Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Embry-Riddle Aeronautical University (105)
- University for Business and Technology in Kosovo (51)
- Old Dominion University (29)
- Institute of Business Administration (16)
- Purdue University (12)
-
- University of Nevada, Las Vegas (9)
- Kennesaw State University (6)
- San Jose State University (5)
- Cedarville University (2)
- University of Kentucky (2)
- University of Nebraska at Omaha (2)
- Illinois State University (1)
- James Madison University (1)
- LSU Health Science Center (1)
- Minnesota State University Moorhead (1)
- Minnesota State University, Mankato (1)
- Missouri University of Science and Technology (1)
- Murray State University (1)
- Olivet Nazarene University (1)
- Southern Illinois University Carbondale (1)
- University of Lynchburg (1)
- University of San Diego (1)
- Winona State University (1)
- Keyword
-
- Machine learning (4)
- Database (3)
- Social networks (3)
- 5G (2)
- Algorithm (2)
-
- Bandwidth (2)
- Big Data (2)
- Cloud Computing (2)
- Communication (2)
- Computer architecture (2)
- Computer networks (2)
- Computer security (2)
- Deep Learning (2)
- Disaster management (2)
- Facebook (2)
- Information Security (2)
- Information security (2)
- Information technology (2)
- IoT (2)
- Java (2)
- Mathematics (2)
- Mobile operator (2)
- Natural language processing (2)
- Neural networks (2)
- Protocols (2)
- Social media (2)
- Visual Analytics (2)
- Wireless LAN (2)
- Wireless sensor networks (2)
- (q (1)
- Publication Year
- Publication
-
- Annual ADFSL Conference on Digital Forensics, Security and Law (104)
- UBT International Conference (51)
- Cybersecurity Undergraduate Research Showcase (20)
- International Conference on Information and Communication Technologies (16)
- The Summer Undergraduate Research Fellowship (SURF) Symposium (11)
-
- Modeling, Simulation and Visualization Student Capstone Conference (9)
- College of Engineering: Graduate Celebration Programs (5)
- Inaugural CSU IR Conference, 2015 (5)
- 2010 Annual Nevada NSF EPSCoR Climate Change Conference (4)
- KSU Proceedings on Cybersecurity Education, Research and Practice (3)
- Commonwealth Computational Summit (2)
- Symposium of Student Scholars (2)
- The Research and Scholarship Symposium (2013-2019) (2)
- ASA Multidisciplinary Research Symposium (1)
- African Conference on Information Systems and Technology (1)
- Annual Symposium on Biomathematics and Ecology Education and Research (1)
- Computer Science Graduate Research Workshop (1)
- Digital Initiatives Symposium (1)
- LSU Health New Orleans Symposium Series on Artificial Intelligence (1)
- MODVIS Workshop (1)
- National Training Aircraft Symposium (NTAS) (1)
- Posters-at-the-Capitol (1)
- Ramaley Celebration (1)
- Scholar Week 2016 - present (1)
- Showcase of Graduate Student Scholarship and Creative Activities (1)
- Student Academic Conference (1)
- Student Scholar Showcase (1)
- UNO Student Research and Creative Activity Fair (1)
- Undergraduate Research Conference at Missouri S&T (1)
- Undergraduate Research Symposium (1)
- File Type
Articles 241 - 251 of 251
Full-Text Articles in Computer Engineering
Paper Session V: Forensic Software Tools For Cell Phone Subscriber Identity Modules, Wayne Jansen, Rick Ayers
Paper Session V: Forensic Software Tools For Cell Phone Subscriber Identity Modules, Wayne Jansen, Rick Ayers
Annual ADFSL Conference on Digital Forensics, Security and Law
Cell phones and other handheld devices incorporating cell phone capabilities (e.g., smart phones) are ubiquitous. Besides placing calls, cell phones allow users to perform other tasks such as text messaging and phonebook entry management. When cell phones and cellular devices are involved in a crime or other incident, forensic specialists require tools that allow the proper retrieval and speedy examination of data present on the device. For devices conforming to the Global System for Mobile Communications (GSM) standards, certain data such as dialed numbers, text messages, and phonebook entries are maintained on a Subscriber Identity Module (SIM). This paper gives …
Paper Session V: Steganography And Terrorist Communications - Current Information And Trends - Tools, Analysis And Future Directions In Steganalysis In Context With Terrorists And Other Criminals, William Eyre, Marcus Rogers
Paper Session V: Steganography And Terrorist Communications - Current Information And Trends - Tools, Analysis And Future Directions In Steganalysis In Context With Terrorists And Other Criminals, William Eyre, Marcus Rogers
Annual ADFSL Conference on Digital Forensics, Security and Law
