Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Engineering

Embry-Riddle Aeronautical University

Keyword
Publication Year
Publication
Publication Type

Articles 1 - 30 of 515

Full-Text Articles in Law

Going Airborne: Kent State's Pioneering Leap Into Integrated Advanced Air Mobility, Jason T. Lorenzon Feb 2024

Going Airborne: Kent State's Pioneering Leap Into Integrated Advanced Air Mobility, Jason T. Lorenzon

National Training Aircraft Symposium (NTAS)

This proposal centers on the development of a Concept of Operations in Advanced Air Mobility (AAM). Kent State University's College of Aeronautics and Engineering is poised to pioneer the integration of drones and electric Vertical Takeoff and Landing (eVTOL) systems, bridging the gap between its campus and airport by transporting students and faculty the 3NM distance from campus to the airport and back by a UAV. Beyond a standard research initiative, this proposal signifies a groundbreaking effort to reshape the landscape of educational aeronautics and Advanced Air Mobility and Urban Air Mobility. Our overarching goal is to transcend conventional boundaries …


An Ml Based Digital Forensics Software For Triage Analysis Through Face Recognition, Gaurav Gogia, Parag H. Rughani Jul 2023

An Ml Based Digital Forensics Software For Triage Analysis Through Face Recognition, Gaurav Gogia, Parag H. Rughani

Journal of Digital Forensics, Security and Law

Since the past few years, the complexity and heterogeneity of digital crimes has increased exponentially, which has made the digital evidence & digital forensics paramount for both criminal investigation and civil litigation cases. Some of the routine digital forensic analysis tasks are cumbersome and can increase the number of pending cases especially when there is a shortage of domain experts. While the work is not very complex, the sheer scale can be taxing. With the current scenarios and future predictions, crimes are only going to become more complex and the precedent of collecting and examining digital evidence is only going …


The Exigency And How To Improve And Implement International Humanitarian Legislations More Advantageously In Times Of Both Cyber-Warfare And Cyberspace, Shawn J. Lalman Apr 2023

The Exigency And How To Improve And Implement International Humanitarian Legislations More Advantageously In Times Of Both Cyber-Warfare And Cyberspace, Shawn J. Lalman

Doctoral Dissertations and Master's Theses

This study provides a synopsis of the following topics: the prospective limiters levied on cyber-warfare by present–day international legislation; significant complexities and contentions brought up in the rendering & utilization of International Humanitarian Legislation against cyber-warfare; feasible repercussions of cyber-warfare on humanitarian causes. It is also to be contended and outlined in this research study that non–state actors can be held accountable for breaches of international humanitarian legislation committed using cyber–ordnance if sufficient resources and skill are made available. It details the factors that prosecutors and investigators must take into account when organizing investigations into major breaches of humanitarian legislation …


Ground Risk Model For Uavs, Andrew V. Shelley Jan 2023

Ground Risk Model For Uavs, Andrew V. Shelley

International Journal of Aviation, Aeronautics, and Aerospace

This paper develops an alternative to the ground risk model provided by JARUS SORA. Key inconsistencies in the SORA ground risk model are identified, specifically ground risk continuing to increase when there is no further increase in fatality probability.

Population density is a critical component of UAS ground risk. Definitions of population density adopted by various regulatory jurisdictions are reviewed. A categorisation of population density is developed based on official statistics categories for New Zealand. This categorisation is more granular than that provided by SORA, enabling a more nuanced assessment of risk.

A ground risk model is then developed using …


Pre-Check Security Processes In Selected Brazil Airports- Changes And Gains, Camila Miliani, Fabio Sanches, Jonatta Haniere, Rodrigo Cortes, Tais Gargano, Vanessa Reis Dec 2022

Pre-Check Security Processes In Selected Brazil Airports- Changes And Gains, Camila Miliani, Fabio Sanches, Jonatta Haniere, Rodrigo Cortes, Tais Gargano, Vanessa Reis

Student Works

The recommendation of this Research Project is to implement the precheck program at 10 Airports in Brazil with more than 5 million passengers a year. The passengers’ satisfaction, security improvement and OPEX savings would be a reality.

The expectation of OPEX savings at these 10 Airports are R$ 3.360.000,00 per year, (US$ 634.000,00) due to the possibility of using the current infrastructure and yet, reduce one Protection Agent per inspection module, per airport.

