Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics

2016

Institution
Keyword
Publication
Publication Type
File Type

Articles 1 - 30 of 234

Full-Text Articles in Law

Janus Realized: The Use Of Social Media As A Means Of Transparency Nuclear Communication To The Public, Frances Bachstein Dec 2016

Janus Realized: The Use Of Social Media As A Means Of Transparency Nuclear Communication To The Public, Frances Bachstein

International Journal of Nuclear Security

No abstract provided.


Addressing The Tunnel Threat At Nuclear Facilities: A Case Study, Md. Mobasher Ahmed Dec 2016

Addressing The Tunnel Threat At Nuclear Facilities: A Case Study, Md. Mobasher Ahmed

International Journal of Nuclear Security

No abstract provided.


Prospects For Cooperation On Tackling Nuclear And Radiological Terrorism In South Asia: India–Pakistan Nuclear Detection Architecture, Muhammad Umer Khan Dec 2016

Prospects For Cooperation On Tackling Nuclear And Radiological Terrorism In South Asia: India–Pakistan Nuclear Detection Architecture, Muhammad Umer Khan

International Journal of Nuclear Security

No abstract provided.


Table Of Contents Dec 2016

Table Of Contents

International Journal of Nuclear Security

No abstract provided.


Nuclear Power: Black Sky Liability Or Black Sky Asset?, Sherrell R. Greene Dec 2016

Nuclear Power: Black Sky Liability Or Black Sky Asset?, Sherrell R. Greene

International Journal of Nuclear Security

Ready access to abundant electricity is a key enabler of modern life. During the past decade the vulnerability of Critical Infrastructure sectors in the U.S. to a variety of natural hazards and man-made threats has become increasingly apparent. The electrical infrastructure (the “Grid”) is the foundation for all other critical civil infrastructures upon which our society depends. Therefore, protection of the Grid is an energy security, homeland security, and national security issue of highest importance. Geomagnetic disturbances (GMD) induced by solar coronal mass ejections (CMEs), electromagnetic pulse (EMP) attacks, and cyber attacks are three events having the potential to ...


Student Competition Cover Dec 2016

Student Competition Cover

International Journal of Nuclear Security

No abstract provided.


Improving Nuclear Safety, Security, And Nonproliferation In Northeast Asia Through Multinational Approach, Viet Phuong Nguyen Dec 2016

Improving Nuclear Safety, Security, And Nonproliferation In Northeast Asia Through Multinational Approach, Viet Phuong Nguyen

International Journal of Nuclear Security

No abstract provided.


Front Matter Dec 2016

Front Matter

Journal of Digital Forensics, Security and Law

No abstract provided.


Masthead Dec 2016

Masthead

Journal of Digital Forensics, Security and Law

No abstract provided.


Table Of Contents Dec 2016

Table Of Contents

Journal of Digital Forensics, Security and Law

No abstract provided.


Back Matter Dec 2016

Back Matter

Journal of Digital Forensics, Security and Law

No abstract provided.


Bloom Filters Optimized Wu-Manber For Intrusion Detection, Monther Aldwairi, Koloud Al-Khamaiseh, Fatima Alharbi, Babar Shah Dec 2016

Bloom Filters Optimized Wu-Manber For Intrusion Detection, Monther Aldwairi, Koloud Al-Khamaiseh, Fatima Alharbi, Babar Shah

Journal of Digital Forensics, Security and Law

With increasing number and severity of attacks, monitoring ingress and egress network traffic is becoming essential everyday task. Intrusion detection systems are the main tools for capturing and searching network traffic for potential harm. Signature-based intrusion detection systems are the most widely used, and they simply use a pattern matching algorithms to locate attack signatures in intercepted network traffic. Pattern matching algorithms are very expensive in terms of running time and memory usage, leaving intrusion detection systems unable to detect attacks in real-time. We propose a Bloom filters optimized Wu-Manber pattern matching algorithm to speed up intrusion detection. The Bloom ...


