Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 38

Full-Text Articles in Engineering

Improving The Integration Of Launch And Reentry Operations Into The National Airspace System, Gwendolyn Mazzotta, Daniel P. Murray Nov 2015

Improving The Integration Of Launch And Reentry Operations Into The National Airspace System, Gwendolyn Mazzotta, Daniel P. Murray

Space Traffic Management Conference

With increasing commercial space activities occurring in the National Airspace System, the FAA has identified a need for more efficient management of the NAS with respect to commercial space operations. Current methods for integration of aviation and space activities employ a segregation approach, in which hazard areas are constructed around launch and reentry operations and sections of airspace are closed to other users. Mission objectives and vehicle characteristics dictate the extent of the closure in terms of location, duration, and volume of airspace affected. Launches, reentries, and other operations have an effect on other NAS stakeholders, causing delays, changes to …


Evaluating Launch Vehicle / Reentry Vehicle (Lv/Rv) Separation Concepts, Zheng Tao, Ganghuai Wang, Tudor Masek, Thomas J. St. Clair Nov 2015

Evaluating Launch Vehicle / Reentry Vehicle (Lv/Rv) Separation Concepts, Zheng Tao, Ganghuai Wang, Tudor Masek, Thomas J. St. Clair

Space Traffic Management Conference

Launch Vehicle/Reentry Vehicle (LV/RV) operations are expected to increase across the National Airspace System (NAS) as their reliability and availability improve. LV/RV designs and the industry landscape have vastly changed since the 1960’s, and the Federal Aviation Administration’s (FAA) methods for handling these operations need to evolve to support the expected growth. Currently, large amounts of airspace are segregated for every LV/RV operation. This increases costs for NAS users and may limit LV/RV opportunities. The FAA’s NextGen office recently proposed two more efficient separation concepts for LV/RV operations called Space Transition Corridors, and Four-Dimensional Trajectory Deconfliction. Prior safety research for …


Safe Operations Above Fl600, Lt. Col. Stephen Hunter Nov 2015

Safe Operations Above Fl600, Lt. Col. Stephen Hunter

Space Traffic Management Conference

Safe Operations Above FL600

Abstract

With the increase in likelihood of near-term development of revenue-generating point-to-point suborbital flights and the increase in high-altitude-long-endurance commercial operations above FL600, the criticality of addressing operations above class A airspace has never been more pressing. While the Federal Aviation Administration describes the National Airspace System, it doesn’t offer a description that includes a top. Technological, physiological, physical and administrative limitations have relegated most air operations to FL600 and below. As that changes, previous work on Space Traffic Management (STM) concepts begin to take on new life and add to sincere considerations for adaptation or …


Hot Surface Ignition, Yerbatyr Tursyn, Vikrant Goyal, Alicia Benhidjeb-Carayon, Richard Simmons, Scott Meyer, Jay P. Gore Aug 2015

Hot Surface Ignition, Yerbatyr Tursyn, Vikrant Goyal, Alicia Benhidjeb-Carayon, Richard Simmons, Scott Meyer, Jay P. Gore

The Summer Undergraduate Research Fellowship (SURF) Symposium

Undesirable hot surface ignition of flammable liquids is one of the hazards in ground and air transportation vehicles, which primarily occurs in the engine compartment. In order to evaluate the safety and sustainability of candidate replacement fuels with respect to hot surface ignition, a baseline low lead fuel (Avgas 100 LL) and four experimental unleaded aviation fuels recommended for reciprocating aviation engines were considered. In addition, hot surface ignition properties of the gas turbine fuels Jet-A, JP-8, and JP-5 were measured. A test apparatus capable of providing reproducible data was designed and fabricated to experimentally investigate the hot surface ignition …


Identifying Mode Confusion In Recorded Aircraft Data, James Douglas Thomas, Yul Kwon, Steven J. Landry Aug 2015

Identifying Mode Confusion In Recorded Aircraft Data, James Douglas Thomas, Yul Kwon, Steven J. Landry

