Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Keyword
-
- Cathode material (5)
- Lithium-ion batteries (5)
- Lithium-ion battery (4)
- Particle swarm optimization (4)
- Anode (3)
-
- Cathode (3)
- Cathode materials (3)
- Computer Forensics (3)
- Digital forensics (3)
- Electrocatalysis (3)
- Formic acid oxidation (3)
- Lithium ion batteries (3)
- Oxygen reduction reaction (3)
- Supercapacitor (3)
- Tennessee State University (3)
- Adaptive control (2)
- Anode materials (2)
- Carbon nanotubes (2)
- Composite (2)
- Core-shell structure (2)
- Cyclic voltammetry (2)
- Digital evidence (2)
- Durability (2)
- Electrochemistry (2)
- Equalization (2)
- Evidence (2)
- Extended Kalman filter (2)
- FET modeling (2)
- Feature extraction (2)
- Feedback control (2)
Articles 211 - 222 of 222
Full-Text Articles in Physical Sciences and Mathematics
Book Review: System Forensics, Investigation, And Response, Nate Keith
Book Review: System Forensics, Investigation, And Response, Nate Keith
Journal of Digital Forensics, Security and Law
I recently expressed an interest to a respected colleague in finding a way to “give back” to the forensic community. He suggested writing a review for a text he recently received and provide feedback to the community. It is my intent to present an objective analysis of System Forensics, Investigation, and Response.
Column: Analysis Of Digital Traces, Fred Cohen
Column: Analysis Of Digital Traces, Fred Cohen
Journal of Digital Forensics, Security and Law
In part 1 of this series (Cohen, 2011a), Analysis of digital traces is a foundational process by which the examiner, typically using computer software tools, comes to understand and answer basic questions regarding digital traces.
On The Development Of A Digital Forensics Curriculum, Manghui Tu, Dianxiang Xu, Samsuddin Wira, Cristian Balan, Kyle Cronin
On The Development Of A Digital Forensics Curriculum, Manghui Tu, Dianxiang Xu, Samsuddin Wira, Cristian Balan, Kyle Cronin
Journal of Digital Forensics, Security and Law
Computer Crime and computer related incidents continue their prevalence and frequency, resulting in losses approaching billions of dollars. To fight against these crimes and frauds, it is urgent to develop digital forensics education programs to train a suitable workforce that can effectively investigate computer crimes and incidents. There is presently no standard to guide the design of digital forensics curriculum for an academic program. In this research, previous work on digital forensics curriculum design and existing education programs are thoroughly investigated. Both digital forensics educators and practitioners were surveyed and results were analyzed to determine the industry and law enforcement …
Book Review: Dispute Resolution And E-Discovery, Milton Luoma
Book Review: Dispute Resolution And E-Discovery, Milton Luoma
Journal of Digital Forensics, Security and Law
As is apparent from its title, this book tackles two very current and difficult legal issues – electronic discovery and dispute resolution. The authors tie the two legal concepts together in an effort to provide litigants and practitioners a less expensive and less time consuming alternative than is typically the case with traditional litigation and court proceedings. By including electronic discovery in the discussions, the authors recognize the importance and significance of electronic discovery in mediation and arbitration as it is in traditional litigation.
Table Of Contents
Journal of Digital Forensics, Security and Law
No abstract provided.
The Science Of Digital Forensics: Recovery Of Data From Overwritten Areas Of Magnetic Media, Fred Cohen
The Science Of Digital Forensics: Recovery Of Data From Overwritten Areas Of Magnetic Media, Fred Cohen
Journal of Digital Forensics, Security and Law
The first time I encountered data loss and recovery effects of magnetic memory was as a night and weekend computer operator for the computer science department of Carnegie-Mellon University in the 1973-1974 time frame. Part of my job involved dealing directly with outages and failures associated with magnetic memory components used in what, at the time, were large computer systems. On occasions, portions of magnetic core memory or disk drives would encounter various failure modes and the systems using these devices would have to be reconfigured to operate without the failed components until repair personnel could come in to repair …
“Preemptive Suppression” – Judges Claim The Right To Find Digital Evidence Inadmissible Before It Is Even Discovered, Bob Simpson
“Preemptive Suppression” – Judges Claim The Right To Find Digital Evidence Inadmissible Before It Is Even Discovered, Bob Simpson
Journal of Digital Forensics, Security and Law
Vermont state prosecutors have asked the Vermont Supreme Court to end a state trial judge’s practice of attaching conditions to computer warrants. The Vermont judge’s conditions are drawn from five conditions established in the 2009 decision of the 9th Circuit Court of Appeals in the Comprehensive Drug Testing, Inc. case (CDT II). This is the first time the validity of the “CDT conditions” will be decided by a state court of final jurisdiction in the United States
An Australian Perspective On The Challenges For Computer And Network Security For Novice Endusers, Patryk Szewczyk
An Australian Perspective On The Challenges For Computer And Network Security For Novice Endusers, Patryk Szewczyk
Journal of Digital Forensics, Security and Law
It is common for end-users to have difficulty in using computer or network security appropriately and thus have often been ridiculed when misinterpreting instructions or procedures. This discussion paper details the outcomes of research undertaken over the past six years on why security is overly complex for endusers. The results indicate that multiple issues may render end-users vulnerable to security threats and that there is no single solution to address these problems. Studies on a small group of senior citizens has shown that educational seminars can be beneficial in ensuring that simple security aspects are understood and used appropriately.
Forensic Evidence Identification And Modeling For Attacks Against A Simulated Online Business Information System, Manghui Tu, Dianxiang Xu, Eugene Butler, Amanda Schwartz
Forensic Evidence Identification And Modeling For Attacks Against A Simulated Online Business Information System, Manghui Tu, Dianxiang Xu, Eugene Butler, Amanda Schwartz
Journal of Digital Forensics, Security and Law
Forensic readiness of business information systems can support future forensics investigation or auditing on external/internal attacks, internal sabotage and espionage, and business fraud. To establish forensics readiness, it is essential for an organization to identify which fingerprints are relevant and where they can be located, to determine whether they are logged in a forensically sound way and whether all the needed fingerprints are available to reconstruct the events successfully. Also, a fingerprint identification and locating mechanism should be provided to guide potential forensics investigation in the future. Furthermore, mechanisms should be established to automate the security incident tracking and reconstruction …
Implementing The Automated Phases Of The Partially-Automated Digital Triage Process Model, Gary Cantrell, David A. Dampier
Implementing The Automated Phases Of The Partially-Automated Digital Triage Process Model, Gary Cantrell, David A. Dampier
Journal of Digital Forensics, Security and Law
Digital triage is a pre-digital-forensic phase that sometimes takes place as a way of gathering quick intelligence. Although effort has been undertaken to model the digital forensics process, little has been done to-date to model digital triage. This work discusses the further development of a model that attempts to address digital triage, the Partially-automated Crime Specific Digital Triage Process model. The model itself will be presented along with a description of how its automated functionality was implemented to facilitate model testing.
Technology Corner: A Regular Expression Training App, Nick V. Flor
Technology Corner: A Regular Expression Training App, Nick V. Flor
Journal of Digital Forensics, Security and Law
Regular expressions enable digital forensic analysts to find information in files. The best way for an analyst to become proficient in writing regular expressions is to practice. This paper presents the code for an app that allows an analyst to practice writing regular expressions.
Table Of Contents
Journal of Digital Forensics, Security and Law
No abstract provided.