Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Physical Sciences and Mathematics (13)
- Computer Sciences (10)
- Computer Engineering (9)
- Electrical and Computer Engineering (9)
- Information Security (9)
-
- Social and Behavioral Sciences (9)
- Forensic Science and Technology (8)
- Legal Studies (8)
- Operations Research, Systems Engineering and Industrial Engineering (7)
- Engineering Education (6)
- Chemical Engineering (3)
- Chemistry (3)
- Education (3)
- Educational Assessment, Evaluation, and Research (2)
- Civil Engineering (1)
- Civil and Environmental Engineering (1)
- Communication (1)
- Communication Technology and New Media (1)
- Educational Methods (1)
- Environmental Engineering (1)
- Higher Education (1)
- Industrial Engineering (1)
- Mechanical Engineering (1)
- Social Media (1)
- Keyword
-
- Attacks (2)
- Cryptocurrency (2)
- Distributed storage attacks (2)
- Frameup (2)
- Security (2)
-
- Alkynes (1)
- Applications (1)
- Approximate matching (1)
- Artifact lookup (1)
- Artifacts (1)
- Artificial Intelligence Forensics (1)
- Artificial Intelligence Safety (1)
- Artificial intelligence (1)
- Atomic dispersion (1)
- Carving (1)
- Catalysts (1)
- Child sexual abuse material (1)
- Cloud (1)
- Cloud storage (1)
- Cloud storage. (1)
- Computer security (1)
- Cyber Forensics (1)
- Data analytics (1)
- Data science (1)
- Database lookup problem (1)
- Defect-rich graphene (1)
- Definition (1)
- Dehydrogenation (1)
- Digital forensic tools (1)
- Digital forensics (1)
- Publication
-
- Electrical & Computer Engineering and Computer Science Faculty Publications (9)
- Engineering and Applied Science Education Faculty Publications (6)
- Chemistry and Chemical Engineering Faculty Publications (3)
- Civil Engineering Faculty Publications (1)
- Mechanical and Industrial Engineering Faculty Publications (1)
Articles 1 - 20 of 20
Full-Text Articles in Engineering
Founding The Domain Of Ai Forensics, Ibrahim Baggili, Vahid Behzadan
Founding The Domain Of Ai Forensics, Ibrahim Baggili, Vahid Behzadan
Electrical & Computer Engineering and Computer Science Faculty Publications
With the widespread integration of AI in everyday and critical technologies, it seems inevitable to witness increasing instances of failure in AI systems. In such cases, there arises a need for technical investigations that produce legally acceptable and scientifically indisputable findings and conclusions on the causes of such failures. Inspired by the domain of cyber forensics, this paper introduces the need for the establishment of AI Forensics as a new discipline under AI safety. Furthermore, we propose a taxonomy of the subfields under this discipline, and present a discussion on the foundational challenges that lay ahead of this new research …
Map My Murder: A Digital Forensic Study Of Mobile Health And Fitness Applications, Courtney Hassenfeldt, Shabana Baig, Ibrahim Baggili, Xiaolu Zhang
Map My Murder: A Digital Forensic Study Of Mobile Health And Fitness Applications, Courtney Hassenfeldt, Shabana Baig, Ibrahim Baggili, Xiaolu Zhang
Electrical & Computer Engineering and Computer Science Faculty Publications
The ongoing popularity of health and fitness applications catalyzes
the need for exploring forensic artifacts produced by them. Sensitive
Personal Identifiable Information (PII) is requested by the applications
during account creation. Augmenting that with ongoing
user activities, such as the user’s walking paths, could potentially
create exculpatory or inculpatory digital evidence. We conducted
extensive manual analysis and explored forensic artifacts produced
by (n = 13) popular Android mobile health and fitness applications.
We also developed and implemented a tool that aided in the timely
acquisition and identification of artifacts from the examined applications.