The Summer Undergraduate Research Fellowship (SURF) Symposium

In recent decades, commercial aviation accidents have occurred due to human-machine interaction (HMI) problems known as “mode confusion.” This is caused, in some cases, by a lack of understanding of onboard systems by pilots. Large amounts of Flight Operational Quality Assurance (FOQA) data are available, analysis of which could assist in identification of safety risks in daily operations. Through analysis of pilot reactions and recorded aircraft data, methods to detect mode confusion are developed to improve aviation safety. This study was conducted by inducing mode confusion into a flight simulation scenario and analyzing aircraft data to detect emerging patterns. Three …


Tracking Criminals On Facebook: A Case Study From A Digital Forensics Reu Program, Daniel Weiss, Gary Warner May 2015

Tracking Criminals On Facebook: A Case Study From A Digital Forensics Reu Program, Daniel Weiss, Gary Warner

Annual ADFSL Conference on Digital Forensics, Security and Law

The 2014 Digital Forensics Research Experience for Undergraduates (REU) Program at the University of Alabama at Birmingham (UAB) focused its summer efforts on tracking criminal forums and Facebook groups. The UAB-REU Facebook team was provided with a list of about 60 known criminal groups on Facebook, with a goal to track illegal information posted in these groups and ultimately store the information in a searchable database for use by digital forensic analysts. Over the course of about eight weeks, the UAB-REU Facebook team created a database with over 400 Facebook groups conducting criminal activity along with over 100,000 unique users …


Towards A Digital Forensics Competency-Based Program: Making Assessment Count, Rose Shumba May 2015

Towards A Digital Forensics Competency-Based Program: Making Assessment Count, Rose Shumba

Annual ADFSL Conference on Digital Forensics, Security and Law

This paper describes an approach that UMUC has initiated to revise its graduate programs to a Competency-Based Education (CBE) curriculum. The approach, which is Learning Demonstration (LD) centric, includes the identification of learning goals and competences, identification and description of the LDs, mapping of the LDs to the competences, scripting the LDs, placing the LDs into the respective courses, validating the developed materials, and the development of the open learning resources. Programs in the Cybersecurity and Information Assurance Department, including the Digital Forensics and Cyber Investigations program, are being revised. An LD centric approach to curriculum development helps align programs …


Phishing Intelligence Using The Simple Set Comparison Tool, Jason Britt, Alan Sprague, Gary Warner May 2015

Phishing Intelligence Using The Simple Set Comparison Tool, Jason Britt, Alan Sprague, Gary Warner

Annual ADFSL Conference on Digital Forensics, Security and Law

Phishing websites, phish, attempt to deceive users into exposing their passwords, user IDs, and other sensitive information by imitating legitimate websites, such as banks, product vendors, and service providers. Phishing investigators need fast automated tools to analyze the volume of phishing attacks seen today. In this paper, we present the Simple Set Comparison tool. The Simple Set Comparison tool is a fast automated tool that groups phish by imitated brand allowing phishing investigators to quickly identify and focus on phish targeting a particular brand. The Simple Set Comparison tool is evaluated against a traditional clustering algorithm over a month's worth …


Identifying Common Characteristics Of Malicious Insiders, Nan Liang, David Biros May 2015

Identifying Common Characteristics Of Malicious Insiders, Nan Liang, David Biros

Annual ADFSL Conference on Digital Forensics, Security and Law

Malicious insiders account for large proportion of security breaches or other kinds of loss for organizations and have drawn attention of both academics and practitioners. Although methods and mechanism have been developed to monitor potential insider via electronic data monitoring, few studies focus on predicting potential malicious insiders. Based on the theory of planned behavior, certain cues should be observed or expressed when an individual performs as a malicious insider. Using text mining to analyze various media content of existing insider cases, we strive to develop a method to identify crucial and common indicators that an individual might be a …


Continuous Monitoring System Based On Systems' Environment, Eli Weintraub, Yuval Cohen May 2015

Continuous Monitoring System Based On Systems' Environment, Eli Weintraub, Yuval Cohen

Annual ADFSL Conference on Digital Forensics, Security and Law

We present a new framework (and its mechanisms) of a Continuous Monitoring System (CMS) having new improved capabilities, and discuss its requirements and implications. The CMS is based on the real-time actual configuration of the system and the environment rather than a theoretic or assumed configuration. Moreover, the CMS predicts organizational damages taking into account chains of impacts among systems' components generated by messaging among software components. In addition, the CMS takes into account all organizational effects of an attack. Its risk measurement takes into account the consequences of a threat, as defines in risk analysis standards. Loss prediction is …


