Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 27 of 27

Full-Text Articles in Physical Sciences and Mathematics

Understanding And Optimizing Surfaces And Interfaces In Energy Conversion Devices, Clemens Heske Aug 2007

Understanding And Optimizing Surfaces And Interfaces In Energy Conversion Devices, Clemens Heske

UNLV Renewable Energy Symposium

This inaugural event is dedicated to showcasing the renewable/sustainable energy projects of UNLV faculty, staff, students, and collaborators, as well as other external projects underway statewide and nationally. The development and utilization of new technologies to protect the environment, achieve energy independence, and strengthen the economy will be explored. Speakers and poster-session presenters will provide further insight to many ongoing projects and innovative research ideas.

Organized by UNLV’s Office of Strategic Energy Programs, the event offers participants the opportunity to learn about energy projects and will encourage networking and collaboration. This symposium is intended for researchers, educators, students, policy makers, …


Textbooks For Computer Forensic Courses: A Preliminary Study, Jigang Liu, Larry Gottschalk, Kuodi Jian Apr 2007

Textbooks For Computer Forensic Courses: A Preliminary Study, Jigang Liu, Larry Gottschalk, Kuodi Jian

Annual ADFSL Conference on Digital Forensics, Security and Law

As computer forensics develops into one of the fastest-growing areas in the computer related fields, many universities and colleges are offering or are planning to offer a course in computer forensics. When instructors begin to develop a new course in the area, one of critical questions they would ask is what textbook should be used. To better answer the question, we conducted a study in which we tried to find which textbooks are being used in computer forensic courses. We believe that the results and analysis of our study will help instructors in choosing adequate textbooks for their new course …


Do Current Erasure Programs Remove Evidence Of Bittorrent Activity?, Andrew Woodward, Craig Valli Apr 2007

Do Current Erasure Programs Remove Evidence Of Bittorrent Activity?, Andrew Woodward, Craig Valli

Annual ADFSL Conference on Digital Forensics, Security and Law

This research in progress aims to evaluate the effectiveness of commercial programs to erase traces of the use of BitTorrent software. The erasure programs MaxErase, P2PDoctor, Privacy Suite, Window Washer and R-Clean and Wipe were used on a machine that had used the BitTorrent client Azureus to download two torrent files. The drive was imaged and then searched for torrent files. The registry was also examined on the source machine. The program R-Clean and Wipe left evidence in both the registry and the image of the name and type of files that had been downloaded with this software. Of greater …


Investigating Information Structure Of Phishing Emails Based On Persuasive Communication Perspective, Ki Jung Lee, Il-Yeol Song Apr 2007

Investigating Information Structure Of Phishing Emails Based On Persuasive Communication Perspective, Ki Jung Lee, Il-Yeol Song

Annual ADFSL Conference on Digital Forensics, Security and Law

Current approaches of phishing filters depend on classifying messages based on textually discernable features such as IP-based URLs or domain names as those features that can be easily extracted from a given phishing message. However, in the same sense, those easily perceptible features can be easily manipulated by sophisticated phishers. Therefore, it is important that universal patterns of phishing messages should be identified for feature extraction to serve as a basis for text classification. In this paper, we demonstrate that user perception regarding phishing message can be identified in central and peripheral routes of information processing. We also present a …


The Case For Teaching Network Protocols To Computer Forensics Examiners, Gary C. Kessler, Matt Fasulo Apr 2007

The Case For Teaching Network Protocols To Computer Forensics Examiners, Gary C. Kessler, Matt Fasulo

Annual ADFSL Conference on Digital Forensics, Security and Law

Most computer forensics experts are well-versed in basic computer hardware technology, operating systems, common software applications, and computer forensics tools. And while many have rudimentary knowledge about the Internet and simple network-lookup tools, they are not trained in the analysis of network communication protocols and the use of packet sniffers. This paper describes digital forensics applications for network analysis and includes four case studies.