In ancient times, users communicated using steganography, “…derived from the Greek words steganos, meaning ‘covered’, and graphein, meaning ‘to write.’” (Singh, 1999, p.5) Steganography facilitates secret, undetected communication. In modern times, in the context of the Global War on Terror, national intelligence and law enforcement agencies need tools to detect hidden information (steganography) in various types of media, most specifically to uncover the placement of hidden information in images. This paper will look at steganography in general terms, presenting the theory of some common steganographic techniques and touching on some theoretical work in steganography. Then a discussion of how to …
Paper Session Iv: Toward Understanding Digital Forensics As A Profession: Defining Curricular Needs (***Research In Process ***), Michelle Wolf, Alan Shafer, Michael Gendron
Paper Session Iv: Toward Understanding Digital Forensics As A Profession: Defining Curricular Needs (***Research In Process ***), Michelle Wolf, Alan Shafer, Michael Gendron
Annual ADFSL Conference on Digital Forensics, Security and Law
This research paper presents research in process which attempts to define the common body of knowledge (CBK) of digital forensics. Digital forensics is not well defined not does it have a generally accepted CBK. The first three phases of completed research, in a four-phase research process are discussed. The early results have created a preliminary CBK, and final validation is underway.
Paper Session Iv: Development And Delivery Of Coursework - The Legal/Regulatory/Policy Environment Of Cyberforensics, John W. Bagby, John C. Ruhnka
Paper Session Iv: Development And Delivery Of Coursework - The Legal/Regulatory/Policy Environment Of Cyberforensics, John W. Bagby, John C. Ruhnka
Annual ADFSL Conference on Digital Forensics, Security and Law
This paper describes a cyber-forensics course that integrates important public policy and legal issues as well as relevant forensic techniques. Cyber-forensics refers to the amalgam of multi-disciplinary activities involved in the identification, gathering, handling, custody, use and security of electronic files and records, involving expertise from the forensic domain, and which produces evidence useful in the proof of facts for both commercial and legal activities. The legal and regulatory environment in which electronic discovery takes place is of critical importance to cyber-forensics experts because the legal process imposes both constraints and opportunities for the effective use of evidence gathered through …
Paper Session Iii: Research Brief: A Curriculum For Teaching Information Technology Investigative Techniques For Auditors, Grover S. Kearns, Elizabeth V. Mulig
Paper Session Iii: Research Brief: A Curriculum For Teaching Information Technology Investigative Techniques For Auditors, Grover S. Kearns, Elizabeth V. Mulig
Annual ADFSL Conference on Digital Forensics, Security and Law
Recent prosecutions of highly publicized white-collar crimes combined with public outrage have resulted in heightened regulation and greater emphasis on systems of internal control. Because both white-collar and cybercrimes are usually perpetrated through computers, auditors’ knowledge of information technology (IT) is now more vital than ever. However, preserving digital evidence and investigative techniques, which can be essential to fraud examinations, are not skills frequently taught in accounting programs. Furthermore, many students are not instructed in the use of computer assisted auditing tools and techniques – applications that might uncover fraudulent activity. Only a limited number of university-level accounting classes provide …
Paper Session Ii: Forensic Scene Documentation Using Mobile Technology, Ibrahim Baggili
Paper Session Ii: Forensic Scene Documentation Using Mobile Technology, Ibrahim Baggili
Annual ADFSL Conference on Digital Forensics, Security and Law
This paper outlines a framework for integrating forensic scene documentation with mobile technology. Currently there are no set standards for documenting a forensic scene. Nonetheless, there is a conceptual framework that forensic scientists and engineers use that includes note taking, scene sketches, photographs, video, and voice interview recordings. This conceptual framework will be the basis that a mobile forensic scene documentation software system is built on. A mobile software system for documenting a forensic scene may help in standardizing forensic scene documentation by regulating the data collection and documentation processes for various forensic disciplines.