Html5 Zero Configuration Covert Channels: Security Risks And Challenges, Jason Farina, Mark Scanlon, Stephen Kohlmann, Nhien-An Le-Khac, Tahar Kechadi May 2015

Html5 Zero Configuration Covert Channels: Security Risks And Challenges, Jason Farina, Mark Scanlon, Stephen Kohlmann, Nhien-An Le-Khac, Tahar Kechadi

Annual ADFSL Conference on Digital Forensics, Security and Law

In recent months there has been an increase in the popularity and public awareness of secure, cloudless file transfer systems. The aim of these services is to facilitate the secure transfer of files in a peer-to-peer (P2P) fashion over the Internet without the need for centralized authentication or storage. These services can take the form of client installed applications or entirely web browser based interfaces. Due to the P2P nature, there is generally no limit to the file sizes involved or to the volume of data transmitted - and where these limitations do exist they will be purely reliant on …


Measuring Hacking Ability Using A Conceptual Expertise Task, Justin S. Giboney, Jeffrey G. Proudfoot, Sanjay Goel, Joseph S. Valacich May 2015

Measuring Hacking Ability Using A Conceptual Expertise Task, Justin S. Giboney, Jeffrey G. Proudfoot, Sanjay Goel, Joseph S. Valacich

Annual ADFSL Conference on Digital Forensics, Security and Law

Hackers pose a continuous and unrelenting threat to organizations. Industry and academic researchers alike can benefit from a greater understanding of how hackers engage in criminal behavior. A limiting factor of hacker research is the inability to verify that self-proclaimed hackers participating in research actually possess their purported knowledge and skills. This paper presents current work in developing and validating a conceptual-expertise based tool that can be used to discriminate between novice and expert hackers. The implications of this work are promising since behavioral information systems researchers operating in the information security space will directly benefit from the validation of …


Invited Paper - A Profile Of Prolonged, Persistent Ssh Attack On A Kippo Based Honeynet, Craig Valli, Priya Rabadia, Andrew Woodard May 2015

Invited Paper - A Profile Of Prolonged, Persistent Ssh Attack On A Kippo Based Honeynet, Craig Valli, Priya Rabadia, Andrew Woodard

Annual ADFSL Conference on Digital Forensics, Security and Law

This paper is an investigation focusing on activities detected by SSH honeypots that utilised kippo honeypot software. The honeypots were located across a variety of geographical locations and operational platforms. The honeynet has suffered prolonged, persistent and attack from a /24 network which appears to be of Chinese geographical origin. In addition to these attacks, other attackers have been successful in compromising real hosts in a wide range of other countries that were subsequently involved in attacking the honeypot machines in the honeynet.

Keywords: Cyber Security, SSH, Secure Shell, Honeypots, Kippo


Inivited Paper - Potential Changes To Ediscovery Rules In Federal Court: A Discussion Of The Process, Substantive Changes And Their Applicability And Impact On Virginia Practice, Joseph J. Schwerha, Susan L. Mitchell, John W. Bagby May 2015

Inivited Paper - Potential Changes To Ediscovery Rules In Federal Court: A Discussion Of The Process, Substantive Changes And Their Applicability And Impact On Virginia Practice, Joseph J. Schwerha, Susan L. Mitchell, John W. Bagby

Annual ADFSL Conference on Digital Forensics, Security and Law

The Federal Rules of Civil Procedure (FRCP) are subject to a unique process also once used in revising the Federal Rules of Evidence (FRE). Today, this process is followed in revisions of the FRCP, the Federal Rules of Criminal Procedure and the Federal Bankruptcy Rules. This unique rulemaking process differs significantly from traditional notice and comment rulemaking required for a majority of federal regulatory agencies under the Administrative Procedure Act (APA).1 Most notably, rule-making for the federal courts’ procedural matters remain unaffected by the invalidation of legislative veto. It is still widely, but wrongly believed, that the legislative veto was …


On The Network Performance Of Digital Evidence Acquisition Of Small Scale Devices Over Public Networks, Irvin Homem, Spyridon Dosis May 2015

On The Network Performance Of Digital Evidence Acquisition Of Small Scale Devices Over Public Networks, Irvin Homem, Spyridon Dosis

