Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics

Conference

Institution
Keyword
Publication Year
Publication
File Type

Articles 31 - 60 of 250

Full-Text Articles in Public Affairs, Public Policy and Public Administration

Front Matter, Adfsl May 2018

Front Matter, Adfsl

Annual ADFSL Conference on Digital Forensics, Security and Law

No abstract provided.


Analysis Of Data Erasure Capability On Sshd Drives For Data Recovery, Andrew Blyth May 2018

Analysis Of Data Erasure Capability On Sshd Drives For Data Recovery, Andrew Blyth

Annual ADFSL Conference on Digital Forensics, Security and Law

Data Protection and Computer Forensics/Anti-Forensics has now become a critical area of concern for organizations. A key element to this is how data is sanitized at end of life. In this paper we explore Hybrid Solid State Hybrid Drives (SSHD) and the impact that various Computer Forensics and Data Recovery techniques have when performing data erasure upon a SSHD.


Knowledge Expiration In Security Awareness Training, Tianjian Zhang May 2018

Knowledge Expiration In Security Awareness Training, Tianjian Zhang

Annual ADFSL Conference on Digital Forensics, Security and Law

No abstract provided.


Positive Identification Of Lsb Image Steganography Using Cover Image Comparisons, Michael Pelosi, Nimesh Poudel, Pratap Lamichhane, Devon Lam, Gary Kessler, Joshua Macmonagle May 2018

Positive Identification Of Lsb Image Steganography Using Cover Image Comparisons, Michael Pelosi, Nimesh Poudel, Pratap Lamichhane, Devon Lam, Gary Kessler, Joshua Macmonagle

Annual ADFSL Conference on Digital Forensics, Security and Law

In this paper we introduce a new software concept specifically designed to allow the digital forensics professional to clearly identify and attribute instances of LSB image steganography by using the original cover image in side-by-side comparison with a suspected steganographic payload image. The “CounterSteg” software allows detailed analysis and comparison of both the original cover image and any modified image, using sophisticated bit- and color-channel visual depiction graphics. In certain cases, the steganographic software used for message transmission can be identified by the forensic analysis of LSB and other changes in the payload image. The paper demonstrates usage and typical …


Exploring The Use Of Graph Databases To Catalog Artifacts For Client Forensics, Rose Shumba May 2018

Exploring The Use Of Graph Databases To Catalog Artifacts For Client Forensics, Rose Shumba

Annual ADFSL Conference on Digital Forensics, Security and Law

Cloud computing has revolutionized the methods by which digital data is stored, processed, and transmitted. It is providing users with data storage and processing services, enabling access to resources through multiple devices. Although organizations continue to embrace the advantages of flexibility and scalability offered by cloud computing, insider threats are becoming a serious concern as cited by security researchers. Insiders can use authorized access to steal sensitive information, calling for the need for an investigation. This concept paper describes research in progress towards developing a Neo4j graph database tool to enhance client forensics. The tool, with a Python interface, allows …


Non-Use Of A Mobile Phone During Conducting Crime Can Also Be Evidential, Vinod Polpaya Bhattathiripad Ph D May 2018

Non-Use Of A Mobile Phone During Conducting Crime Can Also Be Evidential, Vinod Polpaya Bhattathiripad Ph D

Annual ADFSL Conference on Digital Forensics, Security and Law

Cyber-clever criminals who are aware of the consequence of using mobile phones during conducting crimes often stay away from their phones while involved in crimes. Some of them even change their handset and SIM card, subsequently. This article looks into how, intentional disassociation (and even unintentional non-use) of mobile phone in (non-cyber) crimes, can become evidential clues of the perpetrators’ involvement in criminal acts. With the help of a recent judicial episode, this article reveals how extremely careful and masterful handling of extensive and voluminous Call Details Records and tower dumps by a cyber-savvy investigating official can unearth evidential clues …


Live Gpu Forensics: The Process Of Recovering Video Frames From Nvidia Gpu, Yazeed M. Albabtain, Baijian Yang May 2018

Live Gpu Forensics: The Process Of Recovering Video Frames From Nvidia Gpu, Yazeed M. Albabtain, Baijian Yang

Annual ADFSL Conference on Digital Forensics, Security and Law

The purpose of this research is to apply a graphics processing unit (GPU) forensics method to recover video artifacts from NVIDIA GPU. The tested video specs are 512 x 512 in resolution for video 1 and 800 x 600 in resolution for video 2. Both videos are mpeg4 video codec. A VLC player was used in the experiment. A special program has been developed using OpenCL to recover 1) patterns that are frames consist of pixel values and 2) dump data from the GPU global memory. The dump data that represent the video frame were located using simple steps. The …


