Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Embry-Riddle Aeronautical University

PDF

Journal

Discipline
Keyword
Publication Year
Publication

Articles 1 - 30 of 623

Full-Text Articles in Physical Sciences and Mathematics

Virtual Reality & Pilot Training: Existing Technologies, Challenges & Opportunities, Tim Marron M.S., Niall Dungan Bsc, Captain, Brian Mac Namee Phd, Anna Donnla O'Hagan Phd Jan 2024

Virtual Reality & Pilot Training: Existing Technologies, Challenges & Opportunities, Tim Marron M.S., Niall Dungan Bsc, Captain, Brian Mac Namee Phd, Anna Donnla O'Hagan Phd

Journal of Aviation/Aerospace Education & Research

The introduction of virtual reality (VR) to flying training has recently gained much attention, with numerous VR companies, such as Loft Dynamics and VRpilot, looking to enhance the training process. Such a considerable change to how pilots are trained is a subject that warrants careful consideration. Examining the effect that VR has on learning in other areas gives us an idea of how VR can be suitably applied to flying training. Some of the benefits offered by VR include increased safety, decreased costs, and increased environmental sustainability. Nevertheless, some challenges ahead for developers to consider are negative transfer of learning, …


Application Of Density Altitude Climatology To General Aviation Impacts, Thomas A. Guinn Ph.D., Daniel J. Halperin Ph.D., Sarah Strazzo Ph.D. Jan 2024

Application Of Density Altitude Climatology To General Aviation Impacts, Thomas A. Guinn Ph.D., Daniel J. Halperin Ph.D., Sarah Strazzo Ph.D.

Journal of Aviation/Aerospace Education & Research

Density altitude (DA) plays a key role in flight safety because it helps pilots anticipate poor aircraft performance when temperatures are warmer than standard. In this study, a 30-year climatology of DA for the conterminous United States was created using the fifth-generation European Centre for Medium-Range Weather Forecasts atmospheric reanalysis of the global climate (ERA5) dataset was applied to four separate DA-based, aircraft-performance, rules-of-thumb for general aviation (GA) flight. The goal was to demonstrate a technique to create educational visualization tools showing the variation of operational flight impacts with both month and location. Four such parameters were chosen to show …


A Quantitative Analysis Of Seaplane Accidents From 1982-2021, David C. Ison Jan 2024

A Quantitative Analysis Of Seaplane Accidents From 1982-2021, David C. Ison

International Journal of Aviation, Aeronautics, and Aerospace

This study aimed to assess and analyze all historical National Transportation Safety Board accident reports since 1982. For analysis, reports were bisected into seaplane (float, amphibian, and hull) and non-seaplane groups. Findings showed that there is a deficiency in the level of available detail on the seaplane fleet and cadre of seaplane pilots in the U.S. During the most recent ten years of complete data (2012-2021) showed a negative trend in all accidents and fatal accidents, although only the latter being statistically convincing. During this timeframe, seaplane accident pilots had significantly higher total time and age than other groups (non-seaplane …


Reu-Deim Classification Of Hispanic Voters In Hispanic Groups Using Name And Zip Code Data In Palm Beach, Florida, Kamila Soto-Ortiz Sep 2023

Reu-Deim Classification Of Hispanic Voters In Hispanic Groups Using Name And Zip Code Data In Palm Beach, Florida, Kamila Soto-Ortiz

Beyond: Undergraduate Research Journal

When it comes to registering to vote, Hispanic voters can only register as “Hispanic” in the “Race/Ethnicity” category, causing difficulties when analyzing voting trends amongst the Hispanic community. Upon the recent idea that not all Hispanic Groups vote the same, the goal is to create a model that can possibly identify a voter’s Hispanic Group with the information provided on the public Florida voter file. This is accomplished using name and zip code data for all voters in Palm Beach, Florida. This paper will explore the model implemented, its findings and limitations. Palm Beach, Florida, is met with low confidence …