Additionally, our work explored the type of …
Iot Ignorance Is Digital Forensics Research Bliss: A Survey To Understand Iot Forensics Definitions, Challenges And Future Research Directions, Tina Wu, Frank Breitinger, Ibrahim Baggili
Iot Ignorance Is Digital Forensics Research Bliss: A Survey To Understand Iot Forensics Definitions, Challenges And Future Research Directions, Tina Wu, Frank Breitinger, Ibrahim Baggili
Electrical & Computer Engineering and Computer Science Faculty Publications
Interactions with IoT devices generates vast amounts of personal data that can be used as a source of evidence in digital investigations. Currently, there are many challenges in IoT forensics such as the difficulty in acquiring and analysing IoT data/devices and the lack IoT forensic tools. Besides technical challenges, there are many concepts in IoT forensics that have yet to be explored such as definitions, experience and capability in the analysis of IoT data/devices and current/future challenges. A deeper understanding of these various concepts will help progress the field. To achieve this goal, we conducted a survey which received 70 …
”Cyberworld” As A Theme For A University-Wide First-Year Common Course, Kristen Przyborski, Frank Breitinger, Lauren Beck, Ronald S. Harichandran
”Cyberworld” As A Theme For A University-Wide First-Year Common Course, Kristen Przyborski, Frank Breitinger, Lauren Beck, Ronald S. Harichandran
Engineering and Applied Science Education Faculty Publications
Nowadays we all live in a cyber world and use the internet for emailing, banking, streaming video, shopping, reading news, or other activities. Given all the time people spend online, it is important that all students (regardless of their major) learn some basics about living in a cyber world, e.g., strategies for online safety, impact of artificial intelligence, digital forensics or ancestry.com. To facilitate students from many majors to learn about important issues related to the internet, eight faculty from a variety of disciplines at the University of New Haven integrated the theme of Cyber World into our team-taught, first-year …
Eml Indices To Assess Student Learning Through Integrated E-Learning Modules, Ronald S. Harichandran, Nadiye O. Erdil, Maria-Isabel Carnasciali, Cheryl Q. Li, Aadityasinh Rana
Eml Indices To Assess Student Learning Through Integrated E-Learning Modules, Ronald S. Harichandran, Nadiye O. Erdil, Maria-Isabel Carnasciali, Cheryl Q. Li, Aadityasinh Rana
Engineering and Applied Science Education Faculty Publications
The University of New Haven has facilitated the development and integration of e-learning modules on entrepreneurial topics into regular engineering and computer science courses. In addition to faculty at the University of New Haven, over three years 77 faculty at 53 other universities in the US have also integrated these modules into their courses. Starting in fall 2017, rubrics were developed so that student work related to topics covered in the modules could be assessed directly by instructors. Topics covered by each module were also mapped to learning outcomes published in the KEEN Framework [1]. An Entrepreneurial Minded Learning (EML) …
Assessing The Growth In Entrepreneurial Mind-Set Acquired Through Curricular And Extra-Curricular Components, Cheryl Q. Li, Ronald S. Harichandran, Nadiye O. Erdil, Maria-Isabel Carnasciali, Jean Nocito-Gobel
Assessing The Growth In Entrepreneurial Mind-Set Acquired Through Curricular And Extra-Curricular Components, Cheryl Q. Li, Ronald S. Harichandran, Nadiye O. Erdil, Maria-Isabel Carnasciali, Jean Nocito-Gobel
Engineering and Applied Science Education Faculty Publications
In an effort to develop an entrepreneurial mindset in our engineering students, the University of New Haven has adopted both curricular and extra-curricular approaches. The curricular components include: 1. Several e-Learning modules covering specific entrepreneurial concepts integrated into the regular engineering and computer science curricula. Available online, each module contains readings, short videos, and self-assessment exercises. Students complete these self-paced modules outside of the classroom over a two-week period. Instructors normally engage students on the content of the module through online or in-class discussions and in-class contextual activities. 2. An elective course on business principles and entrepreneurship that incorporates four …
Assessing An Online Engineering Ethics Module From Experiential Learning Perspective, Gokhan Egilmez, Philip Viscomi, Maria-Isabel Carnasciali
Assessing An Online Engineering Ethics Module From Experiential Learning Perspective, Gokhan Egilmez, Philip Viscomi, Maria-Isabel Carnasciali
Engineering and Applied Science Education Faculty Publications