The research topic was to understand the feasibility of implementing the precheck security process in Brazil Airports. Using the U.S. benchmark, and the current Brazilian legislation, GYN …


Certification Basis For A Fully Autonomous Uncrewed Passenger Carrying Urban Air Mobility Aircraft, Steve Price Dec 2022

Certification Basis For A Fully Autonomous Uncrewed Passenger Carrying Urban Air Mobility Aircraft, Steve Price

Student Works

The Urban Air Mobility campaign has set a goal to efficiently transport passengers and cargo in urban areas of operation with autonomous aircraft. This concept of operations will require aircraft to utilize technology that currently does not have clear regulatory requirements. This report contains a comprehensive analysis and creation of a certification basis for a fully autonomous uncrewed passenger carrying rotorcraft for use in Urban Air Mobility certified under Title 14 Code of Federal Regulations Part 27. Part 27 was first analyzed to determine the applicability of current regulations. The fully electric propulsion system and fully autonomous flight control system …


An Evaluation Framework For Digital Image Forensics Tools, Zainab Khalid, Sana Qadir Oct 2022

An Evaluation Framework For Digital Image Forensics Tools, Zainab Khalid, Sana Qadir

Journal of Digital Forensics, Security and Law

The boom of digital cameras, photography, and social media has drastically changed how humans live their day-to-day, but this normalization is accompanied by malicious agents finding new ways to forge and tamper with images for unlawful monetary (or other) gains. Disinformation in the photographic media realm is an urgent threat. The availability of a myriad of image editing tools renders it almost impossible to differentiate between photo-realistic and original images. The tools available for image forensics require a standard framework against which they can be evaluated. Such a standard framework can aid in evaluating the suitability of an image forensics …


Uas For Public Safety: Active Threat Recognition, Joseph Cerreta, Tray Denney, Scott S. Burgess, Anthony Galante, David Thirtyacre, Gloria A. Wilson, Patrick Sherman Jan 2022

Uas For Public Safety: Active Threat Recognition, Joseph Cerreta, Tray Denney, Scott S. Burgess, Anthony Galante, David Thirtyacre, Gloria A. Wilson, Patrick Sherman

International Journal of Aviation, Aeronautics, and Aerospace

The Center for Homeland Defense and Security identified an increase of active threat events, such as mass shootings, annually since 1999. Literature suggests that 90% of shootings were over before law enforcement arrived at the scene and the first responder response was limited to “surround and contain” until Special Weapons and Tactics Teams (SWAT) arrived on the scene. Using Unmanned Aircraft Systems (UAS) to detect which individual was the threat and type of weapon used can provide useful information to increase the speed of the response for first-on-scene rather than waiting for SWAT if the type of weapon was known. …


Anthropometry Considerations In The Design And Evaluation Of Flight Deck Displays And Controls: Literature Review, Robert Joslin Jan 2022

Anthropometry Considerations In The Design And Evaluation Of Flight Deck Displays And Controls: Literature Review, Robert Joslin

International Journal of Aviation, Aeronautics, and Aerospace

The regulatory requirements and guidance for showing compliance with the Federal Aviation Administration anthropometric considerations in aircraft design are widely dispersed in an array of source documents. Consequently, they are difficult for aircraft manufacturers/applicants to identify, interpret, and address thereby extending the time to certify new/modified aircraft and aircraft systems. This literature review is intended to provide a compendium of the anthropometry considerations in the design certification of displays and controls in aircraft flight decks. This document is not a compliance document and the references herein are frequently updated, hence should be verified by the reader.


The Amorphous Nature Of Hackers: An Exploratory Study, Kento Yasuhara, Daniel Walnycky, Ibrahim Baggili, Ahmed Alhishwan Jan 2022

The Amorphous Nature Of Hackers: An Exploratory Study, Kento Yasuhara, Daniel Walnycky, Ibrahim Baggili, Ahmed Alhishwan

Annual ADFSL Conference on Digital Forensics, Security and Law

In this work, we aim to better understand outsider perspectives of the hacker community through a series of situation based survey questions. By doing this, we hope to gain insight into the overall reputation of hackers from participants in a wide range of technical and non-technical backgrounds. This is important to digital forensics since convicted hackers will be tried by people, each with their own perception of who hackers are. Do cyber crimes and national security issues negatively affect people’s perceptions of hackers? Does hacktivism and information warfare positively affect people’s perception of hackers? Do individual personality factors affect one’s …


