olfactory-Based Navigation With Mobile Robots, Lingxiao Wang Dec 2021

Robotic Olfactory-Based Navigation With Mobile Robots, Lingxiao Wang

Doctoral Dissertations and Master's Theses

Robotic odor source localization (OSL) is a technology that enables mobile robots or autonomous vehicles to find an odor source in unknown environments. It has been viewed as challenging due to the turbulent nature of airflows and the resulting odor plume characteristics. The key to correctly finding an odor source is designing an effective olfactory-based navigation algorithm, which guides the robot to detect emitted odor plumes as cues in finding the source. This dissertation proposes three kinds of olfactory-based navigation methods to improve search efficiency while maintaining a low computational cost, incorporating different machine learning and artificial intelligence methods.

A. …


Don't Bite The Bait: Phishing Attack For Internet Banking (E-Banking), Ilker Kara Nov 2021

Don't Bite The Bait: Phishing Attack For Internet Banking (E-Banking), Ilker Kara

Journal of Digital Forensics, Security and Law

Phishing attacks are based on obtaining desired information from users quickly and easily with the help of misdirecting, panicking, curiosity, or excitement. Most of the phishing web sites are designed on internet banking(e-banking) and the attackers can acquire financial information of misled users with the tactics and discourses they develop. Despite the increase of prevention techniques against phishing attacks day by day, an effective solution could not be found for this issue due to the human factor. Because of this reason, real phishing attack studies are essential to study and analyze the attackers’ attack techniques and strategies. This study focused …


Windows Kernel Hijacking Is Not An Option: Memoryranger Comes To The Rescue Again, Igor Korkin Jun 2021

Windows Kernel Hijacking Is Not An Option: Memoryranger Comes To The Rescue Again, Igor Korkin

Journal of Digital Forensics, Security and Law

The security of a computer system depends on OS kernel protection. It is crucial to reveal and inspect new attacks on kernel data, as these are used by hackers. The purpose of this paper is to continue research into attacks on dynamically allocated data in the Windows OS kernel and demonstrate the capacity of MemoryRanger to prevent these attacks. This paper discusses three new hijacking attacks on kernel data, which are based on bypassing OS security mechanisms. The first two hijacking attacks result in illegal access to files open in exclusive access. The third attack escalates process privileges, without applying …


Dynamic Task Allocation In Partially Defined Environments Using A* With Bounded Costs, James Hendrickson May 2021

Dynamic Task Allocation In Partially Defined Environments Using A* With Bounded Costs, James Hendrickson

Doctoral Dissertations and Master's Theses

The sector of maritime robotics has seen a boom in operations in areas such as surveying and mapping, clean-up, inspections, search and rescue, law enforcement, and national defense. As this sector has continued to grow, there has been an increased need for single unmanned systems to be able to undertake more complex and greater numbers of tasks. As the maritime domain can be particularly difficult for autonomous vehicles to operate in due to the partially defined nature of the environment, it is crucial that a method exists which is capable of dynamically accomplishing tasks within this operational domain. By considering …


A Framework To Detect The Susceptibility Of Employees To Social Engineering Attacks, Hashim H. Alneami May 2021

A Framework To Detect The Susceptibility Of Employees To Social Engineering Attacks, Hashim H. Alneami

Doctoral Dissertations and Master's Theses

Social engineering attacks (SE-attacks) in enterprises are hastily growing and are becoming increasingly sophisticated. Generally, SE-attacks involve the psychological manipulation of employees into revealing confidential and valuable company data to cybercriminals. The ramifications could bring devastating financial and irreparable reputation loss to the companies. Because SE-attacks involve a human element, preventing these attacks can be tricky and challenging and has become a topic of interest for many researchers and security experts. While methods exist for detecting SE-attacks, our literature review of existing methods identified many crucial factors such as the national cultural, organizational, and personality traits of employees that enable …


A Comprehensive Mapping And Real-World Evaluation Of Multi-Object Tracking On Automated Vehicles, Alexander Bassett Apr 2021

A Comprehensive Mapping And Real-World Evaluation Of Multi-Object Tracking On Automated Vehicles, Alexander Bassett

Doctoral Dissertations and Master's Theses

Multi-Object Tracking (MOT) is a field critical to Automated Vehicle (AV) perception systems. However, it is large, complex, spans research fields, and lacks resources for integration with real sensors and implementation on AVs. Factors such those make it difficult for new researchers and practitioners to enter the field.