Annual ADFSL Conference on Digital Forensics, Security and Law

While cybercrime proliferates – becoming more complex and surreptitious on the Internet – the tools and techniques used in performing digital investigations are still largely lagging behind, effectively slowing down law enforcement agencies at large. Real-time remote acquisition of digital evidence over the Internet is still an elusive ideal in the combat against cybercrime. In this paper we briefly describe the architecture of a comprehensive proactive digital investigation system that is termed as the Live Evidence Information Aggregator (LEIA). This system aims at collecting digital evidence from potentially any device in real time over the Internet. Particular focus is made …


A Review Of Recent Case Law Related To Digital Forensics: The Current Issues, Kelly A. Cole, Shruti Gupta, Dheeraj Gurugubelli, Marcus K. Rogers May 2015

A Review Of Recent Case Law Related To Digital Forensics: The Current Issues, Kelly A. Cole, Shruti Gupta, Dheeraj Gurugubelli, Marcus K. Rogers

Annual ADFSL Conference on Digital Forensics, Security and Law

Digital forensics is a new field without established models of investigation. This study uses thematic analysis to explore the different issues seen in the prosecution of digital forensic investigations. The study looks at 100 cases from different federal appellate courts to analyze the cause of the appeal. The issues are categorized into one of four categories, ‘search and seizure’, ‘data analysis’, ‘presentation’ and ‘legal issues’. The majority of the cases reviewed related to the search and seizure activity.

Keywords: Computer Investigation, Case Law, Digital Forensics, Legal Issues, and Courts


A New Cyber Forensic Philosophy For Digital Watermarks In The Context Of Copyright Laws, Vinod P. Bhattathiripad, Sneha Sudhakaran, Roshna K. Thalayaniyil May 2015

A New Cyber Forensic Philosophy For Digital Watermarks In The Context Of Copyright Laws, Vinod P. Bhattathiripad, Sneha Sudhakaran, Roshna K. Thalayaniyil

Annual ADFSL Conference on Digital Forensics, Security and Law

The objective of this paper is to propose a new cyber forensic philosophy for watermark in the context of copyright laws for the benefit of the forensic community and the judiciary worldwide. The paper first briefly introduces various types of watermarks, and then situates watermarks in the context of the ideaexpression dichotomy and the copyright laws. It then explains the forensic importance of watermarks and proposes a forensic philosophy for them in the context of copyright laws. Finally, the paper stresses the vital need to incorporate watermarks in the forensic tests to establish software copyright infringement and also urges the …


A Survey Of Software-Based String Matching Algorithms For Forensic Analysis, Yi-Ching Liao May 2015

A Survey Of Software-Based String Matching Algorithms For Forensic Analysis, Yi-Ching Liao

Annual ADFSL Conference on Digital Forensics, Security and Law

Employing a fast string matching algorithm is essential for minimizing the overhead of extracting structured files from a raw disk image. In this paper, we summarize the concept, implementation, and main features of ten software-based string matching algorithms, and evaluate their applicability for forensic analysis. We provide comparisons between the selected software-based string matching algorithms from the perspective of forensic analysis by conducting their performance evaluation for file carving. According to the experimental results, the Shift-Or algorithm (R. Baeza-Yates & Gonnet, 1992) and the Karp-Rabin algorithm (Karp & Rabin, 1987) have the minimized search time for identifying the locations of …


Investigating Forensics Values Of Windows Jump Lists Data, Ahmad Ghafarian May 2015

Investigating Forensics Values Of Windows Jump Lists Data, Ahmad Ghafarian

Annual ADFSL Conference on Digital Forensics, Security and Law

Starting with Windows 7, Microsoft introduced a new feature to the Windows Operating Systems called Jump Lists. Jump Lists stores information about user activities on the host machine. These activities may include links to the recently visited web pages, applications executed, or files processed. Computer forensics investigators may find traces of misuse in Jump Lists auto saved files. In this research, we investigate the forensics values of Jump Lists data. Specifically, we use several tools to view Jump Lists data on a virtual machine. We show that each tool reveal certain types of information about user’s activity on the host …


An Empirical Comparison Of Widely Adopted Hash Functions In Digital Forensics: Does The Programming Language And Operating System Make A Difference?, Satyendra Gurjar, Ibrahim Baggili, Frank Breitinger, Alice Fischer May 2015