An Ml Based Digital Forensics Software For Triage Analysis Through Face Recognition, Gaurav Gogia, Parag H. Rughani Jul 2023

An Ml Based Digital Forensics Software For Triage Analysis Through Face Recognition, Gaurav Gogia, Parag H. Rughani

Journal of Digital Forensics, Security and Law

Since the past few years, the complexity and heterogeneity of digital crimes has increased exponentially, which has made the digital evidence & digital forensics paramount for both criminal investigation and civil litigation cases. Some of the routine digital forensic analysis tasks are cumbersome and can increase the number of pending cases especially when there is a shortage of domain experts. While the work is not very complex, the sheer scale can be taxing. With the current scenarios and future predictions, crimes are only going to become more complex and the precedent of collecting and examining digital evidence is only going …


Stellar Atmosphere Models For Select Veritas Stellar Intensity Interferometry Targets, Jackson Ladd Sackrider, Jason P. Aufdenberg, Katelyn Sonnen Mar 2023

Stellar Atmosphere Models For Select Veritas Stellar Intensity Interferometry Targets, Jackson Ladd Sackrider, Jason P. Aufdenberg, Katelyn Sonnen

Beyond: Undergraduate Research Journal

Since 2020 the Very Energetic Radiation Imaging Telescope Array System (VERITAS) has observed 48 stellar targets using the technique of Stellar Intensity Interferometry (SII). Angular diameter measurements by VERITAS SII (VSII) in a waveband near 400 nm complement existing angular diameter measurements in the near-infrared. VSII observations will test fundamental predictions of stellar atmosphere models and should be more sensitive to limb darkening and gravity darkening effects than measurements in the near-IR, however, the magnitude of this difference has not been systematically explored in the literature. In order to investigate the synthetic interferometric (as well as spectroscopic) appearance of stars …


Aircraft Damage Classification By Using Machine Learning Methods, Tüzün Tolga İnan Jan 2023

Aircraft Damage Classification By Using Machine Learning Methods, Tüzün Tolga İnan

International Journal of Aviation, Aeronautics, and Aerospace

Safety is the most significant factor that affected incidents (non-fatal) and accidents (fatal) in civil aviation history related to scheduled flights. In the history of scheduled flights, the total incident and accident number until 2022 is 1988. In this study, 677 of them are taken into consideration since 11 September 2001. The purpose of this study is to reveal the factors that can classify type of aircraft damages such as none, minor and substantial in all-time incidents and accidents. ML algorithms with different configurations are applied for the classification process. The RFE and PCA are used to find the most …


Using Unmanned Aircraft Systems To Investigate The Detectability Of Burmese Pythons In South Florida, Joseph Cerreta Ph.D., William Austin Ed.D., David Thirtyacre Ph.D., Scott S. Burgess Ph.D., Peter Miller Jan 2023

Using Unmanned Aircraft Systems To Investigate The Detectability Of Burmese Pythons In South Florida, Joseph Cerreta Ph.D., William Austin Ed.D., David Thirtyacre Ph.D., Scott S. Burgess Ph.D., Peter Miller

Journal of Aviation/Aerospace Education & Research

Burmese pythons are an invasive, non-native species of snake to southern Florida and attempts at eradicating the snakes had yielded mixed results. The current rate of detection had been reported as 0.05%. The purpose of this research project was to determine if a UAS equipped with a near-infrared (NIR) camera could be used to detect pythons at a higher rate when compared to a RGB camera. The approach involved collecting 55 images from RGB and NIR cameras, over carcass pythons at flying heights of 3, 6, 9, 12, and 15 meters. A likelihood ratio consisting of a true positive rate …


A Deep Bilstm Machine Learning Method For Flight Delay Prediction Classification, Desmond B. Bisandu Phd, Irene Moulitsas Phd Jan 2023