Keywords: computer forensics education, network forensics, protocol analysis


Defending Against Insider Use Of Digital Steganography, James E. Wingate, Glenn D. Watt, Marc Kurtz, Chad W. Davis, Robert Lipscomb Apr 2007

Defending Against Insider Use Of Digital Steganography, James E. Wingate, Glenn D. Watt, Marc Kurtz, Chad W. Davis, Robert Lipscomb

Annual ADFSL Conference on Digital Forensics, Security and Law

The trusted insider is among the most harmful and difficult to detect threats to information security, according to the Federal Plan for Information Assurance and Cyber Security Research and Development released in April 2006. By default, employees become trusted insiders when granted the set of privileges needed to do their jobs, which typically includes access to the Internet. It is generally presumed the insiders are loyally working to achieve the organization’s goals and objectives and would not abuse the privileges given to them. However, some insiders will inevitably abuse some of their privileges. For example, a trusted insider might abuse …


Computer Geolocation Using Extracted Features, Chad M.S. Steel Apr 2007

Computer Geolocation Using Extracted Features, Chad M.S. Steel

Annual ADFSL Conference on Digital Forensics, Security and Law

This paper compares the extracted feature data from a sample set of hard drive images in an effort to relate the features to the physical location of the drive. A list of probable zip codes, phone numbers, place names, and IP addresses are extracted from raw drive images and compared to manually identified geolocation data. The results of the individual extractions are then analyzed to determine the feasibility in using automated extraction and analysis techniques for geolocating hard drives.

Keywords: hard disk forensics, geocoding, geolocation


Towards Redaction Of Digital Information From Electronic Devices, Gavin W. Manes, Lance Watson, David Greer, Alex Barclay, John Hale Apr 2007

Towards Redaction Of Digital Information From Electronic Devices, Gavin W. Manes, Lance Watson, David Greer, Alex Barclay, John Hale

Annual ADFSL Conference on Digital Forensics, Security and Law

In the discovery portion of court proceedings, it is necessary to produce information to opposing counsel. Traditionally, this information is in paper form with all privileged information removed. Increasingly, the information requested during discovery exists in digital form and savvy counsel is requesting direct access to the original digital source: a broad spectrum of additional digital information can be often be extracted using digital forensics. This paper describes the major problems which must be solved to redact digital information from electronic devices. The primary hurdle facing digital redaction is the lack of a rational process for systematically handling encoded, encrypted, …


Education For Cyber Crime Investigators, David Greer, Joe Mulenex, John Hale, Gavin W. Manes Apr 2007

Education For Cyber Crime Investigators, David Greer, Joe Mulenex, John Hale, Gavin W. Manes

Annual ADFSL Conference on Digital Forensics, Security and Law

Digital forensics and cyber crime investigations are continually growing, rapidly changing fields requiring law enforcement agencies to meet very rigorous training requirements. New opportunities for committing criminal activity against persons, organization or property are presented every day with the proliferation of personal digital devices, computers, the internet, computer networks, and automated data systems. Whether the crime involves attacks against computer systems, electronic information, or more traditional crimes such as murder, money laundering or fraud, electronic evidence is becoming more prevalent. It is no surprise that law enforcement and criminal justice officials are being overwhelmed by the volume of investigations and …


The Evolution Of Internet Legal Regulation In Addressing Crime And Terrorism, Murdoch Watney Apr 2007

The Evolution Of Internet Legal Regulation In Addressing Crime And Terrorism, Murdoch Watney

Annual ADFSL Conference on Digital Forensics, Security and Law

Internet regulation has evolved from self-regulation to the criminalization of conduct to state control of information available, accessed and submitted. Criticism has been leveled at the different forms of state control and the methods employed to enforce state control. After the terrorist attack on the USA on 11 September 2001, governments justify Internet state control as a law enforcement and national security tool against the abuse and misuse of the Internet for the commission of serious crimes, such as phishing, child pornography; terrorism and copyright infringement. Some Internet users and civil rights groups perceive state control as an abomination which …


New Federal Rules And Digital Evidence, Gavin W. Manes, Elizabeth Downing, Lance Watson, Christopher Thrutchley Apr 2007

New Federal Rules And Digital Evidence, Gavin W. Manes, Elizabeth Downing, Lance Watson, Christopher Thrutchley

Annual ADFSL Conference on Digital Forensics, Security and Law

The newly revised Federal Rules of Civil Procedure and developments under the Federal Rules of Evidence have a significant impact on the use, collection, and treatment of digital evidence for legal proceedings. The Rules now formally grant electronic documents and digital evidence the same status as paper and other forms of tangible evidence. As a result, the availability and proper preservation of potentially relevant electronic evidence must be considered, at the very latest, in the preliminary stages of litigation and, at the earliest, as soon as litigation is reasonably anticipated. It is important for professionals to be familiar with the …


The Gap Between Theory And Practice In Digital Forensics, Joseph C. Sremack Apr 2007