Human-Controlled Fuzzing With Afl, Maxim Grishin, Igor Korkin, Phd Jan 2022

Human-Controlled Fuzzing With Afl, Maxim Grishin, Igor Korkin, Phd

Annual ADFSL Conference on Digital Forensics, Security and Law

Fuzzing techniques are applied to reveal different types of bugs and vulnerabilities. American Fuzzy Lop (AFL) is a free most popular software fuzzer used by many other fuzzing frameworks. AFL supports autonomous mode of operation that uses the previous step output into the next step, as a result fuzzer spends a lot of time analyzing minor code sections. By making fuzzing process more focused and human controlled security expert can save time and find more bugs in less time. We designed a new module that can fuzz only the specified functions. As a result, the chosen ones will be inspected …


Timestamp Estimation From Outdoor Scenes, Tawfiq Salem, Jisoo Hwang, Rafael Padilha Jan 2022

Timestamp Estimation From Outdoor Scenes, Tawfiq Salem, Jisoo Hwang, Rafael Padilha

Annual ADFSL Conference on Digital Forensics, Security and Law

The increasing availability of smartphones allowed people to easily capture and share images on the internet. These images are often associated with metadata, including the image capture time (timestamp) and the location where the image was captured (geolocation). The metadata associated with images provides valuable information to better understand scenes and events presented in these images. The timestamp can be manipulated intentionally to provide false information to convey a twisted version of reality. Images with manipulated timestamps are often used as a cover-up for wrongdoing or broadcasting false claims and competing views on the internet. Estimating the time of capture …


Digital Forensics For Mobility As A Service Platform: Analysis Of Uber Application On Iphone And Cloud, Nina Matulis, Umit Karabiyik Jan 2022

Digital Forensics For Mobility As A Service Platform: Analysis Of Uber Application On Iphone And Cloud, Nina Matulis, Umit Karabiyik

Annual ADFSL Conference on Digital Forensics, Security and Law

Uber is a ride-hailing smartphone application (app) that allows users to order a ride in a highly efficient manner. The Uber app provides Mobility as a Service and allows users to easily order a ride in a private car with just a few clicks. Uber stores large amounts of data on both the mobile device the app is being used on, and in the cloud. Examples of this data include geolocation data, date/time, origin/destination addresses, departure/arrival times, and distance. Uber geolocation data has been previously researched to investigate the privacy of the Uber app; however, there is minimal research relating …


Microsoft Defender Will Be Defended: Memoryranger Prevents Blinding Windows Av, Denis Pogonin, Igor Korkin, Phd Jan 2022

Microsoft Defender Will Be Defended: Memoryranger Prevents Blinding Windows Av, Denis Pogonin, Igor Korkin, Phd

Annual ADFSL Conference on Digital Forensics, Security and Law

Windows OS is facing a huge rise in kernel attacks. An overview of popular techniques that result in loading kernel drivers will be presented. One of the key targets of modern threats is disabling and blinding Microsoft Defender, a default Windows AV. The analysis of recent driver-based attacks will be given, the challenge is to block them. The survey of user- and kernel-level attacks on Microsoft Defender will be given. One of the recently published attackers’ techniques abuses Mandatory Integrity Control (MIC) and Security Reference Monitor (SRM) by modifying Integrity Level and Debug Privileges for the Microsoft Defender via syscalls. …


Smart Home Forensics: Identifying Ddos Attack Patterns On Iot Devices, Samuel Ho, Hope Greeson, Umit Karabiyik Jan 2022

Smart Home Forensics: Identifying Ddos Attack Patterns On Iot Devices, Samuel Ho, Hope Greeson, Umit Karabiyik

Annual ADFSL Conference on Digital Forensics, Security and Law

Smart homes are becoming more common as more people integrate IoT devices into their home environment. As such, these devices have access to personal data on their homeowners’ networks. One of the advantages of IoT devices is that they are compact. However, this limits the incorporation of security measures in their hardware. Misconfigured IoT devices are commonly the target of malicious attacks. Additionally, distributed denial-of-service attacks are becoming more common due to applications and software that provides users with easy-to-use user interfaces. Since one vulnerable device is all an attacker needs to launch an attack on a network, in regards …