A Deep Bilstm Machine Learning Method For Flight Delay Prediction Classification, Desmond B. Bisandu Phd, Irene Moulitsas Phd

Journal of Aviation/Aerospace Education & Research

This paper proposes a classification approach for flight delays using Bidirectional Long Short-Term Memory (BiLSTM) and Long Short-Term Memory (LSTM) models. Flight delays are a major issue in the airline industry, causing inconvenience to passengers and financial losses to airlines. The BiLSTM and LSTM models, powerful deep learning techniques, have shown promising results in a classification task. In this study, we collected a dataset from the United States (US) Bureau of Transportation Statistics (BTS) of flight on-time performance information and used it to train and test the BiLSTM and LSTM models. We set three criteria for selecting highly important features …


Accuracy Assessment Of The Ebee Using Rtk And Ppk Corrections Methods As A Function Of Distance To A Gnss Base Station, Joseph Cerreta, David Thirtyacre, Peter Miller, Scott S. Burgess, William J. Austin Jan 2023

Accuracy Assessment Of The Ebee Using Rtk And Ppk Corrections Methods As A Function Of Distance To A Gnss Base Station, Joseph Cerreta, David Thirtyacre, Peter Miller, Scott S. Burgess, William J. Austin

International Journal of Aviation, Aeronautics, and Aerospace

The use of unmanned aircraft systems to collect data for photogrammetry models has grown significantly in recent years. The accuracy of a photogrammetric model can depend on image georeferencing. The distance from a reference base station can affect the accuracy of the results. Positioning corrections data relies on precise timing measurements of satellite signals. The signals travel through the Earth's atmosphere, which introduces errors due to ionospheric and tropospheric delays. The aim of this research was to examine the eBee X and its global GNSS accuracy by comparing the RTK and PPK methods at different base station distances in photogrammetry …


Stochastic Optimization To Reduce Aircraft Taxi-In Time At Igia, New Delhi, Rajib Das, Saileswar Ghosh, Rajendra Desai, Pijus Kanti Bhuin, Stuti Agarwal Jan 2023

Stochastic Optimization To Reduce Aircraft Taxi-In Time At Igia, New Delhi, Rajib Das, Saileswar Ghosh, Rajendra Desai, Pijus Kanti Bhuin, Stuti Agarwal

International Journal of Aviation, Aeronautics, and Aerospace

Since there is an uncertainty in the arrival times of flights, pre-scheduled allocation of runways and stands and the subsequent first-come-first-served treatment results in a sub-optimal allocation of runways and stands, this is the prime reason for the unusual delays in taxi-in times at IGIA, New Delhi.

We simulated the arrival pattern of aircraft and utilized stochastic optimization to arrive at the best runway-stands allocation for a day. Optimization is done using a GRG Non-Linear algorithm in the Frontline Systems Analytic Solver platform. We applied this model to eight representative scenarios of two different days. Our results show that without …


An Evaluation Framework For Digital Image Forensics Tools, Zainab Khalid, Sana Qadir Oct 2022

An Evaluation Framework For Digital Image Forensics Tools, Zainab Khalid, Sana Qadir

Journal of Digital Forensics, Security and Law

The boom of digital cameras, photography, and social media has drastically changed how humans live their day-to-day, but this normalization is accompanied by malicious agents finding new ways to forge and tamper with images for unlawful monetary (or other) gains. Disinformation in the photographic media realm is an urgent threat. The availability of a myriad of image editing tools renders it almost impossible to differentiate between photo-realistic and original images. The tools available for image forensics require a standard framework against which they can be evaluated. Such a standard framework can aid in evaluating the suitability of an image forensics …


A Study Of The Data Remaining On Second-Hand Mobile Devices In The Uk, Olga Angelopoulou, Andy Jones, Graeme Horsman, Seyedali Pourmoafi Oct 2022

A Study Of The Data Remaining On Second-Hand Mobile Devices In The Uk, Olga Angelopoulou, Andy Jones, Graeme Horsman, Seyedali Pourmoafi