This thesis presents two main contributions: 1) a comprehensive mapping for the field of Multi-Object Trackers (MOTs) with a specific focus towards Automated Vehicles (AVs) and 2) a real-world evaluation of an MOT developed and tuned using COTS (Commercial Off-The-Shelf) software toolsets. The first contribution aims to give a comprehensive overview of …


Integrating The First Person View And The Third Person View Using A Connected Vr-Mr System For Pilot Training, Chang-Geun Oh, Kwanghee Lee, Myunghoon Oh Jan 2021

Integrating The First Person View And The Third Person View Using A Connected Vr-Mr System For Pilot Training, Chang-Geun Oh, Kwanghee Lee, Myunghoon Oh

Journal of Aviation/Aerospace Education & Research

Virtual reality (VR)-based flight simulator provides pilots the enhanced reality from the first-person view. Mixed reality (MR) technology generates effective 3D graphics. The users who wear the MR headset can walk around the 3D graphics to see all its 360 degrees of vertical and horizontal aspects maintaining the consciousness of real space. A VR flight simulator and an MR application were connected to create the capability of both first-person view and third-person view for a comprehensive pilot training system. This system provided users the capability to monitor the aircraft progress along the planned path from the third-person view as well …


Finite-Time State Estimation For An Inverted Pendulum Under Input-Multiplicative Uncertainty, Sergey V. Drakunov, William Mackunis, Anu Kossery Jayaprakash, Krishna Bhavithavya Kidambi, Mahmut Reyhanoglu Oct 2020

Finite-Time State Estimation For An Inverted Pendulum Under Input-Multiplicative Uncertainty, Sergey V. Drakunov, William Mackunis, Anu Kossery Jayaprakash, Krishna Bhavithavya Kidambi, Mahmut Reyhanoglu

Publications

A sliding mode observer is presented, which is rigorously proven to achieve finite-time state estimation of a dual-parallel underactuated (i.e., single-input multi-output) cart inverted pendulum system in the presence of parametric uncertainty. A salient feature of the proposed sliding mode observer design is that a rigorous analysis is provided, which proves finite-time estimation of the complete system state in the presence of input-multiplicative parametric uncertainty. The performance of the proposed observer design is demonstrated through numerical case studies using both sliding mode control (SMC)- and linear quadratic regulator (LQR)-based closed-loop control systems. The main contribution presented here is the rigorous …


W-Gun: Whale Optimization For Energy And Delay-Centric Green Underwater Networks, Rajkumar Singh Rathore, Houbing Song, Suman Sangwan, Sukriti Mazumdar, Omprakash Kaiwartya, Kabita Adhikari, Rupak Kharel Mar 2020

W-Gun: Whale Optimization For Energy And Delay-Centric Green Underwater Networks, Rajkumar Singh Rathore, Houbing Song, Suman Sangwan, Sukriti Mazumdar, Omprakash Kaiwartya, Kabita Adhikari, Rupak Kharel

Publications

Underwater sensor networks (UWSNs) have witnessed significant R&D attention in both academia and industry due to their growing application domains, such as border security, freight via sea or river, natural petroleum production and the fishing industry. Considering the deep underwater-oriented access constraints, energy-centric communication for the lifetime maximization of tiny sensor nodes in UWSNs is one of the key research themes in this domain. Existing literature on green UWSNs are majorly adapted from the existing techniques in traditional wireless sensor network relying on geolocation and the quality of service-centric underwater relay node selection, without paying much attention to the dynamic …


Cache-Enabled In Cooperative Cognitive Radio Networks For Transmission Performance, Jiachen Yang, Houbing Song, Chaofan Ma, Jiabao Man, Huifang Xu, Gan Zheng Feb 2020

Cache-Enabled In Cooperative Cognitive Radio Networks For Transmission Performance, Jiachen Yang, Houbing Song, Chaofan Ma, Jiabao Man, Huifang Xu, Gan Zheng

Publications

The proliferation of mobile devices that support the acceleration of data services (especially smartphones) has resulted in a dramatic increase in mobile traffic. Mobile data also increased exponentially, already exceeding the throughput of the backhaul. To improve spectrum utilization and increase mobile network traffic, in combination with content caching, we study the cooperation between primary and secondary networks via content caching. We consider that the secondary base station assists the primary user by pre-caching some popular primary contents. Thus, the secondary base station can obtain more licensed bandwidth to serve its own user. We mainly focus on the time delay …


