Open Access. Powered by Scholars. Published by Universities.®
Public Affairs, Public Policy and Public Administration Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- University of Nevada, Las Vegas (108)
- Embry-Riddle Aeronautical University (75)
- World Maritime University (34)
- Georgia Southern University (3)
- Kennesaw State University (3)
-
- Western Kentucky University (3)
- Nova Southeastern University (2)
- Western University (2)
- Yale University (2)
- Central Washington University (1)
- Florida International University (1)
- Gettysburg College (1)
- Illinois State University (1)
- Liberty University (1)
- Murray State University (1)
- Old Dominion University (1)
- Olivet Nazarene University (1)
- Purdue University (1)
- Rhode Island School of Design (1)
- Roseman University of Health Sciences (1)
- Southern Adventist University (1)
- University of Central Florida (1)
- University of Lynchburg (1)
- University of Massachusetts Amherst (1)
- University of San Diego (1)
- University of South Carolina (1)
- University of South Florida (1)
- Keyword
-
- Nevada (7)
- Problem gambling (6)
- Yucca Mountain (6)
- Gambling (5)
- Nuclear issues (4)
-
- Energy consumption (3)
- Energy development (3)
- Georgia Municipal Association Practicum (3)
- Georgia Southern University (3)
- Institute for Public and Nonprofit Studies (3)
- Native Americans (3)
- Nuclear waste (3)
- Renewable energy sources government policy (3)
- Responsible gambling (3)
- Technology (3)
- Clean energy industries (2)
- Climatic changes (2)
- Epidemiology (2)
- Nevada Test Site (2)
- Renewable energy sources Research (2)
- Renewable energy sources Study and teaching (Higher) (2)
- Repair (2)
- Responsible Gaming (2)
- Right to Repair (2)
- Self-exclusion (2)
- Sustainability (2)
- Activists (1)
- Administrative agencies ; Climatic changes – Government policy; Climatic changes – Research; Global warming – Government policy; Nevada; West (U.S.) (1)
- Age groups (1)
- Agenda (1)
- Publication Year
- Publication
-
- Annual ADFSL Conference on Digital Forensics, Security and Law (75)
- International Conference on Gambling & Risk Taking (47)
- MARENER 2017 (25)
- North American Energy Water Nexus Roundtable (11)
- National Clean Energy Summit (10)
-
- ShipArc 2015 Conference (9)
- Native American Forum on Nuclear Issues (8)
- 2010 Annual Nevada NSF EPSCoR Climate Change Conference (7)
- College of Engineering: Graduate Celebration Programs (6)
- UNLV Renewable Energy Symposium (6)
- International Symposium on Technology and Society (5)
- Georgia Municipal Association Practicum (3)
- Shaping the Future of Southern Nevada: Economic, Environmental, and Social Sustainability (3)
- Climate Sustainability Lecture Series (2)
- Festival of Communities: UG Symposium (Posters) (2)
- Graduate Research Symposium (GCUA) (2010 - 2017) (2)
- Symposium of Student Scholars (2)
- Undergraduate Student Research Internships Conference (2)
- Yale Day of Data (2)
- African Conference on Information Systems and Technology (1)
- Annual Research Symposium (1)
- Annual Symposium on Biomathematics and Ecology Education and Research (1)
- Campus Research Day (1)
- Celebration (1)
- Climate Futures Symposium (1)
- Digital Initiatives Symposium (1)
- Education for Sustainability Summer Institute (1)
- Fair Trade Universities' National Convergence (1)
- Helm's School of Government Conference - American Revival: Citizenship & Virtue (1)
- IPPCS Colloquia (1)
- File Type
Articles 31 - 60 of 250
Full-Text Articles in Public Affairs, Public Policy and Public Administration
Front Matter, Adfsl
Front Matter, Adfsl
Annual ADFSL Conference on Digital Forensics, Security and Law
No abstract provided.
Analysis Of Data Erasure Capability On Sshd Drives For Data Recovery, Andrew Blyth
Analysis Of Data Erasure Capability On Sshd Drives For Data Recovery, Andrew Blyth
Annual ADFSL Conference on Digital Forensics, Security and Law
Data Protection and Computer Forensics/Anti-Forensics has now become a critical area of concern for organizations. A key element to this is how data is sanitized at end of life. In this paper we explore Hybrid Solid State Hybrid Drives (SSHD) and the impact that various Computer Forensics and Data Recovery techniques have when performing data erasure upon a SSHD.