Unmanned Aerial Vehicle Forensic Investigation Process: Dji Phantom 3 Drone As A Case Study, Alan Roder, Kim-Kwang Raymond Choo, Nhien-A Le-Khac May 2018

Unmanned Aerial Vehicle Forensic Investigation Process: Dji Phantom 3 Drone As A Case Study, Alan Roder, Kim-Kwang Raymond Choo, Nhien-A Le-Khac

Annual ADFSL Conference on Digital Forensics, Security and Law

Drones (also known as Unmanned Aerial Vehicles – UAVs) are a potential source of evidence in a digital investigation, partly due to their increasing popularity in our society. However, existing UAV/drone forensics generally rely on conventional digital forensic investigation guidelines such as those of ACPO and NIST, which may not be entirely fit-for-purpose. In this paper, we identify the challenges associated with UAV/drone forensics. We then explore and evaluate existing forensic guidelines, in terms of their effectiveness for UAV/drone forensic investigations. Next, we present our set of guidelines for UAV/drone investigations. Finally, we demonstrate how the proposed guidelines can be …


Detection And Recovery Of Anti-Forensic (Vault) Applications On Android Devices, Michaila Duncan, Umit Karabiyik May 2018

Detection And Recovery Of Anti-Forensic (Vault) Applications On Android Devices, Michaila Duncan, Umit Karabiyik

Annual ADFSL Conference on Digital Forensics, Security and Law

Significant number of mobile device users currently employ anti-forensics applications, also known as vault or locker applications, on their mobile devices in order to hide files such as photos. Because of this, investigators are required to spend a large portion of their time manually looking at the applications installed on the device. Currently, there is no automated method of detecting these anti-forensics applications on an Android device. This work presents the creation and testing of a vault application detection system to be used on Android devices. The main goal of this work is twofold: (i) Detecting and reporting the presence …


A Socioeconomic Valuation Of Urban Wetland Ecosystems And Policy Recommendation For College Lake, Michael Dunmyer Apr 2018

A Socioeconomic Valuation Of Urban Wetland Ecosystems And Policy Recommendation For College Lake, Michael Dunmyer

Student Scholar Showcase

The current dilemma of College Lake offers a unique case study for how urban ecosystems can not only subsist within cities but provide pivotal functions for them as well. With the potential for a dam-breaching storm event increasing in possibility with each passing year, concerns regarding the structural integrity of the College Lake dam in Lynchburg, VA have arisen. Such concerns have led the City of Lynchburg to consider reinforcement or removal of the dam in order to mitigate flood risks along the Blackwater Creek floodplain. Since its formation following the installation of the Depression-era dam, however, College Lake has …


Back Matter, Adfsl Feb 2018

Back Matter, Adfsl

Annual ADFSL Conference on Digital Forensics, Security and Law

No abstract provided.


Front Matter, Adfsl Feb 2018

Front Matter, Adfsl

Annual ADFSL Conference on Digital Forensics, Security and Law

No abstract provided.


Contents, Adfsl Feb 2018

Contents, Adfsl

Annual ADFSL Conference on Digital Forensics, Security and Law

No abstract provided.


Harnessing Predictive Models For Assisting Network Forensic Investigations Of Dns Tunnels, Irvin Homem, Panagiotis Papapetrou May 2017

Harnessing Predictive Models For Assisting Network Forensic Investigations Of Dns Tunnels, Irvin Homem, Panagiotis Papapetrou

Annual ADFSL Conference on Digital Forensics, Security and Law

In recent times, DNS tunneling techniques have been used for malicious purposes, however network security mechanisms struggle to detect them. Network forensic analysis has been proven effective, but is slow and effort intensive as Network Forensics Analysis Tools struggle to deal with undocumented or new network tunneling techniques. In this paper, we present a machine learning approach, based on feature subsets of network traffic evidence, to aid forensic analysis through automating the inference of protocols carried within DNS tunneling techniques. We explore four network protocols, namely, HTTP, HTTPS, FTP, and POP3. Three features are extracted from the DNS tunneled traffic: …


Kelihos Botnet: A Never-Ending Saga, Arsh Arora, Max Gannon, Gary Warner May 2017

Kelihos Botnet: A Never-Ending Saga, Arsh Arora, Max Gannon, Gary Warner

Annual ADFSL Conference on Digital Forensics, Security and Law

This paper investigates the recent behavior of the Kelihos botnet, a spam-sending botnet that accounts for many millions of emails sent each day. The paper demonstrates how a team of students are able to perform a longitudinal malware study, making significant observations and contributions to the understanding of a major botnet using tools and techniques taught in the classroom. From this perspective the paper has two objectives: encouragement and observation. First, by providing insight into the methodology and tools used by student researchers to document and understand a botnet, the paper strives to embolden other academic programs to follow a …


Building Partners For A Sustainable Kankakee River Basin Future, Brian D. Anderson Feb 2017

Building Partners For A Sustainable Kankakee River Basin Future, Brian D. Anderson

Kankakee River Watershed Conference

No abstract provided.