Coverage Guided Differential Adversarial Testing Of Deep Learning Systems, Jianmin Guo, Houbing Song, Yue Zhao, Yu Jiang Jan 2020

Coverage Guided Differential Adversarial Testing Of Deep Learning Systems, Jianmin Guo, Houbing Song, Yue Zhao, Yu Jiang

Publications

Deep learning is increasingly applied to safety-critical application domains such as autonomous cars and medical devices. It is of significant importance to ensure their reliability and robustness. In this paper, we propose DLFuzz, the coverage guided differential adversarial testing framework to guide deep learing systems exposing incorrect behaviors. DLFuzz keeps minutely mutating the input to maximize the neuron coverage and the prediction difference between the original input and the mutated input, without manual labeling effort or cross-referencing oracles from other systems with the same functionality. We also design multiple novel strategies for neuron selection to improve the neuron coverage. The …


Real-Time Urban Weather Observations For Urban Air Mobility, Kevin A. Adkins, Mustafa Akbas, Marc Compere Jan 2020

Real-Time Urban Weather Observations For Urban Air Mobility, Kevin A. Adkins, Mustafa Akbas, Marc Compere

International Journal of Aviation, Aeronautics, and Aerospace

Cities of the future will have to overcome congestion, air pollution and increasing infrastructure cost while moving more people and goods smoothly, efficiently and in an eco-friendly manner. Urban air mobility (UAM) is expected to be an integral component of achieving this new type of city. This is a new environment for sustained aviation operations. The heterogeneity of the urban fabric and the roughness elements within it create a unique environment where flight conditions can change frequently across very short distances. UAM vehicles with their lower mass, more limited thrust and slower speeds are especially sensitive to these conditions. Since …


Design Of Personnel Big Data Management System Based On Blockchain, Houbing Song, Jian Chen, Zhihan Lv Jul 2019

Design Of Personnel Big Data Management System Based On Blockchain, Houbing Song, Jian Chen, Zhihan Lv

Publications

With the continuous development of information technology, enterprises, universities and governments are constantly stepping up the construction of electronic personnel information management system. The information of hundreds of thousands or even millions of people’s information are collected and stored into the system. So much information provides the cornerstone for the development of big data, if such data is tampered with or leaked, it will cause irreparable serious damage. However, in recent years, electronic archives have exposed a series of problems such as information leakage, information tampering, and information loss, which has made the reform of personnel information management more and …


Adaboost‑Based Security Level Classifcation Of Mobile Intelligent Terminals, Feng Wang, Houbing Song, Dingde Jiang, Hong Wen Jul 2019

Adaboost‑Based Security Level Classifcation Of Mobile Intelligent Terminals, Feng Wang, Houbing Song, Dingde Jiang, Hong Wen

Publications

With the rapid development of Internet of Things, massive mobile intelligent terminals are ready to access edge servers for real-time data calculation and interaction. However, the risk of private data leakage follows simultaneously. As the administrator of all intelligent terminals in a region, the edge server needs to clarify the ability of the managed intelligent terminals to defend against malicious attacks. Therefore, the security level classification for mobile intelligent terminals before accessing the network is indispensable. In this paper, we firstly propose a safety assessment method to detect the weakness of mobile intelligent terminals. Secondly, we match the evaluation results …


Chip-Off Success Rate Analysis Comparing Temperature And Chip Type, Choli Ence, Joan Runs Through, Gary D. Cantrell Feb 2019

Chip-Off Success Rate Analysis Comparing Temperature And Chip Type, Choli Ence, Joan Runs Through, Gary D. Cantrell

Journal of Digital Forensics, Security and Law

Throughout the digital forensic community, chip-off analysis provides examiners with a technique to obtain a physical acquisition from locked or damaged digital device. Thermal based chip-analysis relies upon the application of heat to remove the flash memory chip from the circuit board. Occasionally, a flash memory chip fails to successfully read despite following similar protocols as other flash memory chips. Previous research found the application of high temperatures increased the number of bit errors present in the flash memory chip. The purpose of this study is to analyze data collected from chip-off analyses to determine if a statistical difference exists …


A New Framework For Securing, Extracting And Analyzing Big Forensic Data, Hitesh Sachdev, Hayden Wimmer, Lei Chen, Carl Rebman Oct 2018