Knowledge Expiration In Security Awareness Training, Tianjian Zhang
Knowledge Expiration In Security Awareness Training, Tianjian Zhang
Annual ADFSL Conference on Digital Forensics, Security and Law
No abstract provided.
Positive Identification Of Lsb Image Steganography Using Cover Image Comparisons, Michael Pelosi, Nimesh Poudel, Pratap Lamichhane, Devon Lam, Gary Kessler, Joshua Macmonagle
Positive Identification Of Lsb Image Steganography Using Cover Image Comparisons, Michael Pelosi, Nimesh Poudel, Pratap Lamichhane, Devon Lam, Gary Kessler, Joshua Macmonagle
Annual ADFSL Conference on Digital Forensics, Security and Law
In this paper we introduce a new software concept specifically designed to allow the digital forensics professional to clearly identify and attribute instances of LSB image steganography by using the original cover image in side-by-side comparison with a suspected steganographic payload image. The “CounterSteg” software allows detailed analysis and comparison of both the original cover image and any modified image, using sophisticated bit- and color-channel visual depiction graphics. In certain cases, the steganographic software used for message transmission can be identified by the forensic analysis of LSB and other changes in the payload image. The paper demonstrates usage and typical …
Exploring The Use Of Graph Databases To Catalog Artifacts For Client Forensics, Rose Shumba
Exploring The Use Of Graph Databases To Catalog Artifacts For Client Forensics, Rose Shumba
Annual ADFSL Conference on Digital Forensics, Security and Law
Cloud computing has revolutionized the methods by which digital data is stored, processed, and transmitted. It is providing users with data storage and processing services, enabling access to resources through multiple devices. Although organizations continue to embrace the advantages of flexibility and scalability offered by cloud computing, insider threats are becoming a serious concern as cited by security researchers. Insiders can use authorized access to steal sensitive information, calling for the need for an investigation. This concept paper describes research in progress towards developing a Neo4j graph database tool to enhance client forensics. The tool, with a Python interface, allows …
Non-Use Of A Mobile Phone During Conducting Crime Can Also Be Evidential, Vinod Polpaya Bhattathiripad Ph D
Non-Use Of A Mobile Phone During Conducting Crime Can Also Be Evidential, Vinod Polpaya Bhattathiripad Ph D
Annual ADFSL Conference on Digital Forensics, Security and Law
Cyber-clever criminals who are aware of the consequence of using mobile phones during conducting crimes often stay away from their phones while involved in crimes. Some of them even change their handset and SIM card, subsequently. This article looks into how, intentional disassociation (and even unintentional non-use) of mobile phone in (non-cyber) crimes, can become evidential clues of the perpetrators’ involvement in criminal acts. With the help of a recent judicial episode, this article reveals how extremely careful and masterful handling of extensive and voluminous Call Details Records and tower dumps by a cyber-savvy investigating official can unearth evidential clues …
Live Gpu Forensics: The Process Of Recovering Video Frames From Nvidia Gpu, Yazeed M. Albabtain, Baijian Yang
Live Gpu Forensics: The Process Of Recovering Video Frames From Nvidia Gpu, Yazeed M. Albabtain, Baijian Yang
Annual ADFSL Conference on Digital Forensics, Security and Law
The purpose of this research is to apply a graphics processing unit (GPU) forensics method to recover video artifacts from NVIDIA GPU. The tested video specs are 512 x 512 in resolution for video 1 and 800 x 600 in resolution for video 2. Both videos are mpeg4 video codec. A VLC player was used in the experiment. A special program has been developed using OpenCL to recover 1) patterns that are frames consist of pixel values and 2) dump data from the GPU global memory. The dump data that represent the video frame were located using simple steps. The …
Unmanned Aerial Vehicle Forensic Investigation Process: Dji Phantom 3 Drone As A Case Study, Alan Roder, Kim-Kwang Raymond Choo, Nhien-A Le-Khac
Unmanned Aerial Vehicle Forensic Investigation Process: Dji Phantom 3 Drone As A Case Study, Alan Roder, Kim-Kwang Raymond Choo, Nhien-A Le-Khac
Annual ADFSL Conference on Digital Forensics, Security and Law