A Lightweight Reliably Quantified Deepfake Detection Approach, Tianyi Wang, Kam Pui Chow Jan 2022

A Lightweight Reliably Quantified Deepfake Detection Approach, Tianyi Wang, Kam Pui Chow

Annual ADFSL Conference on Digital Forensics, Security and Law

Deepfake has brought huge threats to society such that everyone can become a potential victim. Current Deepfake detection approaches have unsatisfactory performance in either accuracy or efficiency. Meanwhile, most models are only evaluated on different benchmark test datasets with different accuracies, which could not imitate the real-life Deepfake unknown population. As Deepfake cases have already been raised and brought challenges at the court, it is disappointed that no existing work has studied the model reliability and attempted to make the detection model act as the evidence at the court. We propose a lightweight Deepfake detection deep learning approach using the …


Detection Of Overlapping Passive Manipulation Techniques In Image Forensics, Gianna S. Lint, Umit Karabiyik Jan 2022

Detection Of Overlapping Passive Manipulation Techniques In Image Forensics, Gianna S. Lint, Umit Karabiyik

Annual ADFSL Conference on Digital Forensics, Security and Law

With a growing number of images uploaded daily to social media sites, it is essential to understand if an image can be used to trace its origin. Forensic investigations are focusing on analyzing images that are uploaded to social media sites resulting in an emphasis on building and validating tools. There has been a strong focus on understanding active manipulation or tampering techniques and building tools for analysis. However, research on manipulation is often studied in a vacuum, involving only one technique at a time. Additionally, less focus has been placed on passive manipulation, which can occur by simply uploading …


Anatomy Of An Internet Hijack And Interception Attack: A Global And Educational Perspective, Ben A. Scott, Michael N. Johnstone, Patryk Szewczyk Jan 2022

Anatomy Of An Internet Hijack And Interception Attack: A Global And Educational Perspective, Ben A. Scott, Michael N. Johnstone, Patryk Szewczyk

Annual ADFSL Conference on Digital Forensics, Security and Law

The Internet’s underlying vulnerable protocol infrastructure is a rich target for cyber crime, cyber espionage and cyber warfare operations. The stability and security of the Internet infrastructure are important to the function of global matters of state, critical infrastructure, global e-commerce and election systems. There are global approaches to tackle Internet security challenges that include governance, law, educational and technical perspectives. This paper reviews a number of approaches to these challenges, the increasingly surgical attacks that target the underlying vulnerable protocol infrastructure of the Internet, and the extant cyber security education curricula; we find the majority of predominant cyber security …


A Low-Cost Machine Learning Based Network Intrusion Detection System With Data Privacy Preservation, Jyoti Fakirah, Lauhim Mahfuz Zishan, Roshni Mooruth, Michael L. Johnstone, Wencheng Yang Jan 2022

A Low-Cost Machine Learning Based Network Intrusion Detection System With Data Privacy Preservation, Jyoti Fakirah, Lauhim Mahfuz Zishan, Roshni Mooruth, Michael L. Johnstone, Wencheng Yang

Annual ADFSL Conference on Digital Forensics, Security and Law

Network intrusion is a well-studied area of cyber security. Current machine learning-based network intrusion detection systems (NIDSs) monitor network data and the patterns within those data but at the cost of presenting significant issues in terms of privacy violations which may threaten end-user privacy. Therefore, to mitigate risk and preserve a balance between security and privacy, it is imperative to protect user privacy with respect to intrusion data. Moreover, cost is a driver of a machine learning-based NIDS because such systems are increasingly being deployed on resource-limited edge devices. To solve these issues, in this paper we propose a NIDS …


Don't Bite The Bait: Phishing Attack For Internet Banking (E-Banking), Ilker Kara Nov 2021

Don't Bite The Bait: Phishing Attack For Internet Banking (E-Banking), Ilker Kara