A New Framework For Securing, Extracting And Analyzing Big Forensic Data, Hitesh Sachdev, Hayden Wimmer, Lei Chen, Carl Rebman

Journal of Digital Forensics, Security and Law

Finding new methods to investigate criminal activities, behaviors, and responsibilities has always been a challenge for forensic research. Advances in big data, technology, and increased capabilities of smartphones has contributed to the demand for modern techniques of examination. Smartphones are ubiquitous, transformative, and have become a goldmine for forensics research. Given the right tools and research methods investigating agencies can help crack almost any illegal activity using smartphones. This paper focuses on conducting forensic analysis in exposing a terrorist or criminal network and introduces a new Big Forensic Data Framework model where different technologies of Hadoop and EnCase software are …


Precognition: Automated Digital Forensic Readiness System For Mobile Computing Devices In Enterprises, Jayaprakash Govindaraj, Robin Verma, Gaurav Gupta May 2018

Precognition: Automated Digital Forensic Readiness System For Mobile Computing Devices In Enterprises, Jayaprakash Govindaraj, Robin Verma, Gaurav Gupta

Annual ADFSL Conference on Digital Forensics, Security and Law

Enterprises are facing an unprecedented risk of security incidents due to the influx of emerging technologies, like smartphones and wearables. Most of the current Mobile security systems are not maturing in pace with technological advances. They lack the ability to learn and adapt from the past knowledge base. In the case of a security incident, enterprises find themselves underprepared for the lack of evidence and data. The systems are not designed to be forensic ready. There is a need for automated security analysis and forensically ready solution, which can learn and continuously adapt to new challenges, improve efficiency and productivity …


Automated Man-In-The-Middle Attack Against Wi‑Fi Networks, Martin Vondráček, Jan Pluskal, Ondřej Ryšavý Mar 2018

Automated Man-In-The-Middle Attack Against Wi‑Fi Networks, Martin Vondráček, Jan Pluskal, Ondřej Ryšavý

Journal of Digital Forensics, Security and Law

Currently used wireless communication technologies suffer security weaknesses that can be exploited allowing to eavesdrop or to spoof network communication. In this paper, we present a practical tool that can automate the attack on wireless security. The developed package called wifimitm provides functionality for the automation of MitM attacks in the wireless environment. The package combines several existing tools and attack strategies to bypass the wireless security mechanisms, such as WEP, WPA, and WPS. The presented tool can be integrated into a solution for automated penetration testing. Also, a popularization of the fact that such attacks can be easily automated …


Computer Program, System, And Method For Observation And Communication For Mobile Settings, Mobile Applications, And Wearable Mobile Devices, Jibo He, Barbara Chaparro Jan 2018

Computer Program, System, And Method For Observation And Communication For Mobile Settings, Mobile Applications, And Wearable Mobile Devices, Jibo He, Barbara Chaparro

Publications

A system including at least first and second wearable mobile devices and optionally one or more smartphones or other computing devices for allowing a wearable mobile device wearer, an on-site observer, and a remote observer to research and test usability of products in mobile settings, mobile applications, mobile devices, and wearable mobile devices, desktop usability settings, and other settings and devices. The devices nm a software application for generating first-person video and third-person video, transmitting the video to the other devices, marking the videos with time stamps, and allowing the remote observer to send messages and other information to the …


Magic Triangle – Human, Exoskeleton, And Collaborative Robot Scenario, R. A. Goehlich, M. H. Rutsch, I. Krohne Jan 2018

Magic Triangle – Human, Exoskeleton, And Collaborative Robot Scenario, R. A. Goehlich, M. H. Rutsch, I. Krohne

Publications

The incidence of musculoskeletal disorders in workplaces with difficult ergonomic conditions is increasing. Today, there is a growing market for technical support systems that avoid repetitive strain on the musculoskeletal system. We have been observing two (parallel) lines of development: on the one hand, the development of exoskeletons supporting shop floor operators and, on the other hand, the development of collaborative robots for the creation of hybrid teams. The focus of our research is the combined application of exoskeletons AND collaborative robots for shop floor operators in the aerospace industry. Our approach is to analyze various scenarios to understand which …


A Data Hiding Scheme Based On Chaotic Map And Pixel Pairs, Sengul Dogan Sd Dec 2017