Drones (also known as Unmanned Aerial Vehicles – UAVs) are a potential source of evidence in a digital investigation, partly due to their increasing popularity in our society. However, existing UAV/drone forensics generally rely on conventional digital forensic investigation guidelines such as those of ACPO and NIST, which may not be entirely fit-for-purpose. In this paper, we identify the challenges associated with UAV/drone forensics. We then explore and evaluate existing forensic guidelines, in terms of their effectiveness for UAV/drone forensic investigations. Next, we present our set of guidelines for UAV/drone investigations. Finally, we demonstrate how the proposed guidelines can be …
Detection And Recovery Of Anti-Forensic (Vault) Applications On Android Devices, Michaila Duncan, Umit Karabiyik
Detection And Recovery Of Anti-Forensic (Vault) Applications On Android Devices, Michaila Duncan, Umit Karabiyik
Annual ADFSL Conference on Digital Forensics, Security and Law
Significant number of mobile device users currently employ anti-forensics applications, also known as vault or locker applications, on their mobile devices in order to hide files such as photos. Because of this, investigators are required to spend a large portion of their time manually looking at the applications installed on the device. Currently, there is no automated method of detecting these anti-forensics applications on an Android device. This work presents the creation and testing of a vault application detection system to be used on Android devices. The main goal of this work is twofold: (i) Detecting and reporting the presence …
A Socioeconomic Valuation Of Urban Wetland Ecosystems And Policy Recommendation For College Lake, Michael Dunmyer
A Socioeconomic Valuation Of Urban Wetland Ecosystems And Policy Recommendation For College Lake, Michael Dunmyer
Student Scholar Showcase
The current dilemma of College Lake offers a unique case study for how urban ecosystems can not only subsist within cities but provide pivotal functions for them as well. With the potential for a dam-breaching storm event increasing in possibility with each passing year, concerns regarding the structural integrity of the College Lake dam in Lynchburg, VA have arisen. Such concerns have led the City of Lynchburg to consider reinforcement or removal of the dam in order to mitigate flood risks along the Blackwater Creek floodplain. Since its formation following the installation of the Depression-era dam, however, College Lake has …
Back Matter, Adfsl
Back Matter, Adfsl
Annual ADFSL Conference on Digital Forensics, Security and Law
No abstract provided.
Front Matter, Adfsl
Front Matter, Adfsl
Annual ADFSL Conference on Digital Forensics, Security and Law
No abstract provided.
Contents, Adfsl
Contents, Adfsl
Annual ADFSL Conference on Digital Forensics, Security and Law
No abstract provided.
Harnessing Predictive Models For Assisting Network Forensic Investigations Of Dns Tunnels, Irvin Homem, Panagiotis Papapetrou
Harnessing Predictive Models For Assisting Network Forensic Investigations Of Dns Tunnels, Irvin Homem, Panagiotis Papapetrou
Annual ADFSL Conference on Digital Forensics, Security and Law
In recent times, DNS tunneling techniques have been used for malicious purposes, however network security mechanisms struggle to detect them. Network forensic analysis has been proven effective, but is slow and effort intensive as Network Forensics Analysis Tools struggle to deal with undocumented or new network tunneling techniques. In this paper, we present a machine learning approach, based on feature subsets of network traffic evidence, to aid forensic analysis through automating the inference of protocols carried within DNS tunneling techniques. We explore four network protocols, namely, HTTP, HTTPS, FTP, and POP3. Three features are extracted from the DNS tunneled traffic: …
Kelihos Botnet: A Never-Ending Saga, Arsh Arora, Max Gannon, Gary Warner
Kelihos Botnet: A Never-Ending Saga, Arsh Arora, Max Gannon, Gary Warner
Annual ADFSL Conference on Digital Forensics, Security and Law
This paper investigates the recent behavior of the Kelihos botnet, a spam-sending botnet that accounts for many millions of emails sent each day. The paper demonstrates how a team of students are able to perform a longitudinal malware study, making significant observations and contributions to the understanding of a major botnet using tools and techniques taught in the classroom. From this perspective the paper has two objectives: encouragement and observation. First, by providing insight into the methodology and tools used by student researchers to document and understand a botnet, the paper strives to embolden other academic programs to follow a …
Building Partners For A Sustainable Kankakee River Basin Future, Brian D. Anderson
Building Partners For A Sustainable Kankakee River Basin Future, Brian D. Anderson
Kankakee River Watershed Conference
No abstract provided.