The 2016 Analysis Of Information Remaining On Computer Hard Disks Offered For Sale On The Second Hand Market In The Uae, Thomas Martin, Andy Jones, Mohammed Alzaabi Dec 2016

The 2016 Analysis Of Information Remaining On Computer Hard Disks Offered For Sale On The Second Hand Market In The Uae, Thomas Martin, Andy Jones, Mohammed Alzaabi

Journal of Digital Forensics, Security and Law

This research describes our survey of data remaining on computer hard disks sold on the second hand market in the United Arab Emirates (UAE). This is a repetition of the first survey conducted in 2012 (Jones, Martin, & Alzaabi, 2012). Similar studies have been carried over the last ten years in the United Kingdom, Australia, USA, Germany and France: (Jones, Mee, Meyler, & Gooch, 2005), (Jones, Valli, Sutherland, & Thomas, 2006), (Jones, Valli, Dardick, & Sutherland, 2008), (Jones, Valli, Dardick, & Sutherland, 2009). This research was undertaken to gain insight into the volumes of data found on second-hand disks purchased in the UAE, as well ...


Leveraging The Windows Amcache.Hve File In Forensic Investigations, Bhupendra Singh, Upasna Singh Dec 2016

Leveraging The Windows Amcache.Hve File In Forensic Investigations, Bhupendra Singh, Upasna Singh

Journal of Digital Forensics, Security and Law

The Amcache.hve is a registry hive file that is created by Microsoft® Windows® to store the information related to execution of programs. This paper highlights the evidential potential of Amcache.hve file and its application in the area of user activity analysis. The study uncovers numerous artifacts retained in Amcache.hve file when a user performs certain actions such as running host-based applications, installation of new applications, or running portable applications from external devices. The results of experiments demonstrate that Amcache.hve file stores intriguing artifacts related to applications such as timestamps of creation and last modification of any ...


A Survey Of Social Network Forensics, Umit Karabiyik, Muhammed Abdullah Canbaz, Ahmet Aksoy, Tayfun Tuna, Esra Akbas, Bilal Gonen, Ramazan S. Aygun Dec 2016

A Survey Of Social Network Forensics, Umit Karabiyik, Muhammed Abdullah Canbaz, Ahmet Aksoy, Tayfun Tuna, Esra Akbas, Bilal Gonen, Ramazan S. Aygun

Journal of Digital Forensics, Security and Law

Social networks in any form, specifically online social networks (OSNs), are becoming a part of our everyday life in this new millennium especially with the advanced and simple communication technologies through easily accessible devices such as smartphones and tablets. The data generated through the use of these technologies need to be analyzed for forensic purposes when criminal and terrorist activities are involved. In order to deal with the forensic implications of social networks, current research on both digital forensics and social networks need to be incorporated and understood. This will help digital forensics investigators to predict, detect and even prevent ...


The Impact Of Md5 File Hash Collisions On Digital Forensic Imaging, Gary C. Kessler Dec 2016

The Impact Of Md5 File Hash Collisions On Digital Forensic Imaging, Gary C. Kessler

Journal of Digital Forensics, Security and Law

The Message Digest 5 (MD5) hash is commonly used as for integrity verification in the forensic imaging process. The ability to force MD5 hash collisions has been a reality for more than a decade, although there is a general consensus that hash collisions are of minimal impact to the practice of computer forensics. This paper describes an experiment to determine the results of imaging two disks that are identical except for one file, the two versions of which have different content but otherwise occupy the same byte positions on the disk, are the same size, and have the same hash ...


The Impact Of Sha-1 File Hash Collisions On Digital Forensic Imaging: A Follow-Up Experiment, Gary C. Kessler Dec 2016

The Impact Of Sha-1 File Hash Collisions On Digital Forensic Imaging: A Follow-Up Experiment, Gary C. Kessler

Journal of Digital Forensics, Security and Law

A previous paper described an experiment showing that Message Digest 5 (MD5) hash collisions of files have no impact on integrity verification in the forensic imaging process. This paper describes a similar experiment applied when two files have a Secure Hash Algorithm (SHA-1) collision.