Today, engineers play a crucial role in the direction of technology, research, social wellbeing, and economic growth, thus the lives of people. An engineer’s professional responsibility for complying with ethical standards and conduct is essential to the needs and requirements of individuals, organizations, and the society. Educating the future engineering workforce and establishing effective and timely policies that ensure engineering professional’s compliance with requirements are two important pillars of sustaining the ethical knowledge and practice in engineering profession. In this study, the researchers focused on investigating the learning effectiveness of an online ethics module developed for and implemented in a …
An Exploratory Study Of Engineering Students’ Misconceptions About Technical Communication, Cheryl Q. Li, Judy Randi, Jenna Sheffield
An Exploratory Study Of Engineering Students’ Misconceptions About Technical Communication, Cheryl Q. Li, Judy Randi, Jenna Sheffield
Engineering and Applied Science Education Faculty Publications
This paper reports results of a mixed methods study that examined engineering students’ acquisition of technical communication skills over time. In particular, this exploratory study aimed to identify persistent errors, lingering misconceptions, and challenges engineering students faced when they attempted to apply their knowledge and skills in new contexts. The 12 participants were drawn from engineering courses in which students were required to compose technical memoranda in response to requests for information from supervisors or clients. This integrated approach addresses content and communication in the same course. The study included a longitudinal analysis of four technical memoranda written across two …
Motivating Students For Learning Using Scaffolding And A Variety Of Assignments, Nadiye O. Erdil
Motivating Students For Learning Using Scaffolding And A Variety Of Assignments, Nadiye O. Erdil
Engineering and Applied Science Education Faculty Publications
This paper discusses the impacts of various course assignments and activities that were used to increase student motivation and learning. The courses selected for the study are Quality Analysis and Design of Experiments courses, which are offered as required courses in the industrial engineering graduate program at the University of New Haven. The assignments and activities include term project, term paper, homework, in-class exercises, quizzes, exams, library training and factory visit. In an earlier pilot study in the Quality Analysis course, scaffolding -an instructional strategy that enables students to build on prior experience and knowledge as they work towards mastering …
On Efficiency Of Artifact Lookup Strategies In Digital Forensics, Lorenz Liebler, Patrick Schmitt, Harald Baier, Frank Breitinger
On Efficiency Of Artifact Lookup Strategies In Digital Forensics, Lorenz Liebler, Patrick Schmitt, Harald Baier, Frank Breitinger
Electrical & Computer Engineering and Computer Science Faculty Publications
In recent years different strategies have been proposed to handle the problem of ever-growing digital forensic databases. One concept to deal with this data overload is data reduction, which essentially means to separate the wheat from the chaff, e.g., to filter in forensically relevant data. A prominent technique in the context of data reduction are hash-based solutions. Data reduction is achieved because hash values (of possibly large data input) are much smaller than the original input. Today's approaches of storing hash-based data fragments reach from large scale multithreaded databases to simple Bloom filter representations. One main focus was put on …
Tin Assisted Fully Exposed Platinum Clusters Stabilized On Defect-Rich Graphene For Dehydrogenation Reaction, Jiayun Zhang, Yuchen Deng, Xiangbin Cai, Yunlei Chen, Mi Peng, Zhimin Jia, Zheng Jiang, Pengju Ren, Siyu Yao, Jinglin Xie, Dequan Xiao, Xiao-Dong Wen, Ning Wang, Hongyang Liu, Ding Ma
Tin Assisted Fully Exposed Platinum Clusters Stabilized On Defect-Rich Graphene For Dehydrogenation Reaction, Jiayun Zhang, Yuchen Deng, Xiangbin Cai, Yunlei Chen, Mi Peng, Zhimin Jia, Zheng Jiang, Pengju Ren, Siyu Yao, Jinglin Xie, Dequan Xiao, Xiao-Dong Wen, Ning Wang, Hongyang Liu, Ding Ma
Chemistry and Chemical Engineering Faculty Publications
Tin assisted fully exposed Pt clusters are fabricated on the core-shell nanodiamond@graphene (ND@G) hybrid support (a-PtSn/ND@G). The obtained atomically dispersed Pt clusters, with an average Pt atom number of 3, were anchored over the ND@Gsupport by the assistance of Sn atoms as a partition agent and through the Pt-C bond between Pt clusters and defect-rich graphene nanoshell. The atomically dispersed Pt clusters guaranteed a full metal availability to the reactants, a high thermal stability, and an optimized adsorption/desorption behavior. It inhibits the side reactions and enhances catalytic performance in direct dehydrogenation of n-butane at a low temperature of 450 °C, …
