Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Electrical and Computer Engineering (38)
- Physical Sciences and Mathematics (37)
- Computer Law (36)
- Computer Sciences (36)
- Forensic Science and Technology (36)
-
- Information Security (36)
- Law (36)
- Legal Studies (36)
- Social and Behavioral Sciences (36)
- Aerospace Engineering (2)
- Other Computer Engineering (2)
- Robotics (2)
- Analytical, Diagnostic and Therapeutic Techniques and Equipment (1)
- Biomedical (1)
- Diagnosis (1)
- Electrical and Electronics (1)
- Engineering Physics (1)
- Medicine and Health Sciences (1)
- Navigation, Guidance, Control and Dynamics (1)
- Other Analytical, Diagnostic and Therapeutic Techniques and Equipment (1)
- Physics (1)
- Keyword
-
- Digital forensics (3)
- Automated Psychological assessment (2)
- Computer Graphics (2)
- Content Analysis (2)
- Detecting (2)
-
- Digital Communication (2)
- Digital Forensics (2)
- Disgruntlement (2)
- Employee Anger (2)
- Evidence (2)
- Forensic Animation (2)
- Guidelines. (2)
- Insider Risk (2)
- Negative Sentiment (2)
- Reconstruction (2)
- Threat (2)
- Visualisation (2)
- Visualization (2)
- Workplace Violence (2)
- ADAM (1)
- Android (1)
- Anti Money Laundering (1)
- Audit trails (1)
- Clinical toxicology (1)
- Complex Event Processing (1)
- Computer forensics (1)
- Computer security (1)
- Continuous monitoring (1)
- Control (1)
- Corporate networks (1)
- Publication
- Publication Type
Articles 31 - 41 of 41
Full-Text Articles in Computer Engineering
Table Of Contents
Journal of Digital Forensics, Security and Law
No abstract provided.
Risk Management Of Email And Internet Use In The Workplace, John Ruhnka, Windham E. Loopesko
Risk Management Of Email And Internet Use In The Workplace, John Ruhnka, Windham E. Loopesko
Journal of Digital Forensics, Security and Law
The article surveys the changing risk environment for corporations from their employees’ electronic communications. It identifies the types of liabilities that corporations can incur from such employee communications. It discusses the objectives of corporate internet use policies and the types of provisions such policies should contain. It suggests an alternative risk-based approach to corporate acceptable use policies instead of a traditional “laundry list” of internet use prohibitions.
Trends In Android Malware Detection, Kaveh Shaerpour, Ali Dehghantanha, Ramlan Mahmod
Trends In Android Malware Detection, Kaveh Shaerpour, Ali Dehghantanha, Ramlan Mahmod
Journal of Digital Forensics, Security and Law
This paper analyzes different Android malware detection techniques from several research papers, some of these techniques are novel while others bring a new perspective to the research work done in the past. The techniques are of various kinds ranging from detection using host based frameworks and static analysis of executable to feature extraction and behavioral patterns. Each paper is reviewed extensively and the core features of each technique are highlighted and contrasted with the others. The challenges faced during the development of such techniques are also discussed along with the future prospects for Android malware detection. The findings of the …
Table Of Contents
Journal of Digital Forensics, Security and Law
No abstract provided.
Analysis Of A Second Hand Google Mini Search Appliance, Stephen Larson
Analysis Of A Second Hand Google Mini Search Appliance, Stephen Larson
Journal of Digital Forensics, Security and Law
Information and the technological advancements for which mankind develops with regards to its storage has increased tremendously over the past few decades. As the total amount of data stored rapidly increases in conjunction with the amount of widely available computer-driven devices being used, solutions are being developed to better harness this data (LaTulippe, 2011). One of these solutions is commonly known as a search appliance. Search appliances have been used in e-discovery for several years. The Google Mini Search Appliance (Mini) has not only been used for e-discovery, but for indexing and searching internal documents. To accomplish these tasks, search …
The Advanced Data Acquisition Model (Adam): A Process Model For Digital Forensic Practice, Richard Adams, Val Hobbs, Graham Mann
The Advanced Data Acquisition Model (Adam): A Process Model For Digital Forensic Practice, Richard Adams, Val Hobbs, Graham Mann
Journal of Digital Forensics, Security and Law
As with other types of evidence, the courts make no presumption that digital evidence is reliable without some evidence of empirical testing in relation to the theories and techniques associated with its production. The issue of reliability means that courts pay close attention to the manner in which electronic evidence has been obtained and in particular the process in which the data is captured and stored. Previous process models have tended to focus on one particular area of digital forensic practice, such as law enforcement, and have not incorporated a formal description. We contend that this approach has prevented the …
Science Column: Reconstruction: The Experimental Side Of Digital Forensics, Fred Cohen
Science Column: Reconstruction: The Experimental Side Of Digital Forensics, Fred Cohen
Journal of Digital Forensics, Security and Law
Many in digital forensics seem to forget that the science part of digital forensics means experimentation and that implies a whole lot of things that most practitioners never learned.
Technology Corner: Calculating The Number Of Android Lock Patterns: An Unfinished Study In Number Theory, Gary C. Kessler
Technology Corner: Calculating The Number Of Android Lock Patterns: An Unfinished Study In Number Theory, Gary C. Kessler
Journal of Digital Forensics, Security and Law
Although one is unlikely to ever want to brute-force an Android lock pattern, many do wonder about the relative strength of the lock pattern versus a multidigit personal identification number (PIN). It becomes obvious pretty quickly that there are many more lock patterns than the 10,000 possible four-digit PINs.
Table Of Contents
Journal of Digital Forensics, Security and Law
No abstract provided.
Technology Corner: Calculating The Number Of Android Lock Patterns: An Unfinished Study In Number Theory, Gary C. Kessler
Technology Corner: Calculating The Number Of Android Lock Patterns: An Unfinished Study In Number Theory, Gary C. Kessler
Security Studies & International Affairs - Daytona Beach
"Although one is unlikely to ever want to brute-force an Android lock pattern, many do wonder about the relative strength of the lock pattern versus a multi-digit personal identification number (PIN). It becomes obvious pretty quickly that there are many more lock patterns than the 10,000 possible four-digit PINs."--from the introduction.
Dynamics And Control Of Higher-Order Nonholonomic Systems, Jaime Rubio HerváS
Dynamics And Control Of Higher-Order Nonholonomic Systems, Jaime Rubio HerváS
Doctoral Dissertations and Master's Theses
A theoretical framework is established for the control of higher-order nonholonomic systems, defined as systems that satisfy higher-order nonintegrable constraints. A model for such systems is developed in terms of differential-algebraic equations defined on a higher-order tangent bundle. A number of control-theoretic properties such as nonintegrability, controllability, and stabilizability are presented. Higher-order nonholonomic systems are shown to be strongly accessible and, under certain conditions, small time locally controllable at any equilibrium. There are important examples of higher-order nonholonomic systems that are asymptotically stabilizable via smooth feedback, including space vehicles with multiple slosh modes and Prismatic-Prismatic-Revolute (PPR) robots moving open liquid …