Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Social and Behavioral Sciences (32)
- Engineering (26)
- Physical Sciences and Mathematics (26)
- Computer Sciences (23)
- Information Security (23)
-
- Computer Law (22)
- Legal Studies (22)
- Forensic Science and Technology (21)
- National Security Law (21)
- Legal Education (20)
- Public Affairs, Public Policy and Public Administration (20)
- Legal Writing and Research (18)
- Aviation (16)
- Aviation Safety and Security (16)
- Defense and Security Studies (16)
- OS and Networks (16)
- Other Computer Sciences (16)
- Social Control, Law, Crime, and Deviance (16)
- Sociology (16)
- Arts and Humanities (12)
- Classical Literature and Philology (6)
- Classics (6)
- Computer Engineering (6)
- Banking and Finance Law (5)
- Business (5)
- Electrical and Computer Engineering (5)
- Human Rights Law (5)
- International Law (5)
- Securities Law (5)
- Institution
-
- Embry-Riddle Aeronautical University (28)
- University of Maryland Francis King Carey School of Law (19)
- Maurice A. Deane School of Law at Hofstra University (8)
- University of the Pacific (8)
- Purdue University (5)
-
- University of Windsor (5)
- University of Nevada, Las Vegas (3)
- Golden Gate University School of Law (2)
- Kennesaw State University (2)
- Murray State University (2)
- University of Georgia School of Law (2)
- William & Mary Law School (2)
- World Maritime University (2)
- Dominican University of California (1)
- Emory University School of Law (1)
- Florida International University (1)
- Georgia State University (1)
- James Madison University (1)
- Penn State Law (1)
- University of Baltimore Law (1)
- University of Richmond (1)
- Wright State University (1)
- Keyword
-
- 500 (6)
- Anniversary (6)
- Cross-disciplinary research (6)
- Humanities (6)
- Law (6)
-
- McGeorge School of Law (6)
- Politics (6)
- Thomas More (6)
- University of the Pacific (6)
- Utopia (6)
- Bias (2)
- ARCA Space Corporation (1)
- Acme Advanced Materials (1)
- American Institute of Aeronautics and Astronautics (AIAA) (1)
- Barriers (1)
- Bessemer Venture Partners (1)
- Betting (1)
- Blue Origin (1)
- Bumps (1)
- Center for the Advancement of Science in Space (CASIS) (1)
- China (1)
- Choice architecture (1)
- Commercial Space Operations (1)
- Commercial Spaceflight Federation (1)
- Compliance interpretation (1)
- Convention against Torture (CAT) (1)
- Cottonwood Technology Funds (1)
- DARPA (1)
- Encryption (1)
- Fallacy (1)
- Publication
-
- Annual ADFSL Conference on Digital Forensics, Security and Law (21)
- The Sixth Annual Capital Area Legal Writing Conference (19)
- UTOPIA500 (6)
- Journal of International Business and Law Symposia (5)
- OSSA Conference Archive (5)
-
- Space Traffic Management Conference (5)
- Charleston Library Conference (3)
- International Conference on Gambling & Risk Taking (3)
- Continuing Legal Education Presentations (2)
- Distinguished Speaker Series (2)
- Health Law & Policy Conferences (2)
- KSU Proceedings on Cybersecurity Education, Research and Practice (2)
- Posters-at-the-Capitol (2)
- Purdue Road School (2)
- Virginia Coastal Policy Center Annual Conference (2)
- WMU Symposium on Migration by Sea, Malmö, Sweden, 26-27 April 2016 (2)
- Aviation / Aeronautics / Aerospace International Research Conference (1)
- Center For Immigrants’ Rights Clinic Events (1)
- Commencement & Awards Ceremonies (1)
- Georgia State Undergraduate Research Conference (1)
- Human Factors and Applied Psychology Student Conference (1)
- Intellectual Property (IP) Day (1)
- MAD-RUSH Undergraduate Research Conference (1)
- Randolph W. Thrower Symposium (1)
- Scholarly and Creative Works Conference (2015 - 2021) (1)
- South Florida Education Research Conference (1)
- The Fate of Legal Scholarship in American Law Schools (1)