A New Distributed Chinese Wall Security Policy Model, Saad Fehis, Omar Nouali, Mohand-Tahar Kechadi Dec 2016

A New Distributed Chinese Wall Security Policy Model, Saad Fehis, Omar Nouali, Mohand-Tahar Kechadi

Journal of Digital Forensics, Security and Law

The application of the Chinese wall security policy model (CWSPM) to control the information flows between two or more competing and/or conflicting companies in cloud computing (Multi-tenancy) or in the social network, is a very interesting solution. The main goal of the Chinese Wall Security Policy is to build a wall between the datasets of competing companies, and among the system subjects. This is done by the applying to the subjects mandatory rules, in order to control the information flow caused between them. This problem is one of the hottest topics in the area of cloud computing (as a ...


Letter From The Editor Dec 2016

Letter From The Editor

International Journal of Nuclear Security

No abstract provided.


Implementation Of The 1995 Middle East Resolution: A Vital Lifeline To The Extension And Success Of The Non-Proliferation Treaty, Haidy Y. Ghoname, Howard Lewis Hall Dec 2016

Implementation Of The 1995 Middle East Resolution: A Vital Lifeline To The Extension And Success Of The Non-Proliferation Treaty, Haidy Y. Ghoname, Howard Lewis Hall

International Journal of Nuclear Security

This study highlights the core non-proliferation dilemmas we face and suggests an effective mechanism for reviving the spirit and the hope of the Non-Proliferation Treaty. An indispensable key to the treaty calls for a rethinking of what we believe should be referred to as its four pillars: disarmament, non-proliferation, peaceful uses of nuclear energy, and implementation of the 1995 Middle East Resolution. We seek to contribute to the renaissance of the non-proliferation regime by addressing seven dilemmas that arise from the way various Non-Proliferation Treaty participants pursue the goals of the four pillars undergirding the treaty. This study highlights core ...


Evaluation Of Covert Plutonium Production From Unconventional Uranium Sources, Ondrej Chvala, Steven Skutnik, Tyrone Christopher Harris, Emily Anne Frame Dec 2016

Evaluation Of Covert Plutonium Production From Unconventional Uranium Sources, Ondrej Chvala, Steven Skutnik, Tyrone Christopher Harris, Emily Anne Frame

International Journal of Nuclear Security

The potential for a relatively non-advanced nation to covertly acquire a significant quantity of weapons-grade plutonium using a gas-cooled, natural uranium-fueled reactor based on relatively primitive early published designed is evaluated in this article. The economic and technical issues that would influence the design decisions of a covert 239Pu production program are considered.

Several unconventional uranium acquisition approaches were explored. Methods for extracting uranium from enrichment tails, seawater, and coal ash sources were considered. The evaluation indicated that uranium extraction from coal ash or insitu leaching from underground deposits could be performed in economical manner that might be difficult ...


2016, Sep. 22 -- Bulletin 118, Interim Update 2016, California's Groundwater Working Toward Sustainability, Dwr Dec 2016

2016, Sep. 22 -- Bulletin 118, Interim Update 2016, California's Groundwater Working Toward Sustainability, Dwr

State and Federal Documents Relating to Monterey and San Luis Obispo Counties

The purpose of the interim update to Bulletin 118 is to provide up-to-date information on California groundwater basins subject to critical conditions of overdraft, groundwater basin boundaries, and basin prioritization. The information is essential to the successful implementation of the Sustainable Groundwater Management Act passed in 2014 (SGMA), including the timely formation of groundwater sustainability agencies and the development of groundwater sustainability plans.


Table Of Contents Dec 2016

Table Of Contents

International Journal of Nuclear Security

No abstract provided.


From The Editor’S Desk Dec 2016

From The Editor’S Desk

International Journal of Nuclear Security

No abstract provided.