Understanding The Social And Human Dimension Of Energy Management In Shipping, Martin Viktorelius
Understanding The Social And Human Dimension Of Energy Management In Shipping, Martin Viktorelius
MARENER 2017
No abstract provided.
Fuel Saving In Coastal Areas, Karina Hjelmervik, Svend Nordby
Fuel Saving In Coastal Areas, Karina Hjelmervik, Svend Nordby
MARENER 2017
No abstract provided.
Plenary Session 3, Johan Röstin
Life Cycle Assessment Of Marine Coatings Applied To Ship Hulls, Yigit Kemal Demirel
Life Cycle Assessment Of Marine Coatings Applied To Ship Hulls, Yigit Kemal Demirel
MARENER 2017
No abstract provided.
Energy Efficiency Measures In Shipping From Operation And Maintenance Perspective, Manjurul Kabir
Energy Efficiency Measures In Shipping From Operation And Maintenance Perspective, Manjurul Kabir
MARENER 2017
No abstract provided.
Efficient Fuel Handling And Management In Port: Context Bangladesh, Razon Chandra Saha
Efficient Fuel Handling And Management In Port: Context Bangladesh, Razon Chandra Saha
MARENER 2017
No abstract provided.
Real Time Awareness For Mrv Data, Nikitas Nikitakos
Real Time Awareness For Mrv Data, Nikitas Nikitakos
MARENER 2017
No abstract provided.
Energy Efficient Port Operations In The Caribbean: Challenges And Possible Solutions, Deniece Aiken
Energy Efficient Port Operations In The Caribbean: Challenges And Possible Solutions, Deniece Aiken
MARENER 2017
No abstract provided.
Ocean Energy: Seeking The Balance Between States (Exclusive) Rights Of Exploitation And Marine Biodiversity Conservation, Wellington Boigues Corbalan Tebar
Ocean Energy: Seeking The Balance Between States (Exclusive) Rights Of Exploitation And Marine Biodiversity Conservation, Wellington Boigues Corbalan Tebar
MARENER 2017
No abstract provided.
Operational Measures To Reverse The Negative Effects Of The 0.1% Sulphur Limit On Ro-Ro Shipping, Thalis Zis
Operational Measures To Reverse The Negative Effects Of The 0.1% Sulphur Limit On Ro-Ro Shipping, Thalis Zis
MARENER 2017
No abstract provided.
A Conceptual Model For Oil Port Sustainability Policy Research – A Case Of Chinese Ports, Xuemuge Wang
A Conceptual Model For Oil Port Sustainability Policy Research – A Case Of Chinese Ports, Xuemuge Wang
MARENER 2017
No abstract provided.
Analyzing Approaches To Set Ghg Reduction Target In Anticipation Of Potential ‘Further Measures’ For International Shipping, Seijiro Morimoto
Analyzing Approaches To Set Ghg Reduction Target In Anticipation Of Potential ‘Further Measures’ For International Shipping, Seijiro Morimoto
MARENER 2017
No abstract provided.
An Integrated Vessel Performance System For Environmental Compliance, Søren Hansen
An Integrated Vessel Performance System For Environmental Compliance, Søren Hansen
MARENER 2017
No abstract provided.
Measuring Port Berth Utilisation With Automatic Identification System Data - Studying The Berth Utilisation Of Oslo Fjord Container Ports, Karina Hjelmervik, Halvor Schøyen
Measuring Port Berth Utilisation With Automatic Identification System Data - Studying The Berth Utilisation Of Oslo Fjord Container Ports, Karina Hjelmervik, Halvor Schøyen
MARENER 2017
No abstract provided.