Journal of Digital Forensics, Security and Law

This study was carried out intending to identify the level and type of information that remained on portable devices that were purchased from the second-hand market in the UK over the last few years. The sample for this study consisted of 100 second hand mobile phones and tablets. The aim of the study was to determine the proportion of devices that still contained data and the type of data that they contained. Where data was identified, the study attempted to determine the level of personal identifiable information that is associated with the previous owner. The research showed that when sensitive …


Evaluating The Variable Stride Algorithm In The Identification Of Diabetic Retinopathy, Ying Zheng, Brian Danaher, Matthew Brown Aug 2022

Evaluating The Variable Stride Algorithm In The Identification Of Diabetic Retinopathy, Ying Zheng, Brian Danaher, Matthew Brown

Beyond: Undergraduate Research Journal

An experiment was performed to investigate a modified pooling method for use in convolutional neural networks for image recognition. This algorithm–Variable Stride–allows the user to segment an image and change the amount of subsampling in each region. This control allows for the user to maintain a higher amount of data retention in more important regions of the image, while more aggressively subsampling the less important regions to increase training speed. Three Variable Stride methods were compared to the preexisting pooling algorithms, Maximum Pool and Average Pool, in three different network configurations tasked with classifying Diabetic Retinopathy images between its early …


Hydroponically Growing A Holistic Superfood Diet For Mars Exploration, Marianna Pezzella, Ruben A. Rosa Polonia Jul 2022

Hydroponically Growing A Holistic Superfood Diet For Mars Exploration, Marianna Pezzella, Ruben A. Rosa Polonia

Beyond: Undergraduate Research Journal

In “Hydroponically Growing a Holistic Superfood Diet for Mars Exploration,” Project H.O.M.E. members conducted an experiment to help determine ways to provide future astronauts with a complete, balanced diet on a planet that does not receive as much sunlight as Earth. Sending massive amounts of food into space is incredibly expensive, takes up valuable spacecraft area, and is, overall, not a feasible way to provide astronauts with sustenance. Project H.O.M.E. has thus developed a hydroponic system to evaluate the growth and yield of various superfoods - including Moringa Oleifera, goji berries, and kale - under simulated Mars lighting conditions. Data …


Computational Models To Detect Radiation In Urban Environments: An Application Of Signal Processing Techniques And Neural Networks To Radiation Data Analysis, Jose Nicolas Gachancipa Jul 2022

Computational Models To Detect Radiation In Urban Environments: An Application Of Signal Processing Techniques And Neural Networks To Radiation Data Analysis, Jose Nicolas Gachancipa

Beyond: Undergraduate Research Journal

Radioactive sources, such as uranium-235, are nuclides that emit ionizing radiation, and which can be used to build nuclear weapons. In public areas, the presence of a radioactive nuclide can present a risk to the population, and therefore, it is imperative that threats are identified by radiological search and response teams in a timely and effective manner. In urban environments, such as densely populated cities, radioactive sources may be more difficult to detect, since background radiation produced by surrounding objects and structures (e.g., buildings, cars) can hinder the effective detection of unnatural radioactive material. This article presents a computational model …


A Nature-Inspired Approach For Scenario-Based Validation Of Autonomous Systems, Quentin Goss, Mustafa Akbas Jul 2022

A Nature-Inspired Approach For Scenario-Based Validation Of Autonomous Systems, Quentin Goss, Mustafa Akbas

Beyond: Undergraduate Research Journal

Scenario-based approaches are cost and time effective solutions to autonomous cyber-physical system testing to identify bugs before costly methods such as physical testing in a controlled or uncontrolled environment. Every bug in an autonomous cyber-physical system is a potential safety risk. This paper presents a scenario-based method for finding bugs and estimating boundaries of the bug profile. The method utilizes a nature-inspired approach adapting low discrepancy sampling with local search. Extensive simulations demonstrate the performance of the approach with various adaptations.


