Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Embry-Riddle Aeronautical University (27)
- California State University, San Bernardino (8)
- Selected Works (8)
- San Jose State University (5)
- University of New Haven (4)
-
- City University of New York (CUNY) (3)
- Old Dominion University (3)
- University of Connecticut (3)
- University of Pennsylvania Carey Law School (3)
- Purdue University (2)
- Singapore Management University (2)
- University of Denver (2)
- University of Nebraska - Lincoln (2)
- University of Texas at El Paso (2)
- Binghamton University (1)
- Bowling Green State University (1)
- California Polytechnic State University, San Luis Obispo (1)
- Claremont Colleges (1)
- Edith Cowan University (1)
- Montclair State University (1)
- Portland State University (1)
- SelectedWorks (1)
- University of Nevada, Las Vegas (1)
- University of South Florida (1)
- Wayne State University (1)
- World Maritime University (1)
- Yale University (1)
- Keyword
-
- Digital Forensics (5)
- Technology (5)
- Data management (4)
- Digital forensics (4)
- Editor (4)
-
- Table (4)
- Contents (3)
- 3D modeling (2)
- Android forensics (2)
- Computer Forensics (2)
- Cretan Hieroglyph (2)
- Cybersecurity (2)
- Data (2)
- Data preservation (2)
- Evolution (2)
- Information (2)
- International (2)
- Internet (2)
- Journal (2)
- Linear A (2)
- Linear B (2)
- Machine learning (2)
- Management (2)
- Marketing (2)
- Mobile forensics (2)
- Network forensics (2)
- PhotoScan (2)
- Photogrammetry (2)
- Policies (2)
- Robotics (2)
- Publication
-
- Journal of Digital Forensics, Security and Law (27)
- Journal of International Technology and Information Management (8)
- Inaugural CSU IR Conference, 2015 (5)
- Electrical & Computer Engineering and Computer Science Faculty Publications (4)
- All Faculty Scholarship (3)
-
- Jerry C Schnepp (3)
- CSE Conference and Workshop Papers (2)
- MODVIS Workshop (2)
- Matt Schultz (2)
- Open Access Theses & Dissertations (2)
- Publications and Research (2)
- Research Collection School Of Computing and Information Systems (2)
- Capstone Projects 2015-Present (1)
- Capstones (1)
- Carl Heine (1)
- Computational Modeling & Simulation Engineering Faculty Publications (1)
- Computer Science Theses & Dissertations (1)
- Dissertations and Theses (1)
- Dr. Chen Ling (1)
- Electrical and Computer Engineering: Graduate Student Scholarship (1)
- Electronic Theses and Dissertations (1)
- Honors Scholar Theses (1)
- Jan Kallberg (1)
- January 23, 2015: Storm Surge Modeling Tools for Planning and Response (1)
- Journal of Humanistic Mathematics (1)
- Liberal Arts and Engineering Studies (1)
- Library Faculty Publications (1)
- Maritime Safety & Environment Management Dissertations (Dalian) (1)
- Military Cyber Affairs (1)
- Published Works (1)
- Publication Type
- File Type
Articles 61 - 87 of 87
Full-Text Articles in Computer Engineering
Project Maelstrom: Forensic Analysis Of The Bittorrent-Powered Browser, Jason Farina, M-Tahar Kechadi, Mark Scanlon
Project Maelstrom: Forensic Analysis Of The Bittorrent-Powered Browser, Jason Farina, M-Tahar Kechadi, Mark Scanlon
Journal of Digital Forensics, Security and Law
In April 2015, BitTorrent Inc. released their distributed peer-to-peer powered browser, Project Maelstrom, into public beta. The browser facilitates a new alternative website distribution paradigm to the traditional HTTP-based, client-server model. This decentralised web is powered by each of the visitors accessing each Maelstrom hosted website. Each user shares their copy of the website;s source code and multimedia content with new visitors. As a result, a Maelstrom hosted website cannot be taken offline by law enforcement or any other parties. Due to this open distribution model, a number of interesting censorship, security and privacy considerations are raised. This paper explores …
Table Of Contents
Journal of Digital Forensics, Security and Law
No abstract provided.
