Open Access. Powered by Scholars. Published by Universities.®
![Digital Commons Network](http://assets.bepress.com/20200205/img/dcn/DCsunburst.png)
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Keyword
-
- Computer Forensics (3)
- Digital forensics (3)
- Digital evidence (2)
- Evidence (2)
- Human rights (2)
-
- Sources (2)
- 516 U.S. 233 (1)
- ACPO (1)
- ACR (1)
- ADSL routers (1)
- Admissibility (1)
- Android (1)
- Article 3(9) (1)
- Article 72 (1)
- Article 73 (1)
- Article 75 (1)
- Attribution (1)
- Automatic Crash Recovery (1)
- Baidu (1)
- Berne Convention for the Protection of Literary and Artistic Works (1)
- BitMatch (1)
- Bob Stembridge (1)
- Browsing history (1)
- Bytecode (1)
- Charles L. Mauro (1)
- Chinese Copyright Law (1)
- Cloud Computing (1)
- Cloud computing (1)
- CodeMatch (1)
- CodeSuite (1)
Articles 1 - 30 of 53
Full-Text Articles in Physical Sciences and Mathematics
Analysis Of Crime Data Using Principal Component Analysis: A Case Study Of Katsina State, Shehu U. Gulumbe, Dikko H. .G., Bello Yusuf
Analysis Of Crime Data Using Principal Component Analysis: A Case Study Of Katsina State, Shehu U. Gulumbe, Dikko H. .G., Bello Yusuf
CBN Journal of Applied Statistics (JAS)
This paper analyses Katsina State crime data which consists of the averages of eight major crimes reported to the police for the period 2006 – 2008. The crimes consist of robbery, auto theft, house and store breakings, theft/stealing, grievous hurt and wounding, murder, rape, and assault. Correlation analysis and principal component analysis (PCA) were employed to explain the correlation between the crimes and to determine the distribution of the crimes over the local government areas of the state. The result has shown a significant correlation between robbery, theft and vehicle theft. While MSW local government area has the lowest crime …
Red, White, And Green: A Federal Sustainability Vision For The National Capital, L. Preston Bryant Jr.
Red, White, And Green: A Federal Sustainability Vision For The National Capital, L. Preston Bryant Jr.
William & Mary Environmental Law and Policy Review
No abstract provided.
Why Copyright Falls Behind The Requirement For Protecting Graphic User Interfaces: Case Studies On Limitations Of Copyright Protection For Guis In China, Ling Jin, Yihong Ying
Why Copyright Falls Behind The Requirement For Protecting Graphic User Interfaces: Case Studies On Limitations Of Copyright Protection For Guis In China, Ling Jin, Yihong Ying
IP Theory
No abstract provided.
“Advancing With The Times: Industrial Design Protection In The Era Of Virtual Migration”, Horacio E. Gutiérrez
“Advancing With The Times: Industrial Design Protection In The Era Of Virtual Migration”, Horacio E. Gutiérrez
IP Theory
No abstract provided.
Identifying And Attributing Similar Traces With Greatest Common Factor Analysis, Fred Cohen
Identifying And Attributing Similar Traces With Greatest Common Factor Analysis, Fred Cohen
Journal of Digital Forensics, Security and Law
This paper presents an algorithm for comparing large numbers of traces to each other and identifying and presenting groups of traces with similar features. It is applied to forensic analysis in which groups of similar traces are automatically identified and presented so that attribution and other related claims may be asserted, and independently confirmed or refuted. The approach of this paper is to identify an approximate algorithm that will find a large subset of greatest common factor similar groups of arbitrary factors in far less time and space than an exact algorithm using examiner-provided selection criteria for factor definition.
Gray Wolf Rising: Why The Clash Over Wolf Management In The Northern Rockies Calls For Congressional Action To Define "Recovery" Under The Endangered Species Act, W. Ryan Stephens
Gray Wolf Rising: Why The Clash Over Wolf Management In The Northern Rockies Calls For Congressional Action To Define "Recovery" Under The Endangered Species Act, W. Ryan Stephens
William & Mary Environmental Law and Policy Review
No abstract provided.
Table Of Contents
Journal of Digital Forensics, Security and Law
No abstract provided.
The European Union Emission Trading Scheme, Marco Piovan
The European Union Emission Trading Scheme, Marco Piovan
Claremont-UC Undergraduate Research Conference on the European Union
No abstract provided.
Measuring Human Rights: A Review Essay, David L. Richards
Measuring Human Rights: A Review Essay, David L. Richards
Human Rights & Human Welfare
A review of:
Measuring Human Rights. By Todd Landman & Edzia Carvalho. New York, NY: Routledge, 2010. 163pp.
Pandora’S Email Box? An Exploratory Study Of Web-Based Email Forgery Detection And Validation., Richard Boddington, Grant Boxall, Jeremy Ardley
Pandora’S Email Box? An Exploratory Study Of Web-Based Email Forgery Detection And Validation., Richard Boddington, Grant Boxall, Jeremy Ardley
Journal of Digital Forensics, Security and Law
Web based email systems may be a source of pristine digital evidence because of the perceived difficulty of client tampering with messages stored inside the email account. We demonstrate that such assumption is wrong in the case of Windows Live Hotmail®1 . Windows Live Mail®1 synchronises message on client-side computers with the Hotmail® server, benefiting users wishing to synchronise their email accounts and personal devices. However, this synchronisation opens an exploit for wrongdoers to tamper with existing email messages and attachments as well as facilitating the insertion of fabricated messages. The exploit process enables persistent storage of tampered and fabricated …
Technology Corner: Dating Of Electronic Hardware For Prior Art Investigations, Sellam Ismail
Technology Corner: Dating Of Electronic Hardware For Prior Art Investigations, Sellam Ismail
Journal of Digital Forensics, Security and Law
In many legal matters, specifically patent litigation, determining and authenticating the date of computer hardware or other electronic products or components is often key to establishing the item as legitimate evidence of prior art. Such evidence can be used to buttress claims of technologies available or of events transpiring by or at a particular date.