Assessment Of 3d Mesh Watermarking Techniques, Neha Sharma, Jeebananda Panda Jul 2022

Assessment Of 3d Mesh Watermarking Techniques, Neha Sharma, Jeebananda Panda

Journal of Digital Forensics, Security and Law

With the increasing usage of three-dimensional meshes in Computer-Aided Design (CAD), medical imaging, and entertainment fields like virtual reality, etc., the authentication problems and awareness of intellectual property protection have risen since the last decade. Numerous watermarking schemes have been suggested to protect ownership and prevent the threat of data piracy. This paper begins with the potential difficulties that arose when dealing with three-dimension entities in comparison to two-dimensional entities and also lists possible algorithms suggested hitherto and their comprehensive analysis. Attacks, also play a crucial role in deciding a watermarking algorithm so an attack based analysis is also presented …


To License Or Not To License Reexamined: An Updated Report On Licensing Of Digital Examiners Under State Private Investigator Statutes, Thomas Lonardo, Alan Rea, Doug White Jul 2022

To License Or Not To License Reexamined: An Updated Report On Licensing Of Digital Examiners Under State Private Investigator Statutes, Thomas Lonardo, Alan Rea, Doug White

Journal of Digital Forensics, Security and Law

In this update to the 2015 study, the authors examine US state statutes and regulations relating to licensing and enforcement of Digital Examiner functions under each state’s private investigator/detective statute. As with the prior studies, the authors find that very few state statutes explicitly distinguish between Private Investigators (PI) and Digital Examiners (DE), and when they do, they either explicitly require a license or exempt them from the licensing statute. As noted in the previous 2015 study there is a minor trend in which some states are moving to exempt DE from PI licensing requirements. We examine this trend as …


Determining The Sources Of The Zodiacal Cloud Using Relative Velocities Of Dust Particles From High-Resolution Spectroscopy, Philip B. Mann Iii Apr 2022

Determining The Sources Of The Zodiacal Cloud Using Relative Velocities Of Dust Particles From High-Resolution Spectroscopy, Philip B. Mann Iii

Beyond: Undergraduate Research Journal

The zodiacal cloud is the Solar System debris disk in which the Earth’s orbit is located. The dust that comprises the cloud comes from cometary, asteroidal, interstellar, and other source populations, but the relative ratios have proven hard to determine. However, asteroidal and cometary particles typically have different types of orbits, with asteroidal particles having more circular and lower inclination orbits than cometary particles. Accordingly, the relative velocities of these groups of particles with respect to Earth are also different, and measurements of these relative velocities can help distinguish between the sources. The spectrum of the zodiacal light contains solar …


Proposed L-Shape Pattern On Ufs Acm For Risk Analysis, Abhishek Asthana, Padma Lochan Pradhan Dr Mar 2022

Proposed L-Shape Pattern On Ufs Acm For Risk Analysis, Abhishek Asthana, Padma Lochan Pradhan Dr

Journal of Digital Forensics, Security and Law

At this cloud age, there is tremendous growth in business, services, resources, and cloud technology. This growth comes with a risk of unsafe, unordered, and uncertainty due to unauthorized access and theft of confidential propriety data. Our objective is to model around Read, Write and Execute to resolve these unordered, unsafe, and uncertain issues. We will develop a L-Shape pattern model matching UFS ACM to minimize the accessibilities based on RIGHT & ROLE of the resources and maximize the quality of services for safety and high availability. The preventive, detective, corrective (PDC) services are the major roles for all levels …


A Combined Approach For Private Indexing Mechanism, Pranita Maruti Desai Ms., Vijay Maruti Shelake Mr. Mar 2022

A Combined Approach For Private Indexing Mechanism, Pranita Maruti Desai Ms., Vijay Maruti Shelake Mr.