An Empirical Comparison Of Widely Adopted Hash Functions In Digital Forensics: Does The Programming Language And Operating System Make A Difference?, Satyendra Gurjar, Ibrahim Baggili, Frank Breitinger, Alice Fischer

Annual ADFSL Conference on Digital Forensics, Security and Law

Hash functions are widespread in computer sciences and have a wide range of applications such as ensuring integrity in cryptographic protocols, structuring database entries (hash tables) or identifying known files in forensic investigations. Besides their cryptographic requirements, a fundamental property of hash functions is efficient and easy computation which is especially important in digital forensics due to the large amount of data that needs to be processed when working on cases. In this paper, we correlate the runtime efficiency of common hashing algorithms (MD5, SHA-family) and their implementation. Our empirical comparison focuses on C-OpenSSL, Python, Ruby, Java on Windows and …


Two Challenges Of Stealthy Hypervisors Detection: Time Cheating And Data Fluctuations, Igor Korkin May 2015

Two Challenges Of Stealthy Hypervisors Detection: Time Cheating And Data Fluctuations, Igor Korkin

Annual ADFSL Conference on Digital Forensics, Security and Law

Hardware virtualization technologies play a significant role in cyber security. On the one hand these technologies enhance security levels, by designing a trusted operating system. On the other hand these technologies can be taken up into modern malware which is rather hard to detect. None of the existing methods is able to efficiently detect a hypervisor in the face of countermeasures such as time cheating, temporary self-uninstalling, memory hiding etc. New hypervisor detection methods which will be described in this paper can detect a hypervisor under these countermeasures and even count several nested ones. These novel approaches rely on the …


Atmospheric Weather Balloon For Near Space Research, Francisco F. Pastrana, Devonte Grantham, Shane M. Williams, Jessy Law, Jennifer Nason, Janet Marrnane Jan 2015

Atmospheric Weather Balloon For Near Space Research, Francisco F. Pastrana, Devonte Grantham, Shane M. Williams, Jessy Law, Jennifer Nason, Janet Marrnane

Aviation / Aeronautics / Aerospace International Research Conference

Atmospheric Weather Balloon for Near Space Research

The Society for S.P.A.C.E. has been working on the development of a weather balloon that will reach a height of 80 to 100 thousand feet and will collect data from the atmosphere. The weather balloon is attached to a Styrofoam box that contains an Arduino board controlling a set of sensors that will measure: temperature, humidity, atmospheric pressure, wind speed and direction.

The data will be collected and transmitted through an Xbee antenna that will provide us with remote monitoring capabilities. The data and images gathered will aid understanding of the characteristics and …


Aviation Security Impacts Of Meteorological And Climatic Disruption, Melanie Wetzel Jan 2015

Aviation Security Impacts Of Meteorological And Climatic Disruption, Melanie Wetzel

Aviation / Aeronautics / Aerospace International Research Conference

Commercial and military flight operations are frequently imperiled or disrupted by meteorological conditions. Severe weather events and climate-related factors create aviation security impacts on airport siting and reliability, human safety, economic stability, military defense strategy, aircraft routing and computer systems vulnerability. Climate trends have been associated with increased frequency of storm surge incursions at coastal airports, intense snowfall accumulations, runway closures due to rainstorm runoff, extended periods of fog/stratus restrictions and severe-weather related risk from lightning, hail and icing. The economic and safety impacts of these events are being incorporated into long-term planning by the U.S. Department of Defense (DoD), …


The Value Of Professional Security Industry Certifications, Daniel Benny Ph.D Jan 2015

The Value Of Professional Security Industry Certifications, Daniel Benny Ph.D

Aviation / Aeronautics / Aerospace International Research Conference

In the security and aviation community there are many professional security certifications that can be achieved in all disciplines of security. Those pertinent to aviation will be explored.