- The Jesse Carter Distinguished Lecture Series (1)
- University of Richmond Law Review Symposium (1)
- Veterans Law Conference (1)
- File Type
Articles 31 - 60 of 97
Full-Text Articles in Law
Sim Card Forensics: Digital Evidence, Nada Ibrahim, Nuha Al Naqbi, Farkhund Iqbal, Omar Alfandi
Sim Card Forensics: Digital Evidence, Nada Ibrahim, Nuha Al Naqbi, Farkhund Iqbal, Omar Alfandi
Annual ADFSL Conference on Digital Forensics, Security and Law
With the rapid evolution of the smartphone industry, mobile device forensics has become essential in cybercrime investigation. Currently, evidence forensically-retrieved from a mobile device is in the form of call logs, contacts, and SMSs; a mobile forensic investigator should also be aware of the vast amount of user data and network information that are stored in the mobile SIM card such as ICCID, IMSI, and ADN. The aim of this study is to test various forensic tools to effectively gather critical evidence stored on the SIM card. In the first set of experiments, we compare the selected forensic tools in …
Wban Security Management In Healthcare Enterprise Environments, Karina Bahena, Manghui Tu
Wban Security Management In Healthcare Enterprise Environments, Karina Bahena, Manghui Tu
Annual ADFSL Conference on Digital Forensics, Security and Law
As healthcare data are pushed online, consumers have raised big concerns on the breach of their personal information. Law and regulations have placed businesses and public organizations under obligations to take actions to prevent such data breaches. Various vulnerabilities have been identified in healthcare enterprise environments, in which the Wireless Body Area Networks (WBAN) remains to be a major vulnerability, which can be easily taken advantage of by determined adversaries. Thus, vulnerabilities of WBAN systems and the effective countermeasure mechanisms to secure WBAN are urgently needed. In this research, first, the architecture of WBAN system has been explored, and the …
Reverse Engineering A Nit That Unmasks Tor Users, Matthew Miller, Joshua Stroschein, Ashley Podhradsky
Reverse Engineering A Nit That Unmasks Tor Users, Matthew Miller, Joshua Stroschein, Ashley Podhradsky
Annual ADFSL Conference on Digital Forensics, Security and Law
This paper is a case study of a forensic investigation of a Network Investigative Technique (NIT) used by the FBI to deanonymize users of a The Onion Router (Tor) Hidden Service. The forensic investigators were hired by the defense to determine how the NIT worked. The defendant was ac- cused of using a browser to access illegal information. The authors analyzed the source code, binary files and logs that were used by the NIT. The analysis was used to validate that the NIT collected only necessary and legally authorized information. This paper outlines the publicly available case details, how the …
Forensics Analysis Of Privacy Of Portable Web Browsers, Ahmad Ghafarian
Forensics Analysis Of Privacy Of Portable Web Browsers, Ahmad Ghafarian
Annual ADFSL Conference on Digital Forensics, Security and Law
Web browser vendors offer a portable web browser option which is considered as one of the features that provides user privacy. Portable web browser is a browser that can be launched from a USB flash drive without the need for its installation on the host machine. Most popular web browsers have portable versions of their browsers as well. Portable web browsing poses a great challenge to computer forensic investigators who try to reconstruct the past browsing history, in case of any computer incidence. This research examines various sources in the host machine such as physical memory, temporary, recent, event files, …
Malware In The Mobile Device Android Environment, Diana Hintea, Robert Bird, Andrew Walker