Understanding The Social And Human Dimension Of Energy Management In Shipping, Martin Viktorelius Jan 2017

Understanding The Social And Human Dimension Of Energy Management In Shipping, Martin Viktorelius

MARENER 2017

No abstract provided.


Fuel Saving In Coastal Areas, Karina Hjelmervik, Svend Nordby Jan 2017

Fuel Saving In Coastal Areas, Karina Hjelmervik, Svend Nordby

MARENER 2017

No abstract provided.


Plenary Session 3, Johan Röstin Jan 2017

Plenary Session 3, Johan Röstin

MARENER 2017

No abstract provided.


Life Cycle Assessment Of Marine Coatings Applied To Ship Hulls, Yigit Kemal Demirel Jan 2017

Life Cycle Assessment Of Marine Coatings Applied To Ship Hulls, Yigit Kemal Demirel

MARENER 2017

No abstract provided.


Energy Efficiency Measures In Shipping From Operation And Maintenance Perspective, Manjurul Kabir Jan 2017

Energy Efficiency Measures In Shipping From Operation And Maintenance Perspective, Manjurul Kabir

MARENER 2017

No abstract provided.


Efficient Fuel Handling And Management In Port: Context Bangladesh, Razon Chandra Saha Jan 2017

Efficient Fuel Handling And Management In Port: Context Bangladesh, Razon Chandra Saha

MARENER 2017

No abstract provided.


Real Time Awareness For Mrv Data, Nikitas Nikitakos Jan 2017

Real Time Awareness For Mrv Data, Nikitas Nikitakos

MARENER 2017

No abstract provided.


Energy Efficient Port Operations In The Caribbean: Challenges And Possible Solutions, Deniece Aiken Jan 2017

Energy Efficient Port Operations In The Caribbean: Challenges And Possible Solutions, Deniece Aiken

MARENER 2017

No abstract provided.


Ocean Energy: Seeking The Balance Between States (Exclusive) Rights Of Exploitation And Marine Biodiversity Conservation, Wellington Boigues Corbalan Tebar Jan 2017

Ocean Energy: Seeking The Balance Between States (Exclusive) Rights Of Exploitation And Marine Biodiversity Conservation, Wellington Boigues Corbalan Tebar

MARENER 2017

No abstract provided.


Operational Measures To Reverse The Negative Effects Of The 0.1% Sulphur Limit On Ro-Ro Shipping, Thalis Zis Jan 2017

Operational Measures To Reverse The Negative Effects Of The 0.1% Sulphur Limit On Ro-Ro Shipping, Thalis Zis

MARENER 2017

No abstract provided.


A Conceptual Model For Oil Port Sustainability Policy Research – A Case Of Chinese Ports, Xuemuge Wang Jan 2017

A Conceptual Model For Oil Port Sustainability Policy Research – A Case Of Chinese Ports, Xuemuge Wang

MARENER 2017

No abstract provided.


Analyzing Approaches To Set Ghg Reduction Target In Anticipation Of Potential ‘Further Measures’ For International Shipping, Seijiro Morimoto Jan 2017

Analyzing Approaches To Set Ghg Reduction Target In Anticipation Of Potential ‘Further Measures’ For International Shipping, Seijiro Morimoto

MARENER 2017

No abstract provided.


An Integrated Vessel Performance System For Environmental Compliance, Søren Hansen Jan 2017

An Integrated Vessel Performance System For Environmental Compliance, Søren Hansen

MARENER 2017

No abstract provided.


Measuring Port Berth Utilisation With Automatic Identification System Data - Studying The Berth Utilisation Of Oslo Fjord Container Ports, Karina Hjelmervik, Halvor Schøyen Jan 2017

Measuring Port Berth Utilisation With Automatic Identification System Data - Studying The Berth Utilisation Of Oslo Fjord Container Ports, Karina Hjelmervik, Halvor Schøyen

MARENER 2017

No abstract provided.