Journal of Digital Forensics, Security and Law

Private indexing is a set of approaches for analyzing research data that are similar or resemble similar ones. This is used in the database to keep track of the keys and their values. The main subject of this research is private indexing in record linkage to secure the data. Because unique personal identification numbers or social security numbers are not accessible in most countries or databases, data linkage is limited to attributes such as date of birth and names to distinguish between the number of records and the real-life entities they represent. For security reasons, the encryption of these identifiers …


Cepheid Variable Light Curve Analysis On The Embry-Riddle 1-Meter Telescope, Kayla Taylor Mar 2022

Cepheid Variable Light Curve Analysis On The Embry-Riddle 1-Meter Telescope, Kayla Taylor

Beyond: Undergraduate Research Journal

This report details light curve analysis for four Cepheid variable stars (Polaris, RT Aurigae, RX Aurigae, and Zeta Geminorum) using Embry-Riddle Aeronautical University's 1-meter reflecting telescope and a SBIG-STX 16803 camera with a g filter. Observations were conducted once per week during the Spring 2021 semester; at least one three-hour shift was allotted per week according to the Observational Astronomy Telescope Allocation Committee (TAC). Individual light curves for each target Cepheid were then compared to published data to analyze evidence of evolution on the Instability Strip. Although the light curves showed the sinusoidal nature of brightness oscillations, amplitudes of the …


A Critical Comparison Of Brave Browser And Google Chrome Forensic Artefacts, Stuart Berham, Sarah Morris Mar 2022

A Critical Comparison Of Brave Browser And Google Chrome Forensic Artefacts, Stuart Berham, Sarah Morris

Journal of Digital Forensics, Security and Law

Digital forensic practitioners are tasked with the identification, recovery and analysis of Internet browser artefacts which may have been used in the pursuit of committing a civil or criminal offence. This research paper critically compares the most downloaded browser, Google Chrome, against an increasingly popular Chromium browser known as Brave, said to offer privacy-by-default. With increasing forensic caseloads, data complexity, and requirements for method validation to satisfy ISO 17025 accreditation, recognising the similarities and differences between the browsers, developed on the same underlying technology is essential. The paper describes a series of conducted experiments and subsequent analysis to identify artefacts …


Digital Evidence In Appeals Of Criminal Cases Before The U.S. Courts Of Appeal: A Review Of Decisions And Examination Of The Legal Landscape From 2016 – 2020, Martin Novak Jan 2022

Digital Evidence In Appeals Of Criminal Cases Before The U.S. Courts Of Appeal: A Review Of Decisions And Examination Of The Legal Landscape From 2016 – 2020, Martin Novak

Journal of Digital Forensics, Security and Law

This study is a follow-up to Digital Evidence in Criminal Cases before the U.S. Courts of Appeal: Trends and Issues for Consideration – 2010 to 2015. The current study examines appeals of criminal cases before the United States Courts of Appeal from January 2016 through August 2020, where one or more appeal claims were related to digital evidence. The purpose of this research was to determine if the legal landscape has changed since 2015; examine the most relevant legal issues related to digital evidence; and analyze how precedential cases may have affected digital forensics as evidence.


Technical Behaviours Of Child Sexual Exploitation Material Offenders, Chad Steel, Emily Newman, Suzanne O'Rourke, Ethel Quayle Jan 2022

Technical Behaviours Of Child Sexual Exploitation Material Offenders, Chad Steel, Emily Newman, Suzanne O'Rourke, Ethel Quayle

Journal of Digital Forensics, Security and Law

An exploration of the technological behaviours of previously convicted child sexual exploitation material (CSEM) offenders provides a foundation for future applied research into deterrence, investigation, and treatment efforts. This study evaluates the technology choices and transitions of individuals previously convicted of CSEM offenses. Based on their inclusion in two sex offender registries, anonymous survey results (n=78) were collected from English-speaking adults within the United States. CSEM offenders chose technologies based on both utility and perceived risk; peer-to-peer and web-browsers were the most common gateway technologies and showed substantial sustained usage; a substantial minority of users never stored CSEM and only …