Malware In The Mobile Device Android Environment, Diana Hintea, Robert Bird, Andrew Walker
Annual ADFSL Conference on Digital Forensics, Security and Law
exploit smartphone operating systems has exponentially expanded. Android has become the main target to exploit due to having the largest install base amongst the smartphone operating systems and owing to the open access nature in which application installations are permitted. Many Android users are unaware of the risks associated with a malware infection and to what level current malware scanners protect them. This paper tests how efficient the currently available malware scanners are. To achieve this, ten representative Android security products were selected and tested against a set of 5,560 known and categorized Android malware samples. The tests were carried …
Forensic Analysis Of Smartphone Applications For Privacy Leakage, Diana Hintea, Chrysanthi Taramonli, Robert Bird, Rezhna Yusuf
Forensic Analysis Of Smartphone Applications For Privacy Leakage, Diana Hintea, Chrysanthi Taramonli, Robert Bird, Rezhna Yusuf
Annual ADFSL Conference on Digital Forensics, Security and Law
Smartphone and tablets are personal devices that have diffused to near universal ubiquity in recent years. As Smartphone users become more privacy-aware and -conscious, research is needed to understand how “leakage” of private information (personally identifiable information – PII) occurs. This study explores how leakage studies in Droid devices should be adapted to Apple iOS devices. The OWASP Zed Attack Proxy (ZAP) is examined for 50 apps in various categories. This study confirms that: (1) most apps transmit unencrypted sensitive PII, (2) SSL is used by some recipient websites, but without corresponding app compliance with SSL, and (3) most apps …
Inferring Previously Uninstalled Applications From Residual Partial Artifacts, Jim Jones, Tahir Khan, Kathryn Laskey, Alex Nelson, Mary Laamanen, Douglas White
Inferring Previously Uninstalled Applications From Residual Partial Artifacts, Jim Jones, Tahir Khan, Kathryn Laskey, Alex Nelson, Mary Laamanen, Douglas White
Annual ADFSL Conference on Digital Forensics, Security and Law
In this paper, we present an approach and experimental results to suggest the past presence of an application after the application has been uninstalled and the system has remained in use. Current techniques rely on the recovery of intact artifacts and traces, e.g., whole files, Windows Registry entries, or log file entries, while our approach requires no intact artifact recovery and leverages trace evidence in the form of residual partial files. In the case of recently uninstalled applications or an instrumented infrastructure, artifacts and traces may be intact and complete. In most cases, however, digital artifacts and traces are al- …
One-Time Pad Encryption Steganography System, Michael J. Pelosi, Gary Kessler, Michael Scott S. Brown
One-Time Pad Encryption Steganography System, Michael J. Pelosi, Gary Kessler, Michael Scott S. Brown
Annual ADFSL Conference on Digital Forensics, Security and Law
In this paper we introduce and describe a novel approach to adaptive image steganography which is combined with One-Time Pad encryption, and demonstrate the software which implements this methodology. Testing using the state-of-the-art steganalysis software tool StegExpose concludes the image hiding is reliably secure and undetectable using reasonably-sized message payloads (≤25% message bits per image pixel; bpp). Payload image file format outputs from the software include PNG, BMP, JP2, JXR, J2K, TIFF, and WEBP. A variety of file output formats is empirically important as most steganalysis programs will only accept PNG, BMP, and possibly JPG, as the file inputs.