Table Of Contents
Journal of Digital Forensics, Security and Law
No abstract provided.
Table Of Contents
Journal of Digital Forensics, Security and Law
No abstract provided.
Table Of Contents
Journal of Digital Forensics, Security and Law
No abstract provided.
Merging Two Worlds: Agent-Based Simulation Methods For Autonomous Systems, Andreas Tolk
Merging Two Worlds: Agent-Based Simulation Methods For Autonomous Systems, Andreas Tolk
Computational Modeling & Simulation Engineering Faculty Publications
This chapter recommends the increased use of agent-based simulation methods to support the design, development, testing, and operational use of autonomous systems. This recommendation is motivated by deriving taxonomies for intelligent software agents and autonomous robotic systems from the public literature, which shows their similarity: intelligent software agents can be interpreted as the virtual counterparts of autonomous robotic systems. This leads to examples of how simulation can be used to significantly improve autonomous system research and development in selected use cases. The chapter closes with observations on the operational effects of possible emergent behaviour and the need to align the …
Neighbor Discovery In Mobile Ad Hoc Networks, Esau Enrique Ruiz-Gaistardo
Neighbor Discovery In Mobile Ad Hoc Networks, Esau Enrique Ruiz-Gaistardo
Open Access Theses & Dissertations
Neighbor Discovery (ND) is the process that initializes a reliable communication between one-hop neighbors in mobile ad hoc networks (MANETs). This process consists of scheduled exchanges of control messages, called â??Hello Messagesâ?? (HMs) between one-hop neighbors. HMs build bidirectional links that are used to announce the topology information. Each node uses ND and the topology information to populate its routing tables and to communicate with every other node in the network. In MANETs, ND process is a permanent process to discover one-hop neighbors. It is based on two parameters: 1) ND message interval (the period of time in between sending …
From The Desk Of The Editor
Journal of International Technology and Information Management
No abstract provided.
From The Desk Of The Editor
Journal of International Technology and Information Management
No abstract provided.
Two Challenges Of Stealthy Hypervisors Detection: Time Cheating And Data Fluctuations, Igor Korkin
Two Challenges Of Stealthy Hypervisors Detection: Time Cheating And Data Fluctuations, Igor Korkin
Journal of Digital Forensics, Security and Law
Hardware virtualization technologies play a significant role in cyber security. On the one hand these technologies enhance security levels, by designing a trusted operating system. On the other hand these technologies can be taken up into modern malware which is rather hard to detect. None of the existing methods is able to efficiently detect a hypervisor in the face of countermeasures such as time cheating, temporary self uninstalling, memory hiding etc. New hypervisor detection methods which will be described in this paper can detect a hypervisor under these countermeasures and even count several nested ones. These novel approaches rely on …
Rules Of Professional Responsibility In Digital Forensics: A Comparative Analysis, Filipo Sharevski
Rules Of Professional Responsibility In Digital Forensics: A Comparative Analysis, Filipo Sharevski
Journal of Digital Forensics, Security and Law
The consolidation of the rules of professional responsibility as recommended by the Committee on Identifying the Needs of Forensic Sciences Community (2009) accents the establishment of an uniform code of ethics emphasizing the importance of enforceability in strengthening the role the forensic science plays within the criminal justice system. Equally pertinent for the domain of digital forensics, this imperative entails a research commitment in comparing and contrasting the respective codes of ethics to illustrate their “variety, specificity and enforceability” in order to inform the discussion on the regulative aspects of the digital forensic discipline. Accordingly, this paper reviews the professional …
Data Extraction On Mtk-Based Android Mobile Phone Forensics, Joe Kong
Data Extraction On Mtk-Based Android Mobile Phone Forensics, Joe Kong
Journal of Digital Forensics, Security and Law
In conducting criminal investigations it is quite common that forensic examiners need to recover evidentiary data from smartphones used by offenders. However, examiners encountered difficulties in acquiring complete memory dump from MTK Android phones, a popular brand of smartphones, due to a lack of technical knowledge on the phone architecture and that system manuals are not always available. This research will perform tests to capture data from MTK Android phone by applying selected forensic tools and compare their effectiveness by analyzing the extracted results. It is anticipated that a generic extraction tool, once identified, can be used on different brands …
