Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Digital forensics (17)
- Approximate matching (7)
- Forensics (7)
- Security (6)
- Survey (6)
-
- Android (5)
- Mrsh-v2 (5)
- Cryptocurrency (4)
- Cyber forensics (4)
- Hashing (4)
- Mobile device forensics (4)
- Sdhash (4)
- Applications (3)
- Artifacts (3)
- Computer forensics (3)
- Cybersecurity (3)
- Digital Forensics (3)
- Education (3)
- Memory Forensics (3)
- Mobile forensics (3)
- Network forensics (3)
- Android forensics (2)
- Attacks (2)
- Bloom filter (2)
- Chemistry (2)
- Cyber Forensics (2)
- Digital evidence (2)
- Distributed storage attacks (2)
- Frameup (2)
- Fuzzy hashing (2)
- Publication Year
- Publication
-
- Electrical & Computer Engineering and Computer Science Faculty Publications (68)
- Chemistry and Chemical Engineering Faculty Publications (20)
- Civil Engineering Faculty Publications (2)
- Engineering and Applied Science Education Faculty Publications (1)
- Mechanical and Industrial Engineering Faculty Publications (1)
Articles 91 - 92 of 92
Full-Text Articles in Engineering
Self-Reported Cyber Crime: An Analysis On The Effects Of Anonymity And Pre-Employment Integrity, Ibrahim Baggili, Marcus Rogers
Self-Reported Cyber Crime: An Analysis On The Effects Of Anonymity And Pre-Employment Integrity, Ibrahim Baggili, Marcus Rogers
Electrical & Computer Engineering and Computer Science Faculty Publications
A key issue facing today’s society is the increase in cyber crimes. Cyber crimes pose threats to nations, organizations and individuals across the globe. Much of the research in cyber crime has risen from computer science-centric programs, and little experimental research has been performed on the psychology of cyber crime. This has caused a knowledge gap in the study of cyber crime. To this end, this research focuses on understanding psychological concepts related to cyber crime. Through an experimental design, participants were randomly assigned to three groups with varying degrees of anonymity. After each treatment, participants were asked to self-report …
An Ad Hoc Adaptive Hashing Technique For Non-Uniformly Distributed Ip Address Lookup In Computer Networks, Christopher Martinez, Wei-Ming Lin
An Ad Hoc Adaptive Hashing Technique For Non-Uniformly Distributed Ip Address Lookup In Computer Networks, Christopher Martinez, Wei-Ming Lin
Electrical & Computer Engineering and Computer Science Faculty Publications
Hashing algorithms have been widely adopted for fast address look-up, which involves a search through a database to find a record associated with a given key. Hashing algorithms transforms a key into a hash value hoping that the hashing renders the database a uniform distribution with respect to the hash value. The closer to uniform hash values, the less search time required for a query. When the database is key-wise uniformly distributed, any regular hashing algorithm (bit-extraction, bit-group XOR, etc.) leads to a statistically perfect uniform hash distribution. When the database has keys with a non-uniform distribution, performance of regular …