Immersive Virtual Reality Attacks And The Human Joystick, Peter Casey, Ibrahim Baggili, Ananya Yarramreddy
Immersive Virtual Reality Attacks And The Human Joystick, Peter Casey, Ibrahim Baggili, Ananya Yarramreddy
Electrical & Computer Engineering and Computer Science Faculty Publications
This is one of the first accounts for the security analysis of consumer immersive Virtual Reality (VR) systems. This work breaks new ground, coins new terms, and constructs proof of concept implementations of attacks related to immersive VR. Our work used the two most widely adopted immersive VR systems, the HTC Vive, and the Oculus Rift. More specifically, we were able to create attacks that can potentially disorient users, turn their Head Mounted Display (HMD) camera on without their knowledge, overlay images in their field of vision, and modify VR environmental factors that force them into hitting physical objects and …
Frameup: An Incriminatory Attack On Storj: A Peer To Peer Blockchain Enabled Distributed Storage System, Xiaolu Zhang, Justin Grannis, Ibrahim Baggili, Nicole Lang Beebe
Frameup: An Incriminatory Attack On Storj: A Peer To Peer Blockchain Enabled Distributed Storage System, Xiaolu Zhang, Justin Grannis, Ibrahim Baggili, Nicole Lang Beebe
Electrical & Computer Engineering and Computer Science Faculty Publications
In this work we present a primary account of frameup, an incriminatory attack made possible because of existing implementations in distributed peer to peer storage. The frameup attack shows that an adversary has the ability to store unencrypted data on the hard drives of people renting out their hard drive space. This is important to forensic examiners as it opens the door for possibly framing an innocent victim. Our work employs Storj as an example technology, due to its popularity and market size. Storj is a blockchain enabled system that allows people to rent out their hard drive space …
Evaluation Of Wind And Solar Energy Investments In Texas, Byungik Chang, Ken Starcher
Evaluation Of Wind And Solar Energy Investments In Texas, Byungik Chang, Ken Starcher
Civil Engineering Faculty Publications
The primary objective of the project is to evaluate the benefits of wind and solar energy and determine economical investment sites for wind and solar energy in Texas with economic parameters including payback periods. A 50 kW wind turbine system and a 42 kW PV system were used to collect field data. Data analysis enabled yearly energy production and payback period of the two systems.
The average payback period of a solar PV system was found to be within a range of 2-20 years because the large range of the payback period for PV systems were heavily influenced by incentives. …
Timeline2gui: A Log2timeline Csv Parser And Training Scenarios, Mark Debinski, Parvathy Mohan, Frank Breitinger
Timeline2gui: A Log2timeline Csv Parser And Training Scenarios, Mark Debinski, Parvathy Mohan, Frank Breitinger
Electrical & Computer Engineering and Computer Science Faculty Publications
Crimes involving digital evidence are getting more complex due to the increasing storage capacities and utilization of devices. Event reconstruction (i.e., understanding the timeline) is an essential step for investigators to understand a case where a prominent tool is Log2Timeline (a tool that creates super timelines which is a combination of several log files and events throughout a system). While these timelines provide great evidence and help to understand a case, they are complex and require tools as well as training scenarios. In this paper we present Timeline2GUI an easy-to-use python implementation to analyze CSV log files create by Log2Timeline. …
Application Of Artificial Neural Networks To Assess Student Happiness, Gokhan Egilmez, Nadiye O. Erdil, Omid Mohammadi Arani, Mana Vahid
Application Of Artificial Neural Networks To Assess Student Happiness, Gokhan Egilmez, Nadiye O. Erdil, Omid Mohammadi Arani, Mana Vahid
Mechanical and Industrial Engineering Faculty Publications
The purpose of this study is to develop an analytical assessment approach to identify the main factors that affect graduate students' happiness level. The two methods, multiple linear regression (MLR) and artificial neural networks (ANN), were employed for analytical modelling. A sample of 118 students at a small non-profit private university constituted the survey pool. Various factors including education, school facilities, health, social activities, and family were taken into consideration as a result of literature review in happiness assessment. A total of 32 inputs and one output variables were identified during survey design phase. The following survey conduction, data collection, …