2nd Annual Undergraduate Research Conference Abstract Book, University Of Missouri--Rolla
2nd Annual Undergraduate Research Conference Abstract Book, University Of Missouri--Rolla
Undergraduate Research Conference at Missouri S&T
No abstract provided.
Poster Session A: A Multi-Priority Application Framework For Mobile Ad Hoc Networks, M. Ibrahim Channa, Ahsan Chaudhry, Kashif Sharif, Irum Memon
Poster Session A: A Multi-Priority Application Framework For Mobile Ad Hoc Networks, M. Ibrahim Channa, Ahsan Chaudhry, Kashif Sharif, Irum Memon
International Conference on Information and Communication Technologies
The fast spread of small wireless computers has enabled the design and deployment of wireless Ad Hoc networks. Typical applications proposed for such networks include both Real Time and Non-Real Time applications. We propose an architecture that provides a complete framework for Real Time applications and Best Effort traffic. The proposed architecture comprises of an Ad Hoc Routing Protocol for route setup and route repair, a Bandwidth Allocation and Reservation Scheme for Real Time traffic, and a MAC layer protocol that provides traffic differentiation. The Admission Control module is used to admit or reject a new Real Time flow request …
Secured Network Model For Management Information System Based On Ip Security (Ipsec) Encryption Using Multilayered Approach Of Network Security, Dr. Amir Hassan Pathan, Muniza Irshad
Secured Network Model For Management Information System Based On Ip Security (Ipsec) Encryption Using Multilayered Approach Of Network Security, Dr. Amir Hassan Pathan, Muniza Irshad
International Conference on Information and Communication Technologies
Secured flow of information through the network and play important role in the management information systems. In this paper I describe Secured Network Model For Corporate & Business Organization In Based On Network Level IP Security (IPSec) Encryption & Its Physical Layout Using Multilayered Approach. I have four important considerations for adoption of secured network model as secured network model for management information system.
G-Value Decoding Of Greedy Codes, Khalil Ahmad
G-Value Decoding Of Greedy Codes, Khalil Ahmad
International Conference on Information and Communication Technologies
Error-correcting codes are widely used to increase the reliability of transmission of information over various forms of communication channels. Codes with a given minimum distance d can be constructed by a greedy algorithm [2]. In this paper, I proposed a new algorithm for the allocation of g-values to the binary vectors. Hamming (7, 4, 3) code can be generated by the application of greedy algorithm on the binary vectors of length 7 arranged in B-ordering. This code is used to demonstrate a new decoding technique for linear codes in addition to the schemes already known for decoding such as Syndrome …
Keynote: Role Of Values & Culture In Information Technology, Prof. Dr. Anis Ahmad
Keynote: Role Of Values & Culture In Information Technology, Prof. Dr. Anis Ahmad
International Conference on Information and Communication Technologies
It is no longer unusual to see, in a remote town in northern area in Pakistan, a practically non-literate wagon driver calling from his Nokia cell phone his uncle in Dubai or in Karachi. He enjoys sharing with him about his success in business and the settlement of family disputes. While he is driving on dangerous curvy roads and having this conversation, in the back seat of the wagon a comparatively young person is playing games on his cell phone. All this was unimaginable a quarter of a century ago.