The Gap Between Theory And Practice In Digital Forensics, Joseph C. Sremack

Annual ADFSL Conference on Digital Forensics, Security and Law

Digital forensics is a young field that is being defined by the reactive nature of its development – in terms of both research and practice. As technology develops, digital forensics is forced to react and adapt. The rapid development of technology and the lack of an established theoretical foundation has led to a disconnect between the theory and practice of digital forensics. While the base theoretical issues are being worked on by researchers, practitioners are dealing with entirely new sets of issues. The complexity of investigations is increasing, and anti-forensics techniques are advancing as well. The disconnect will be resolved …


Teams Responsibilities For Digital Forensic Process, Salma Abdalla, Sherif Hazem, Sherif Hashem Apr 2007

Teams Responsibilities For Digital Forensic Process, Salma Abdalla, Sherif Hazem, Sherif Hashem

Annual ADFSL Conference on Digital Forensics, Security and Law

This paper presents a detailed digital forensics process model and the responsible teams to perform it. The discussed model presents three teams and a forensic leader who coordinate between the three teams; these teams are physical crime scene team, laboratory examination team and courtroom team. These teams are responsible of achieving the digital forensic model by applying five main phases which are preparation phase, physical forensics and investigation phase, digital forensics phase, reporting and presentation phase and closure phase.

Most of the existing models in this field are either theoretical that deals with data processing or based on a legal …


Monitoring And Surveillance In The Workplace: Lessons Learnt? – Investigating The International Legal Position, Verine Etsebeth Apr 2007

Monitoring And Surveillance In The Workplace: Lessons Learnt? – Investigating The International Legal Position, Verine Etsebeth

Annual ADFSL Conference on Digital Forensics, Security and Law

When considering the legal implications of monitoring and surveillance in the workplace, the question may be asked why companies deploy computer surveillance and monitoring in the first place. Several reasons may be put forward to justify why more than 80% of all major American firms monitor employee e-mails and Internet usage. However, what most companies forget is the fact that the absence or presence of monitoring and surveillance activities in a company holds serious legal consequences for companies. From the discussion in this paper it will become apparent that there is a vast difference in how most countries approach this …


An Exploratory Analysis Of Computer Mediated Communications On Cyberstalking Severity, Stephen D. Barnes, David P. Biros Apr 2007

An Exploratory Analysis Of Computer Mediated Communications On Cyberstalking Severity, Stephen D. Barnes, David P. Biros

Annual ADFSL Conference on Digital Forensics, Security and Law

The interaction between disjunctive interpersonal relationships, those where the parties to the relationship disagree on the goals of the relationship, and the use of computer mediated communications channels is a relatively unexplored domain. Bargh (2002) suggests that CMC channels can amplify the development of interpersonal relationships, and notes that the effect is not constant across communications activities. This proposal suggests a line of research that explores the interaction between computer mediated communications (CMC) and stalking, which is a common form of disjunctive relationships. Field data from cyberstalking cases will be used to look at the effects of CMC channels on …


The General Digital Forensics Model, Steven Rigby, Marcus K. Rogers Apr 2007

The General Digital Forensics Model, Steven Rigby, Marcus K. Rogers

Annual ADFSL Conference on Digital Forensics, Security and Law

The lack of a graphical representation of all of the principles, processes, and phases necessary to carry out an digital forensic investigation is a key inhibitor to effective education in this newly emerging field of study. Many digital forensic models have been suggested for this purpose but they lack explanatory power as they are merely a collection of lists or one-dimensional figures. This paper presents a new multi-dimensional model, the General Digital Forensics Model (GDFM), that shows the relationships and inter-connectedness of the principles and processes needed within the domain of digital forensics.

Keywords: process model, computer forensics, expert learning, …


Guideline Model For Digital Forensic Investigation, Salma Abdalla, Sherif Hazem, Sherif Hashem Apr 2007

Guideline Model For Digital Forensic Investigation, Salma Abdalla, Sherif Hazem, Sherif Hashem

Annual ADFSL Conference on Digital Forensics, Security and Law

This paper proposes a detailed guideline model for digital forensics; the proposed model consists of five main phases, Preparation phase, Physical Forensics and Investigation Phase, Digital Forensics Phase, Reporting and Presentation Phase, and Closure Phase.