A Practitioner Survey Exploring The Value Of Forensic Tools, Ai, Filtering, & Safer Presentation For Investigating Child Sexual Abuse Material, Laura Sanchez, Cinthya Grajeda, Ibrahim Baggili, Cory Hall
A Practitioner Survey Exploring The Value Of Forensic Tools, Ai, Filtering, & Safer Presentation For Investigating Child Sexual Abuse Material, Laura Sanchez, Cinthya Grajeda, Ibrahim Baggili, Cory Hall
Electrical & Computer Engineering and Computer Science Faculty Publications
For those investigating cases of Child Sexual Abuse Material (CSAM), there is the potential harm of experiencing trauma after illicit content exposure over a period of time. Research has shown that those working on such cases can experience psychological distress. As a result, there has been a greater effort to create and implement technologies that reduce exposure to CSAM. However, not much work has explored gathering insight regarding the functionality, effectiveness, accuracy, and importance of digital forensic tools and data science technologies from practitioners who use them. This study focused specifically on examining the value practitioners give to the tools …
A Versatile Route To Fabricate Single Atom Catalysts With High Chemoselectivity, Xiaohui He, Qian He, Yuchen Deng, Mi Peng, Hongyu Chen, Ying Zhang, Siyu Yao, Mengtao Zhang, Dequan Xiao, Ding Ma, Binghui Ge, Hongbing Ji
A Versatile Route To Fabricate Single Atom Catalysts With High Chemoselectivity, Xiaohui He, Qian He, Yuchen Deng, Mi Peng, Hongyu Chen, Ying Zhang, Siyu Yao, Mengtao Zhang, Dequan Xiao, Ding Ma, Binghui Ge, Hongbing Ji
Chemistry and Chemical Engineering Faculty Publications
Preparation of single atom catalysts (SACs) is of broad interest to materials scientists and chemists but remains a formidable challenge. Herein, we develop an efficient approach to synthesize SACs via a precursor-dilution strategy, in which metalloporphyrin (MTPP) with target metals are co-polymerized with diluents (tetraphenylporphyrin, TPP), followed by pyrolysis to N-doped porous carbon supported SACs (M1/N-C). Twenty-four different SACs, including noble metals and non-noble metals, are successfully prepared. In addition, the synthesis of a series of catalysts with different surface atom densities, bi-metallic sites, and metal aggregation states are achieved. This approach shows remarkable adjustability and generality, providing …
Anchoring Cu 1 Species Over Nanodiamond-Graphene For Semi-Hydrogenation Of Acetylene, Fei Huang, Yuchen Deng, Yunlei Chen, Xiangbin Cai, Mi Peng, Zhimin Jia, Jinglin Xie, Dequan Xiao, Xiaodong Wen, Ning Wang, Zheng Jiang, Hongyang Liu, Ding Ma
Anchoring Cu 1 Species Over Nanodiamond-Graphene For Semi-Hydrogenation Of Acetylene, Fei Huang, Yuchen Deng, Yunlei Chen, Xiangbin Cai, Mi Peng, Zhimin Jia, Jinglin Xie, Dequan Xiao, Xiaodong Wen, Ning Wang, Zheng Jiang, Hongyang Liu, Ding Ma
Chemistry and Chemical Engineering Faculty Publications
The design of cheap, non-toxic, and earth-abundant transition metal catalysts for selective hydrogenation of alkynes remains a challenge in both industry and academia. Here, we report a new atomically dispersed copper (Cu) catalyst supported on a defective nanodiamondgraphene (ND@G), which exhibits excellent catalytic performance for the selective conversion of acetylene to ethylene, i.e., with high conversion (95%), high selectivity (98%), and good stability (for more than 60 h). The unique structural feature of the Cu atoms anchored over graphene through Cu-C bonds ensures the effective activation of acetylene and easy desorption of ethylene, which is the key for the outstanding …
Inception: Virtual Space In Memory Space In Real Space, Peter Casey, Rebecca Lindsay-Decusati, Ibrahim Baggili, Frank Breitinger
Inception: Virtual Space In Memory Space In Real Space, Peter Casey, Rebecca Lindsay-Decusati, Ibrahim Baggili, Frank Breitinger
Electrical & Computer Engineering and Computer Science Faculty Publications
Virtual Reality (VR) has become a reality. With the technology's increased use cases, comes its misuse. Malware affecting the Virtual Environment (VE) may prevent an investigator from ascertaining virtual information from a physical scene, or from traditional “dead” analysis. Following the trend of antiforensics, evidence of an attack may only be found in memory, along with many other volatile data points. Our work provides the primary account for the memory forensics of Immersive VR systems, and in specific the HTC Vive. Our approach is capable of reconstituting artifacts from memory that are relevant to the VE, and is also capable …