Journal of Digital Forensics, Security and Law

Phishing attacks are based on obtaining desired information from users quickly and easily with the help of misdirecting, panicking, curiosity, or excitement. Most of the phishing web sites are designed on internet banking(e-banking) and the attackers can acquire financial information of misled users with the tactics and discourses they develop. Despite the increase of prevention techniques against phishing attacks day by day, an effective solution could not be found for this issue due to the human factor. Because of this reason, real phishing attack studies are essential to study and analyze the attackers’ attack techniques and strategies. This study focused …


The Potential Impact Of A Voluntary Non-Punitive Self Report Program Under The Scope Of The Brazilian Civil Aviation Authority, Audrey Gonzalez, Bráullio Amaral, Felipe Piton, Laércio De Araujo, Marcelo Marcusso Nov 2021

The Potential Impact Of A Voluntary Non-Punitive Self Report Program Under The Scope Of The Brazilian Civil Aviation Authority, Audrey Gonzalez, Bráullio Amaral, Felipe Piton, Laércio De Araujo, Marcelo Marcusso

Student Works

The key recommendation from this study is to purpose the Brazilian National Civil Aviation Authority evaluation over the implementation of a new voluntary and non-punitive safety reporting program, with a different scope from the current one. The voluntary self-reporting programs in place in the USA, Europe and Australia should be used as a regulatory reference and the program development and implementation should be executed in close coordination with the different industry stakeholders.

To access if the current Brazilian State Safety reporting system meets ICAO requirements, the researchers accessed pertinent aviation safety regulatory legislation. Additionally, to access if the current Brazilian …


An Economical Method For Securely Disintegrating Solid-State Drives Using Blenders, Brandon J. Hopkins Phd, Kevin A. Riggle Jul 2021

An Economical Method For Securely Disintegrating Solid-State Drives Using Blenders, Brandon J. Hopkins Phd, Kevin A. Riggle

Journal of Digital Forensics, Security and Law

Pulverizing solid-state drives (SSDs) down to particles no larger than 2 mm is required by the United States National Security Agency (NSA) to ensure the highest level of data security, but commercial disintegrators that achieve this standard are large, heavy, costly, and often difficult to access globally. Here, we present a portable, inexpensive, and accessible method of pulverizing SSDs using a household blender and other readily available materials. We verify this approach by pulverizing SSDs with a variety of household blenders for fixed periods of time and sieve the resulting powder to ensure appropriate particle size. Among the 6 household …


Can The Timeframe Of Reported Uas Sightings Help Regulators?, Spencer Erik Pitcher, Kelly A. Whealan-George Jan 2021

Can The Timeframe Of Reported Uas Sightings Help Regulators?, Spencer Erik Pitcher, Kelly A. Whealan-George

Beyond: Undergraduate Research Journal

Remotely controlled small aircraft, otherwise known as Unmanned Aircraft Systems (UAS) or drones have started to impact the United States National Airspace System by interfering with the safe flight of aircraft. As the UAS industry continues its expected growth into the future, lawmakers, as well as regulators at the Federal Aviation Administration (FAA) and the aviation community must be able to predict when there will be more UAS craft in the air that could cause an interruption to air traffic so that more resources can be allocated optimally to counter the threat of UAS craft. The purpose of this study …


Aircraft Rescue And Fire Fighting Capabilities: Are Today’S Standards Protecting Passenger’S Futures?, Kaetlyn Blocker May 2020

Aircraft Rescue And Fire Fighting Capabilities: Are Today’S Standards Protecting Passenger’S Futures?, Kaetlyn Blocker

Student Works

Few studies have been conducted that have truly considered the relevance and inadequacies of applicable aircraft rescue and firefighting (ARFF) regulations. Fewer still have studied and explored accident cases that directly exemplify the deficiencies and inconsistencies of various regulatory standards and requirements. This study seeks to expose and explain those inadequacies by utilizing a historical, case-study type research method to examine accident cases during which time the governing regulations played a significant role in the ARFF operations. The findings discovered as a result of this multi-case analysis provide evidence that the current regulations governing United States ARFF operations are both …


Analysis Of Crashes Involving First Responder Vehicles, Josie Gray Mar 2020

Analysis Of Crashes Involving First Responder Vehicles, Josie Gray

Doctoral Dissertations and Master's Theses

First responders face many hazards that put their lives at risk while on duty. A review of the National Law Enforcement Officers Memorial Fund statistics shows that 553 police officers died in the line-of-duty between 2008 and 2017 as a direct result of a traffic related incidents. Sadly, the nation’s first responders are exposed to factors which make them uniquely vulnerable to traffic related injuries and deaths. The goal of this research is to investigate and analyze crashes involving first responder vehicles and struck-by crashes. This project concludes that approximately 1.2% of the crashes in the state of Florida involve …