Book Review: The Software Ip Detective's Handbook: Measurement, Comparison, And Infringement Detections, Diane Barrett
Book Review: The Software Ip Detective's Handbook: Measurement, Comparison, And Infringement Detections, Diane Barrett
Journal of Digital Forensics, Security and Law
Do not the book title fool you into thinking that the book is only for those looking to detect software infringement detection. It is a comprehensive look at software intellectual property. The book covers a wide range of topics and has something to offer for just about everyone from lawyers to programmers.
Automated Identification And Reconstruction Of Youtube Video Access, Jonathan Patterson, Christopher Hargreaves
Automated Identification And Reconstruction Of Youtube Video Access, Jonathan Patterson, Christopher Hargreaves
Journal of Digital Forensics, Security and Law
YouTube is one of the most popular video-sharing websites on the Internet, allowing users to upload, view and share videos with other users all over the world. YouTube contains many different types of videos, from homemade sketches to instructional and educational tutorials, and therefore attracts a wide variety of users with different interests. The majority of YouTube visits are perfectly innocent, but there may be circumstances where YouTube video access is related to a digital investigation, e.g. viewing instructional videos on how to perform potentially unlawful actions or how to make unlawful articles. When a user accesses a YouTube video …
Technology Corner Automated Data Extraction Using Facebook, Nick V. Flor
Technology Corner Automated Data Extraction Using Facebook, Nick V. Flor
Journal of Digital Forensics, Security and Law
Because of Facebook’s popularity, law enforcement agents often use it as a key source of evidence. But like many user digital trails, there can be a large amount of data to extract for analysis. In this paper, we explore the basics of extracting data programmatically from a user’s Facebook via a Web app. A data extraction app requests data using the Facebook Graph API, and Facebook returns a JSON object containing the data. Before an app can access a user’s Facebook data, the user must log into Facebook and give permission. Thus, this approach is limited to situations where users …
Automatic Crash Recovery: Internet Explorer's Black Box, John Moran, Douglas Orr
Automatic Crash Recovery: Internet Explorer's Black Box, John Moran, Douglas Orr
Journal of Digital Forensics, Security and Law
A good portion of today's investigations include, at least in part, an examination of the user's web history. Although it has lost ground over the past several years, Microsoft's Internet Explorer still accounts for a large portion of the web browser market share. Most users are now aware that Internet Explorer will save browsing history, user names, passwords and form history. Consequently some users seek to eliminate these artifacts, leaving behind less evidence for examiners to discover during investigations. However, most users, and probably a good portion of examiners are unaware Automatic Crash Recovery can leave a gold mine of …
To License Or Not To License Updated: An Examination Of State Statutes Regarding Private Investigators And Digital Examiners, Thomas Lonardo, Doug White, Alan Rea
To License Or Not To License Updated: An Examination Of State Statutes Regarding Private Investigators And Digital Examiners, Thomas Lonardo, Doug White, Alan Rea
Journal of Digital Forensics, Security and Law
In this update to the 2009 year's study, the authors examine statutes that regulate, license, and enforce investigative functions in each US state. After identification and review of Private Investigator licensing requirements, the authors find that very few state statutes explicitly differentiate between Private Investigators and Digital Examiners, but do see a trend of more states making some distinction. The authors contacted all state regulatory agencies where statutory language was not explicit, and as a result, set forth the various state approaches to professional Digital Examiner licensing. As was the case in the previous two iterations of this research, the …
Extraction Of Electronic Evidence From Voip: Identification & Analysis Of Digital Speech, David Irwin, Arek Dadej, Jill Slay
Extraction Of Electronic Evidence From Voip: Identification & Analysis Of Digital Speech, David Irwin, Arek Dadej, Jill Slay
Journal of Digital Forensics, Security and Law
The Voice over Internet Protocol (VoIP) is increasing in popularity as a cost effective and efficient means of making telephone calls via the Internet. However, VoIP may also be an attractive method of communication to criminals as their true identity may be hidden and voice and video communications are encrypted as they are deployed across the Internet. This produces a new set of challenges for forensic analysts compared with traditional wire-tapping of the Public Switched Telephone Network (PSTN) infrastructure, which is not applicable to VoIP. Therefore, other methods of recovering electronic evidence from VoIP are required. This research investigates the …
Book Review: Mastering Windows Network Forensics And Investigation, 2/E, John C. Ebert
Book Review: Mastering Windows Network Forensics And Investigation, 2/E, John C. Ebert
Journal of Digital Forensics, Security and Law
The book is available as a paperback and e-book. The e-book versions allow you to preview several chapters at any of a number of online vendors. The e-book prices vary from the same as the soft cover version ($59.99) to about $38.99. Some of the vendor's e-books retain the color illustrations found in the print version, but others produce them in grey scale, so you might want to look out for that. The book is divided into four parts (17 chapters) plus two appendices.
I am compelled to give the book illustrations a highly unfavorable assessment regarding their readability qualities. …
Table Of Contents
Journal of Digital Forensics, Security and Law
No abstract provided.