The Use Of Ontologies In Forensic Analysis Of Smartphone Content, Mohammed Alzaabi, Thomas A. Martin, Kamal Taha, Andy Jones
The Use Of Ontologies In Forensic Analysis Of Smartphone Content, Mohammed Alzaabi, Thomas A. Martin, Kamal Taha, Andy Jones
Journal of Digital Forensics, Security and Law
Digital forensics investigators face a constant challenge in keeping track with evolving technologies such as smartphones. Analyzing the contents of these devices to infer useful information is becoming more time consuming as the volume and complexity of data are increasing. Typically, such analysis is undertaken by a human, which makes it dependent on the experience of the investigator. To overcome such impediments, an automated technique can be utilized in order to aid the investigator to quickly and eciently analyze the data.In this paper, we propose F-DOS; a set of ontologies that models the smartphone content for the purpose of forensic …
Framing The Question, "Who Governs The Internet?", Robert J. Domanski
Framing The Question, "Who Governs The Internet?", Robert J. Domanski
Publications and Research
There remains a widespread perception among both the public and elements of academia that the Internet is “ungovernable”. However, this idea, as well as the notion that the Internet has become some type of cyber-libertarian utopia, is wholly inaccurate. Governments may certainly encounter tremendous difficulty in attempting to regulate the Internet, but numerous types of authority have nevertheless become pervasive. So who, then, governs the Internet? This book will contend that the Internet is, in fact, being governed, that it is being governed by specific and identifiable networks of policy actors, and that an argument can be made as to …
Table Of Contents
Journal of International Technology and Information Management
No abstract provided.
From The Desk Of The Editor
Journal of International Technology and Information Management
No abstract provided.
Table Of Contents
Journal of International Technology and Information Management
No abstract provided.
From The Desk Of The Editor
Journal of International Technology and Information Management
No abstract provided.
Table Of Contents
Journal of International Technology and Information Management
No abstract provided.
Table Of Contents
Journal of International Technology and Information Management
No abstract provided.
An Empirical Comparison Of Widely Adopted Hash Functions In Digital Forensics: Does The Programming Language And Operating System Make A Difference?, Satyendra Gurjar, Ibrahim Baggili, Frank Breitinger, Alice E. Fischer
An Empirical Comparison Of Widely Adopted Hash Functions In Digital Forensics: Does The Programming Language And Operating System Make A Difference?, Satyendra Gurjar, Ibrahim Baggili, Frank Breitinger, Alice E. Fischer
Electrical & Computer Engineering and Computer Science Faculty Publications
Hash functions are widespread in computer sciences and have a wide range of applications such as ensuring integrity in cryptographic protocols, structuring database entries (hash tables) or identifying known files in forensic investigations. Besides their cryptographic requirements, a fundamental property of hash functions is efficient and easy computation which is especially important in digital forensics due to the large amount of data that needs to be processed when working on cases. In this paper, we correlate the runtime efficiency of common hashing algorithms (MD5, SHA-family) and their implementation. Our empirical comparison focuses on C-OpenSSL, Python, Ruby, Java on Windows and …
Network And Device Forensic Analysis Of Android Social-Messaging Applications, Daniel Walnycky, Ibrahim Baggili, Andrew Marrington, Jason Moore, Frank Breitinger
Network And Device Forensic Analysis Of Android Social-Messaging Applications, Daniel Walnycky, Ibrahim Baggili, Andrew Marrington, Jason Moore, Frank Breitinger
Electrical & Computer Engineering and Computer Science Faculty Publications
In this research we forensically acquire and analyze the device-stored data and network traffic of 20 popular instant messaging applications for Android. We were able to reconstruct some or the entire message content from 16 of the 20 applications tested, which reflects poorly on the security and privacy measures employed by these applications but may be construed positively for evidence collection purposes by digital forensic practitioners. This work shows which features of these instant messaging applications leave evidentiary traces allowing for suspect data to be reconstructed or partially reconstructed, and whether network forensics or device forensics permits the reconstruction of …