Uas For Public Safety Operations: A Comparison Of Uas Point Clouds To Terrestrial Lidar Point Cloud Data Using A Faro Scanner, Joseph S. Cerreta, Scott S. Burgess, Jeremy Coleman Jan 2020

Uas For Public Safety Operations: A Comparison Of Uas Point Clouds To Terrestrial Lidar Point Cloud Data Using A Faro Scanner, Joseph S. Cerreta, Scott S. Burgess, Jeremy Coleman

International Journal of Aviation, Aeronautics, and Aerospace

Unmanned Aircraft Systems (UAS) can be useful tools for public safety agencies during crime or vehicle accident scene investigations if it can provide value to the resource-constrained agency. The speed of data collection, while minimizing first responder risk, while sustaining an acceptable level of accuracy and precision compared to other tools is where the agency may find value. During a recent homicide investigation in Florida, a UAS provided saved 81% in law enforcement labor hours with an acceptable level of accuracy compared to traditional methods. The purpose of this research was to compare UAS to determine if there were differences …


Efficient Privacy-Aware Imagery Data Analysis, Yifan Tian Nov 2019

Efficient Privacy-Aware Imagery Data Analysis, Yifan Tian

Doctoral Dissertations and Master's Theses

The widespread use of smartphones and camera-coupled Internet of Thing (IoT) devices triggers an explosive growth of imagery data. To extract and process the rich contents contained in imagery data, various image analysis techniques have been investigated and applied to a spectrum of application scenarios. In recent years, breakthroughs in deep learning have powered a new revolution for image analysis in terms of effectiveness with high resource consumption. Given the fact that most smartphones and IoT devices have limited computational capability and battery life, they are not ready for the processing of computational intensive analytics over imagery data collected by …


Forensic Analysis Of Spy Applications In Android Devices, Shinelle Hutchinson, Umit Karabiyik May 2019

Forensic Analysis Of Spy Applications In Android Devices, Shinelle Hutchinson, Umit Karabiyik

Annual ADFSL Conference on Digital Forensics, Security and Law

Smartphones with Google's Android operating system are becoming more and more popular each year, and with this increased user base, comes increased opportunities to collect more of these users' private data. There have been several instances of malware being made available via the Google Play Store, which is one of the predominant means for users to download applications. One effective way of collecting users' private data is by using Android Spyware. In this paper, we conduct a forensic analysis of a malicious Android spyware application and present our findings. We also highlight what information the application accesses and what it …


Nanosat Tracking And Identification Techniques And Technologies, Mark A. Skinner Feb 2019

Nanosat Tracking And Identification Techniques And Technologies, Mark A. Skinner

Space Traffic Management Conference

Nanosats (and CubeSats, ‘Smallsats’, etc.) are of order 10 cm in size, and are at or near the limits of what can be tracked and characterized, using existing space surveillance assets. Additionally, given the CubeSat form-factor, they are often launched in large numbers (scores), and can be virtually identical. Thus are they difficult to track and to identify.

We have identified a number of technologies that future nanosat missions could employ that would enhance the trackability and/or identification of their satellites when on-orbit. Some of these technologies require active illumination of the satellite with electromagnetic energy, either in the radio …


Stem And Sustainability: Creating Aviation Professional Change Agents, P. Clark, Doreen Mcgunagle, L. Zizka Jan 2019

Stem And Sustainability: Creating Aviation Professional Change Agents, P. Clark, Doreen Mcgunagle, L. Zizka

Publications

With the evolution of the workforce and the growing needs of the aviation industry, a clear need for concrete sustainability initiatives and actions have emerged. Sustainability in this sense becomes a matter of survival. For this reason, in this chapter, we will attempt to close three gaps in current sustainability studies: Theory vs practice, intention vs behavior, and education vs workplace.

Our purpose is to develop a ‘simple’ strategy for integrating all three pillars of sustainability into STEM HE programs that create authentic engagement and real buy-in from the students that are then replicated in the workplace. Based on the …