Keywords: …
Applying Grounded Theory Methods To Digital Forensics Research, Ahmed Almarzooqi, Andrew Jones, Richard Howley
Applying Grounded Theory Methods To Digital Forensics Research, Ahmed Almarzooqi, Andrew Jones, Richard Howley
Annual ADFSL Conference on Digital Forensics, Security and Law
Deciding on a suitable research methodology is challenging for researchers. In this paper, grounded theory is presented as a systematic and comprehensive qualitative methodology in the emergent field of digital forensics research. This paper applies grounded theory in a digital forensics research project undertaken to study how organisations build and manage digital forensics capabilities. This paper gives a step-by-step guideline to explain the procedures and techniques of using grounded theory in digital forensics research. The paper gives a detailed explanation of how the three grounded theory coding methods (open, axial, and selective coding) can be used in digital forensics research. …
Covert6: A Tool To Corroborate The Existence Of Ipv6 Covert Channels, Raymond A. Hansen, Lourdes Gino, Dominic Savio
Covert6: A Tool To Corroborate The Existence Of Ipv6 Covert Channels, Raymond A. Hansen, Lourdes Gino, Dominic Savio
Annual ADFSL Conference on Digital Forensics, Security and Law
Covert channels are any communication channel that can be exploited to transfer information in a manner that violates the system’s security policy. Research in the field has shown that, like many communication channels, IPv4 and the TCP/IP protocol suite have been susceptible to covert channels, which could be exploited to leak data or be used for anonymous communications. With the introduction of IPv6, researchers are acutely aware that many vulnerabilities of IPv4 have been remediated in IPv6. However, a proof of concept covert channel system was demonstrated in 2006. A decade later, IPv6 and its related protocols have undergone major …
Acceleration Of Statistical Detection Of Zero-Day Malware In The Memory Dump Using Cuda-Enabled Gpu Hardware, Igor Korkin, Iwan Nesterow
Acceleration Of Statistical Detection Of Zero-Day Malware In The Memory Dump Using Cuda-Enabled Gpu Hardware, Igor Korkin, Iwan Nesterow
Annual ADFSL Conference on Digital Forensics, Security and Law
This paper focuses on the anticipatory enhancement of methods of detecting stealth software. Cyber security detection tools are insufficiently powerful to reveal the most recent cyber-attacks which use malware. In this paper, we will present first an idea of the highest stealth malware, as this is the most complicated scenario for detection because it combines both existing anti-forensic techniques together with their potential improvements. Second, we will present new detection methods which are resilient to this hidden prototype. To help solve this detection challenge, we have analyzed Windows’ memory content using a new method of Shannon Entropy calculation; methods of …
Using Computer Behavior Profiles To Differentiate Between Users In A Digital Investigation, Shruti Gupta, Marcus Rogers
Using Computer Behavior Profiles To Differentiate Between Users In A Digital Investigation, Shruti Gupta, Marcus Rogers
Annual ADFSL Conference on Digital Forensics, Security and Law
Most digital crimes involve finding evidence on the computer and then linking it to a suspect using login information, such as a username and a password. However, login information is often shared or compromised. In such a situation, there needs to be a way to identify the user without relying exclusively on login credentials. This paper introduces the concept that users may show behavioral traits which might provide more information about the user on the computer. This hypothesis was tested by conducting an experiment in which subjects were required to perform common tasks on a computer, over multiple sessions. The …
Current Challenges And Future Research Areas For Digital Forensic Investigation, David Lillis, Brett A. Becker, Tadhg O’Sullivan, Mark Scanlon
Current Challenges And Future Research Areas For Digital Forensic Investigation, David Lillis, Brett A. Becker, Tadhg O’Sullivan, Mark Scanlon
Annual ADFSL Conference on Digital Forensics, Security and Law
Given the ever-increasing prevalence of technology in modern life, there is a corresponding increase in the likelihood of digital devices being pertinent to a criminal investigation or civil litigation. As a direct consequence, the number of investigations requiring digital forensic expertise is resulting in huge digital evidence backlogs being encountered by law enforcement agencies throughout the world. It can be anticipated that the number of cases requiring digital forensic analysis will greatly increase in the future. It is also likely that each case will require the analysis of an increasing number of devices including computers, smartphones, tablets, cloud-based services, Internet …
Forensic Analysis Of Ares Galaxy Peer-To-Peer Network, Frank Kolenbrander, Nhien-An Le-Khac, Tahar Kechadi
Forensic Analysis Of Ares Galaxy Peer-To-Peer Network, Frank Kolenbrander, Nhien-An Le-Khac, Tahar Kechadi
Annual ADFSL Conference on Digital Forensics, Security and Law
Child Abuse Material (CAM) is widely available on P2P networks. Over the last decade several tools were made for 24/7 monitoring of peer-to-peer (P2P) networks to discover suspects that use these networks for downloading and distribution of CAM. For some countries the amount of cases generated by these tools is so great that Law Enforcement (LE) just cannot handle them all. This is not only leading to backlogs and prioritizing of cases but also leading to discussions about the possibility of disrupting these networks and sending warning messages to potential CAM offenders. Recently, investigators are reporting that they are creating …
Keynote Speaker, Chuck Easttom
Keynote Speaker, Chuck Easttom
Annual ADFSL Conference on Digital Forensics, Security and Law
Conference Keynote Speaker, Chuck Easttom
Commentary On A Perspective Of Objectivity In The Human Rights Arguments, Danny Marrero
Commentary On A Perspective Of Objectivity In The Human Rights Arguments, Danny Marrero
OSSA Conference Archive
No abstract provided.