Re-Examining Resistance: Fan-Produced Queer Readings And Teen Wolf, Joshua J. Espinoza
Re-Examining Resistance: Fan-Produced Queer Readings And Teen Wolf, Joshua J. Espinoza
Open Access Theses & Dissertations
MTV's popular television series, Teen Wolf (2011), has amassed a large online following of fans that create their own queer narratives through fan-fiction, subverting the show's hegemonic heteronormativity. Through a textual thematic analysis of Teen Wolf, this case study illustrates how online fandoms can subvert hegemony through queer readings of literary characters, resisting the dominant heteronormativity on network television. This article argues that rearticulating the showâ??s narratives into queer readings functions as a form of LGBT resistance, effectively counteracting the heteronormativity and hegemony portrayed on screen. This study examines how Teen Wolf approaches queer content, including homoeroticism and LGBT themes …
Cyber Espionage Or Cyber War?: International Law, Domestic Law, And Self-Protective Measures, Christopher S. Yoo
Cyber Espionage Or Cyber War?: International Law, Domestic Law, And Self-Protective Measures, Christopher S. Yoo
All Faculty Scholarship
Scholars have spent considerable effort determining how the law of war (particularly jus ad bellum and jus in bello) applies to cyber conflicts, epitomized by the Tallinn Manual on the International Law Applicable to Cyber Warfare. Many prominent cyber operations fall outside the law of war, including the surveillance programs that Edward Snowden has alleged were conducted by the National Security Agency, the distributed denial of service attacks launched against Estonia and Georgia in 2007 and 2008, the 2008 Stuxnet virus designed to hinder the Iranian nuclear program, and the unrestricted cyber warfare described in the 1999 book by …
Mobile Apps In Collection Development: Supporting A Mobile Learning Environment, Stefanie Havelka, Rebecca Arzola
Mobile Apps In Collection Development: Supporting A Mobile Learning Environment, Stefanie Havelka, Rebecca Arzola
Publications and Research
We will discuss our rationale and thoughts on why we believe mobile apps should be part of a library’s collection development policy. An updated policy with apps encourages a mobile learning environment that is technologically diverse while being holistically supportive of its users and research.
Using Robots As Therapeutic Agents To Teach Children With Autism Recognize Facial Expression, Seyedmohammad Mavadati, Huanghao Feng, Peyten B. Sanger, S. Silver, Anibal Gutierrez, Mohammad H. Mahoor
Using Robots As Therapeutic Agents To Teach Children With Autism Recognize Facial Expression, Seyedmohammad Mavadati, Huanghao Feng, Peyten B. Sanger, S. Silver, Anibal Gutierrez, Mohammad H. Mahoor
Electrical and Computer Engineering: Graduate Student Scholarship
Background: Recognizing and mimicking facial expressions are important cues for building great rapport and relationship in human-human communication. Individuals with Autism Spectrum Disorder (ASD) have often deficits in recognizing and mimicking social cues, such as facial expressions. In the last decade several studies have shown that individuals with ASD have superior engagement toward objects and particularly robots (i.e. humanoid and non-humanoid). However, majority of the studies have focused on investigating robot’s appearances and the engineering design concepts and very few research have been done on the effectiveness of robots in therapeutic and treatment applications. In fact, the critical question that …
Moore’S Law, Metcalfe’S Law, And The Theory Of Optimal Interoperability, Christopher S. Yoo
Moore’S Law, Metcalfe’S Law, And The Theory Of Optimal Interoperability, Christopher S. Yoo
All Faculty Scholarship
Many observers attribute the Internet’s success to two principles: Moore’s Law and Metcalfe’s Law. These precepts are often cited to support claims that larger networks are inevitably more valuable and that costs in a digital environment always decrease. This Article offers both a systematic description of both laws and then challenges the conventional wisdom by exploring their conceptual limitations. It also explores how alternative mechanisms, such as gateways and competition, can permit the realization benefits typically attributed to Moore’s Law and Metcalfe’s Law without requiring increases in network size.