Low Fidelity Flight Simulation In Collegiate Aviation, Vladimir N. Risukhin Jan 2015

Low Fidelity Flight Simulation In Collegiate Aviation, Vladimir N. Risukhin

Aviation / Aeronautics / Aerospace International Research Conference

Aviation college pilot training programs, lessons and exercises contain portions that do not require training in sophisticated and highly expensive full flight simulators and flight training devices (FTD) with high fidelity of simulation, or in real aircraft flights. Relatively inexpensive personal-computer-based flight simulation facilities named low fidelity simulators (LFS) can boost development of aircraft pilots’ cognitive and behavioral skills. The paper attempts to reveal how the LFS can support aviation college flight training and research activities. In the Western Michigan University College of Aviation, peer mentoring technique proven to be helpful in higher education institutions has been applied to flight …


Microcontrollers In The Aviation Classroom, Padraig Houlahan Jan 2015

Microcontrollers In The Aviation Classroom, Padraig Houlahan

Aviation / Aeronautics / Aerospace International Research Conference

Modern commercial aircraft are increasingly dependent on digital technologies that detect sensor data and pilot control movements, interpret them, and then issue appropriate control signals to remote motors that move control surfaces. Because such technologies are innately complex, it would appear there is an unacceptably large academic burden on introducing them into the undergraduate pilot's curriculum .

However, in recent years there has been an explosion of interest in using micro-controllers in academic teaching (high-school and undergraduate levels) and in hobby applications, resulting in a large, online, freely available knowledgebase of techniques and solutions. Here, I demonstrate how easy it …


Unlocking The Mysteries Of Flight: From The Top Down, Juan Merkt Jan 2015

Unlocking The Mysteries Of Flight: From The Top Down, Juan Merkt

Aviation / Aeronautics / Aerospace International Research Conference

Traditionally, principles of flight are taught from the bottom-up. That is, we start by examining underlying causes (properties of air) and later move up to top consequences (aircraft performance). This traditional approach is analogous to that used by airplane designers and is most obvious in theory of flight textbooks for pilots. The problem with a bottom-up approach is that it introduces basic concepts as isolated “parts” without providing a “big picture” context. This can lead to poor understanding among student pilots. I suggest an opposite approach. Rather than starting with the underlying causes of flight, we can unravel basic principles …


Assessing The Commercial Aviation Impact Of The Year 2000 Open Skies Agreements Between The United States And African Countries With Longstanding Flights, Tyler B. Spence, Micah Walala, Richard O. Fanjoy Jan 2015

Assessing The Commercial Aviation Impact Of The Year 2000 Open Skies Agreements Between The United States And African Countries With Longstanding Flights, Tyler B. Spence, Micah Walala, Richard O. Fanjoy

Aviation / Aeronautics / Aerospace International Research Conference

The U.S. started a comprehensive campaign towards Open Skies agreement in 1992. The major benefits of Open sky agreement are reported to include increase of passenger and cargo volume between partners. This study analyzes passenger traffic and cargo volume between six African countries that have had commercial aviation with the U.S. since 1990 to 2014, and with direct flights between them. Two of the countries have had no Open Skies agreement with the U.S., while four have had Open Skies agreement beginning in 2000. A multi linear modeling process was applied on the two categories to determine whether there is …


Thinking Rather Than Panicking About The Current Drone Threat, Tom Foley, Tyrone Groh Jan 2015

Thinking Rather Than Panicking About The Current Drone Threat, Tom Foley, Tyrone Groh

Aviation / Aeronautics / Aerospace International Research Conference

Originally titled "UAS Threats in Sport Venues," the authors opted to expand their focus to better to all threats from UASs, and to encourage better preparation for and responses to such threats. Foley and Groh discuss different strategies.


Aerospace Renaissance – Ripe For Research To Impact The Industry, Constantine M. Koursaris, Brig. Gen. Robert E. Mansfield Jr. (Ret.) Jan 2015

Aerospace Renaissance – Ripe For Research To Impact The Industry, Constantine M. Koursaris, Brig. Gen. Robert E. Mansfield Jr. (Ret.)

Aviation / Aeronautics / Aerospace International Research Conference

The Center for Aviation and Aerospace Leadership (CAAL) was founded in 2008 to capture, create, and share relevant information on leadership in the aviation and aerospace industry.

The AIR is developed and published in collaboration with the Aerospace Industries Association and includes:

• Information on the status of aerospace manufacturing in the United States and state of the economy

• An in-depth review of sales across the various sectors of the industry, employment trends, key international trade statistics, financial information on the industry & major aerospace firms, trends to watch, and a forecast for the future based on a review …