A Data Hiding Scheme Based On Chaotic Map And Pixel Pairs, Sengul Dogan Sd

Journal of Digital Forensics, Security and Law

Information security is one of the most common areas of study today. In the literature, there are many algorithms developed in the information security. The Least Significant Bit (LSB) method is the most known of these algorithms. LSB method is easy to apply however it is not effective on providing data privacy and robustness. In spite of all its disadvantages, LSB is the most frequently used algorithm in literature due to providing high visual quality. In this study, an effective data hiding scheme alternative to LSB, 2LSBs, 3LSBs and 4LSBs algorithms (known as xLSBs), is proposed. In this method, random …


Simple Implementation Of An Elgamal Digital Signature And A Brute Force Attack On It, Valeriia Laryoshyna Oct 2017

Simple Implementation Of An Elgamal Digital Signature And A Brute Force Attack On It, Valeriia Laryoshyna

Student Works

This study is an attempt to show a basic mathematical usage of the concepts behind digital signatures and to provide a simple approach and understanding to cracking basic digital signatures. The approach takes on simple C programming of the ElGamal digital signature to identify some limits that can be encountered and provide considerations for making more complex code. Additionally, there is a literature review of the ElGamal digital signature and the brute force attack.

The research component of this project provides a list of possible ways to crack the basic implementations and classifies the different approaches that could be taken …


Understanding Deleted File Decay On Removable Media Using Differential Analysis, James H. Jones Jr, Anurag Srivastava, Josh Mosier, Connor Anderson, Seth Buenafe May 2017

Understanding Deleted File Decay On Removable Media Using Differential Analysis, James H. Jones Jr, Anurag Srivastava, Josh Mosier, Connor Anderson, Seth Buenafe

Annual ADFSL Conference on Digital Forensics, Security and Law

Digital content created by picture recording devices is often stored internally on the source device, on either embedded or removable media. Such storage media is typically limited in capacity and meant primarily for interim storage of the most recent image files, and these devices are frequently configured to delete older files as necessary to make room for new files. When investigations involve such devices and media, it is sometimes these older deleted files that would be of interest. It is an established fact that deleted file content may persist in part or in its entirety after deletion, and identifying the …


Harnessing Predictive Models For Assisting Network Forensic Investigations Of Dns Tunnels, Irvin Homem, Panagiotis Papapetrou May 2017

Harnessing Predictive Models For Assisting Network Forensic Investigations Of Dns Tunnels, Irvin Homem, Panagiotis Papapetrou

Annual ADFSL Conference on Digital Forensics, Security and Law

In recent times, DNS tunneling techniques have been used for malicious purposes, however network security mechanisms struggle to detect them. Network forensic analysis has been proven effective, but is slow and effort intensive as Network Forensics Analysis Tools struggle to deal with undocumented or new network tunneling techniques. In this paper, we present a machine learning approach, based on feature subsets of network traffic evidence, to aid forensic analysis through automating the inference of protocols carried within DNS tunneling techniques. We explore four network protocols, namely, HTTP, HTTPS, FTP, and POP3. Three features are extracted from the DNS tunneled traffic: …


An Accidental Discovery Of Iot Botnets And A Method For Investigating Them With A Custom Lua Dissector, Max Gannon, Gary Warner, Arsh Arora May 2017

An Accidental Discovery Of Iot Botnets And A Method For Investigating Them With A Custom Lua Dissector, Max Gannon, Gary Warner, Arsh Arora

Annual ADFSL Conference on Digital Forensics, Security and Law

This paper presents a case study that occurred while observing peer-to-peer network communications on a botnet monitoring station and shares how tools were developed to discover what ultimately was identified as Mirai and many related IoT DDOS Botnets. The paper explains how researchers developed a customized protocol dissector in Wireshark using the Lua coding language, and how this enabled them to quickly identify new DDOS variants over a five month period of study.


A Forensic Email Analysis Tool Using Dynamic Visualization, Johannes Stadlinger, Andreas Dewald Mar 2017

A Forensic Email Analysis Tool Using Dynamic Visualization, Johannes Stadlinger, Andreas Dewald

Journal of Digital Forensics, Security and Law

Communication between people counts to the most important information of today’s business. As a result, in case of forensic investigations in big companies, analysis of communication data in general and especially email, as the still most widely used business communication platform with an immense and still growing volume, is a typical task in digital forensics. One of the challenges is to identify the relevant communication partners and structures in the suspects surrounding as quickly as possible in order to react appropriately and identify further targets of evaluation. Due to the amount of emails in typical inboxes, reading through all the …