Legal And Regulatory Framework Of Nuclear Security In Indonesia, Dahlia Cakrawati Sinaga Dec 2016

Legal And Regulatory Framework Of Nuclear Security In Indonesia, Dahlia Cakrawati Sinaga

International Journal of Nuclear Security

Nuclear security is one of the most important topics for regulatory purposes in Indonesia. Nuclear security measures exist to prevent, detect, and respond to unauthorized removal of radioactive material and the sabotage of nuclear and radiation facilities. Indonesia participates in bilateral and multilateral cooperation and international events such as the Nuclear Security Summit. Indonesia has also ratified several international instruments related to nuclear security. Based on commitment to international events and ratification, Indonesia has developed nuclear security infrastructures by strengthening legislation and regulation, enhancing building capacity, and strengthening equipment and facilities. Badan Pengawas Tenaga Nuklir (BAPETEN) is Indonesia’s nuclear ...


Nuclear Security Culture And Batan’S Assessment: Batan’S Experience, Anhar R. Antariksawan Dec 2016

Nuclear Security Culture And Batan’S Assessment: Batan’S Experience, Anhar R. Antariksawan

International Journal of Nuclear Security

Organizations should increase safety to minimize the harmful effects of nuclear materials. Additionally, organizations should take measures to protect security culture within the organization itself. This paper covers the National Nuclear Energy Agency of Indonesia’s (BATAN’s) promotion of nuclear security culture and self- assessment projects, which is based on the International Atomic Energy Agency’s (IAEA) methodology.


Modified Fault Tree Method For Vulnerability Analysis Of Nuclear Medicine Facility Security System Case Study: Radiotherapy Facility, Sardjito General Hospital, Haryono Budi Santosa Dec 2016

Modified Fault Tree Method For Vulnerability Analysis Of Nuclear Medicine Facility Security System Case Study: Radiotherapy Facility, Sardjito General Hospital, Haryono Budi Santosa

International Journal of Nuclear Security

Assessing the vulnerability of physical protection systems (PPS) in nuclear medicine facilities is needed to prevent a security incident that could lead to the malicious use of nuclear material. Theft and sabotage of nuclear materials is becoming globally recognized. The current methods of assessing vulnerability tend to be oriented toward complex nuclear security; consequently, it is excessive to use such methods in simple facilities (i.e., radiotherapy facilities in hospitals).

The fault tree analysis is a method to assess vulnerability for a simple nuclear facility. The method’s primary events (i.e., basic events and undeveloped events) are able to ...


Opportunities And Challenges In Developing Nuclear Security In Africa, James Larkin Mfr Dec 2016

Opportunities And Challenges In Developing Nuclear Security In Africa, James Larkin Mfr

International Journal of Nuclear Security

Those involved in nuclear security recognize that regions of significant instability in Africa have an impact on the safety and security of the continent's nuclear material and un-enriched uranium; however, some countries outside of continental Africa have taken counterproductive approaches to this issue. Despite challenges, the nuclear security community continues to develop and apply appropriate levels of nuclear security where needed. The community also takes every opportunity to make significant contributions to the global discourse on nuclear security culture.


Nuclear Security Risk Analysis: An Insider-Outsider Collusion Scenario, Mohammad A. Hawila, Sunil S. Chirayath Dec 2016

Nuclear Security Risk Analysis: An Insider-Outsider Collusion Scenario, Mohammad A. Hawila, Sunil S. Chirayath

International Journal of Nuclear Security

This study analyses the vulnerability of the physical protection system (PPS) deployed at a hypothetical facility. The PPS is designed to prevent and eliminate threats to nuclear materials and facilities. The analysis considers possible outsider and insider threats. A modified adversary sequence diagram (ASD) evaluates threat pathways to test an insider-outsider collusion case. The ASD also measures the probability of adversary interruption by demonstrating the methodology for a typical nuclear facility.


Military Cyber Professionals Have An Important Part To Play In The Obama-Trump Transition, Michael V. Hayden Dec 2016

Military Cyber Professionals Have An Important Part To Play In The Obama-Trump Transition, Michael V. Hayden

Military Cyber Affairs

Over the course of decades in service, I have experienced multiple presidential transitions. Each new Commander in Chief updates policies, personnel, and priorities…especially when the transition involves a new political party. In this respect, the current transition from the Obama to the Trump administration is no different. While this periodic exercise of our democracy may seem disruptive to some, it is a true opportunity for military cyber professionals to help shape our future national security posture.