Most of the existing models in this field do not cover all aspects of digital forensic investigations, as they focus mainly on the processing of digital evidence or on the legal points. Although they gave good information to base on it a guide, but they are not detailed enough to describe fully the investigative process in a way that can be used by investigators during …


Poster Session, Kentucky Water Resources Research Institute, University Of Kentucky Mar 2007

Poster Session, Kentucky Water Resources Research Institute, University Of Kentucky

Kentucky Water Resources Annual Symposium

  • Identification of potential bacterial sources and levels, Red Duck Creek, Mayfield, Kentucky, Brooke Vorbeck, Travis Martin, and Mike Kemp, Dept of Industrial and Engineering Technology, Murray State University
  • Water-quality trend analysis for streams in Kentucky, A.S. Crain and G.R. Martin, USGS, Louisville
  • Preliminary Results of a Fecal Microbe Survey in a Eutrophic Lake, Wilgreen Lake, Madison County, Kentucky, W.S. Borowski and M.S. Albright, Depts of Earth Sciences and Geography, EKU
  • Preliminary Physical and Chemical Characteristics of an Eutrophic Lake, Wilgreen Lake, Madison County, Kentucky, E.C. Jolly and W.S. Borowski, Dept of Earth Sciences, EKU
  • Lethal and …


Session 2d: Superfund, Kentucky Water Resources Research Institute, University Of Kentucky Mar 2007

Session 2d: Superfund, Kentucky Water Resources Research Institute, University Of Kentucky

Kentucky Water Resources Annual Symposium

  • Challenges and Opportunities in Working Directly with Affected Superfund Communities in Kentucky, Lisa Gaetke, Nutrition and Food Science, UK
  • Selected Chloro-Organic Detoxifications by Poly-Chelate (polyacrylic acid) and Citrate-Based Fenton Reaction at Neutral pH Environment, YongChao Li, L. G. Bachas, and Dibakar Bhattacharyya, Depts of Chemical & Materials Engineering and Chemisty, UK
  • Reductive Degradation of Cholorinated Organics by Membrane-Supported Nonoparticles, Jian Xu and Dibakar Bhattacharyya, Dept of Chemical & Materials Engineering, UK


Session 2c: Education/Outreach, Kentucky Water Resources Research Institute, University Of Kentucky Mar 2007

Session 2c: Education/Outreach, Kentucky Water Resources Research Institute, University Of Kentucky

Kentucky Water Resources Annual Symposium

  • 5 Stars, 15 Students, and 5000 Trees, A.A. Gumbert and others, Extension Associate for Environmental and Natural Resource Issues, UK
  • The Water Pioneers Water Quality Initiative, Stephanie Jenkins, Doug McLaren, Blake Newton, Amanda Abnee, UK
  • Local and State Partnership for MS4 Success in Kentucky – Coordinated Communication, Education and Outreach, C.D. McCormick and Shelby Jett, FMSM Engineers, Louisville and Kentucky Transportation Cabinet
  • Illicit Discharge Detection and Elimination: A Challenge for Kentucky’s Stormwater Program Cities, B. Tonning, R. Walker, and J. Arnold, Tetra Tech, Lexington


Session 2b: Goundwater, Kentucky Water Resources Research Institute, University Of Kentucky Mar 2007

Session 2b: Goundwater, Kentucky Water Resources Research Institute, University Of Kentucky

Kentucky Water Resources Annual Symposium

  • Kentucky Groundwater-Quality Mapping Service, R.S. Fisher and Bart Davidson, KGS
  • Kentucky Groundwater-Quality Data Search Engine, Bart Davidson and R.S. Fisher, KGS
  • Water Quality in the Karst Terrane of the Sinking Creek Basin, Kentucky 2004-06, Angela S. Crain, USGS, Louisville
  • Salt Movement Through the Vadose Zone of a Karst Soil – First Experiences with a Transfer Function Approach, Ole Wendroth and others, Dept Plant and Soil Sciences, UK


Session 2a: Surface Water, Kentucky Water Resources Research Institute, University Of Kentucky Mar 2007

Session 2a: Surface Water, Kentucky Water Resources Research Institute, University Of Kentucky

Kentucky Water Resources Annual Symposium

  • Development and Application of a New Sediment Fingerprinting Methodology for the Commonwealth of Kentucky, Charles Davis and Jimmy Fox, Dept of Civil Engineering, UK
  • Accounting for Construction Stormwater in TMDL Development for Sediment Impaired Streams in Rapidly Growing Residential Areas, Jon Ludwig and John Bekman, Tetra Tech, and David Montali, WVDEP
  • Responses of Riparian Plant Diversity to Gradients in Flood Frequency and Severity, Patrick Lawless and Jimmy Fox, Depts of Geography and Civil Engineering, UK