Forensic Discoverability Of Ios Vault Applications, Alissa Gilbert, Kathryn C. Seigfried-Spellar Jan 2022

Forensic Discoverability Of Ios Vault Applications, Alissa Gilbert, Kathryn C. Seigfried-Spellar

Journal of Digital Forensics, Security and Law

Vault Applications are used to store potentially sensitive information on a smartphone; and are available on Android and iOS. The purpose of using these applications could be used to hide potential evidence or illicit photos. After comparing five different iOS photo vaults, each vault left evidence and photos behind. However, of the three forensic toolkits used, each produced different results in their scans of the phone. The media left behind was due to the photo vaults not protecting their information as claimed, and using basic obfuscation techniques in place of security controls. Future research will look at how newer security …


Ga Pilot Perceptions Of Speech Systems To Transcribe And Submit Pireps, Deborah S. Carstens Ph.D., Pmp, Michael S. Harwin, J.D., M.S., Tianhua Li, Ph.D., Brandon J. Pitts, Ph.D., Mel Futrell, M.A., Barrett Caldwell, Ph.D. Jan 2022

Ga Pilot Perceptions Of Speech Systems To Transcribe And Submit Pireps, Deborah S. Carstens Ph.D., Pmp, Michael S. Harwin, J.D., M.S., Tianhua Li, Ph.D., Brandon J. Pitts, Ph.D., Mel Futrell, M.A., Barrett Caldwell, Ph.D.

International Journal of Aviation, Aeronautics, and Aerospace

Flying into hazardous weather can be a cause of aviation incidents and accidents. Accidents involving general aviation (GA) pilots who are not instrument rated who fly into instrument meteorological conditions (IMC) are often fatal. Pilot weather reports (PIREPs) can increase the accuracy and timeliness of current and forecasted weather conditions. They are an essential tool used by pilots to avoid flying into hazardous weather as well as meteorologists to develop and update aviation forecasts. Thus, a large number of accurate PIREPs with the best source of current weather coming from pilots and air traffic controllers are needed. Pilots are often …


Performance Assessment Of Some Phishing Predictive Models Based On Minimal Feature Corpus, Orunsolu Abdul Abiodun, Sodiya A.S, Kareem S.O, Oladimeji G. B Mr. Dec 2021

Performance Assessment Of Some Phishing Predictive Models Based On Minimal Feature Corpus, Orunsolu Abdul Abiodun, Sodiya A.S, Kareem S.O, Oladimeji G. B Mr.

Journal of Digital Forensics, Security and Law

Phishing is currently one of the severest cybersecurity challenges facing the emerging online community. With damages running into millions of dollars in financial and brand losses, the sad tale of phishing activities continues unabated. This led to an arms race between the con artists and online security community which demand a constant investigation to win the cyberwar. In this paper, a new approach to phishing is investigated based on the concept of minimal feature set on some selected remarkable machine learning algorithms. The goal of this is to select and determine the most efficient machine learning methodology without undue high …


Don't Bite The Bait: Phishing Attack For Internet Banking (E-Banking), Ilker Kara Nov 2021

Don't Bite The Bait: Phishing Attack For Internet Banking (E-Banking), Ilker Kara

Journal of Digital Forensics, Security and Law

Phishing attacks are based on obtaining desired information from users quickly and easily with the help of misdirecting, panicking, curiosity, or excitement. Most of the phishing web sites are designed on internet banking(e-banking) and the attackers can acquire financial information of misled users with the tactics and discourses they develop. Despite the increase of prevention techniques against phishing attacks day by day, an effective solution could not be found for this issue due to the human factor. Because of this reason, real phishing attack studies are essential to study and analyze the attackers’ attack techniques and strategies. This study focused …