Session 1d: Biology, Kentucky Water Resources Research Institute, University Of Kentucky Mar 2007

Session 1d: Biology, Kentucky Water Resources Research Institute, University Of Kentucky

Kentucky Water Resources Annual Symposium

  • Long-Term Assessments and Seasonal Variations of Polychlorinated Biphenyls (PCBs) in Water, Sediments, Floodplain Soils, and Sentinel Fish Species from Big and Little Bayou Creeks, McCracken County, Kentucky, D.J. Price, Dept of Biology, UK
  • Characterization of total dissolved solids (TDS) toxicity to Ceriodaphnia dubia associated with effluent discharges from a meat packaging industry, Agus Sofyan and David Price, Dept of Biology, UK
  • Wilson Creek Restoration and the Response in Food Web Function and Fish Community Structure, Wesley Daniel and Jeff Jack, Dept of Biology and Center for Environmental Science, U of L


Session 1c: Epscor Projects, Kentucky Water Resources Research Institute, University Of Kentucky Mar 2007

Session 1c: Epscor Projects, Kentucky Water Resources Research Institute, University Of Kentucky

Kentucky Water Resources Annual Symposium

  • Colloidal Arsenic in Poultry-Litter Amended Soils, Lisa Y. Blue and others, Dept of Chemistry, UK
  • Environmental Monitoring and Assessment of Arsenic Metal in Groundwater Samples from Ballard, Carlisle, and Graves Counties, Kentucky, H.B. Fannin and others, Dept of Chemistry, Murray State University
  • Environmental Monitoring and Assessment of the Groundwater Quality in Calloway County, Kentucky, Dan Kotter and others, KGS, Henderson, KY
  • Land-Use Effects on Water Quality Within Lower Howard Creek Watershed, Southwestern Clark County, Kentucky, S.D. Daugherty and J.S. Dinger, Dept Earth & Environmental Sciences and KGS, UK


Session 1b: Student Research Projects, Kentucky Water Resources Research Institute, University Of Kentucky Mar 2007

Session 1b: Student Research Projects, Kentucky Water Resources Research Institute, University Of Kentucky

Kentucky Water Resources Annual Symposium

  • Experimental Study of the Impact of Upland Sediment Supply upon Cohesive Streambank Erosion Part I: Fluid Turbulence, Brian Belcher and Jimmy Fox, Dept of Civil Engineering, UK
  • Toward Using a Three-Dimensional Numerical Model for Simulating Hydrodynamics Near a Dam for Constructing the Rating Curve, Z.S. Shao and S.A. Yost, Dept of Civil Engineering, UK
  • Property Taxation and Forest Fragmentation in Kentucky Watersheds, Scott Brodbeck and Tamara Cushing, Dept of Forestry, UK
  • Solute and Particle Tracer Movement Under Various Flow Conditions in a Karst Groundwater Basin, Inner Bluegrass Region, Kentucky, J.W. Ward and others, Dept Earth and …


Session 1a: Microbial Source Tracking, Kentucky Water Resources Research Institute, University Of Kentucky Mar 2007

Session 1a: Microbial Source Tracking, Kentucky Water Resources Research Institute, University Of Kentucky

Kentucky Water Resources Annual Symposium

  • Detecting Multiple Source Origins from Fecal Bacteria Antibiotic Resistance Patterns, Sloane Ritchey and M.S. Coyne, Environmental Research Institute, EKU and Dept of Plant and Soil Sciences, UK
  • Microbial Source Tracking; Limits and Application, Steve Evans, Third Rock Consultants, Lexington
  • Triplett Creek Focus Study, Brian Reeder and April Haight, Institute for Regional Analysis and Public Policy, Morehead State University


Proceedings Of 2007 Kentucky Water Resources Annual Symposium, Kentucky Water Resources Research Institute, University Of Kentucky Mar 2007

Proceedings Of 2007 Kentucky Water Resources Annual Symposium, Kentucky Water Resources Research Institute, University Of Kentucky

Kentucky Water Resources Annual Symposium

This conference was planned and conducted as part of the state water resources research annual program with the support and collaboration of the Department of the Interior, U.S. Geological Survey and the University of Kentucky Research Foundation, under Grant Agreement Number 06HQGR0087.

The views and conclusions contained in this document and presented at the symposium are those of the abstract authors and presenters and should not be interpreted as necessarily representing the official policies, either expressed or implied, of the U.S. Government or other symposium organizers and sponsors.