Biases, Bumps, Nudges, Query Lists, And Zero Tolerance Policies, Sheldon Wein
Biases, Bumps, Nudges, Query Lists, And Zero Tolerance Policies, Sheldon Wein
OSSA Conference Archive
Zero tolerance policies are often mistakenly thought to be the best way to deal with pressing social problems. However, most arguments for zero tolerance policies are either based on inaccurate premises or they commit the zero tolerance fallacy. This paper explores ways that we might counteract the bias in favor of zero tolerance policies by adding a query list to the choice architecture.
America Vs. Apple: The Argumentative Function Of Metonyms, Ilon Lauer, Thomas Lauer
America Vs. Apple: The Argumentative Function Of Metonyms, Ilon Lauer, Thomas Lauer
OSSA Conference Archive
: Our study of public argumentation surrounding iPhone encryption addresses the argumentative function of the metonym. Metonyms accomplish general and specific argumentative purposes. Generally, metonyms help define and redefine the argumentative framework for a dispute. Within a controversy, metonyms operate as inference generators. We isolate and analyze several metonyms and elaborate their warrant-generating valences. Metonyms are inference generating tools capable of instantiating normative frameworks, invoking flexible and indeterminate senses of causality.
The Polysemy Of ‘Fallacy’—Or ‘Bias’, For That Matter, Frank Zenker
The Polysemy Of ‘Fallacy’—Or ‘Bias’, For That Matter, Frank Zenker
OSSA Conference Archive
Starting with a brief overview of current usages (Sect. 2), this paper offers some constituents of a use-based analysis of ‘fallacy’, listing 16 conditions that have, for the most part implicitly, been discussed in the literature (Sect. 3). Our thesis is that at least three related conceptions of ‘fallacy’ can be identified. The 16 conditions thus serve to “carve out” a semantic core and to distinguish three core-specifications. As our discussion suggests, these specifications can be related to three normative positions in the philosophy of human reasoning: the meliorist, the apologist, and the panglossian (Sect. 4). Seeking to make these …
Particular Reasoning Versus Universal Human Rights: A Case Of China, Jingjing Wu
Particular Reasoning Versus Universal Human Rights: A Case Of China, Jingjing Wu
OSSA Conference Archive
In this paper, I argue that there is objectivity in the international human rights law, against which the justifiability of arguments can be determined and the universality vs. relativity of human rights debate could be taken a step further. I propose an optimising approach for treaty interpretation, point out that there is epistemic objectivity residing in this approach, and analyse China’s relativism arguments on Article 1 of the Convention against Torture to elaborate above points.
Commencement Program And Complete Video Recording, Marc L. Hamroff, A. Gail Prudenti, Eric Lane
Commencement Program And Complete Video Recording, Marc L. Hamroff, A. Gail Prudenti, Eric Lane
Commencement & Awards Ceremonies
Maurice A. Deane School of Law Ceremony, featuring Marc L. Hamroff ’83, managing partner of Moritt Hock & Hamroff LLP, and Judge A. Gail Prudenti, the School of Law’s executive director of the Center for Children, Families and the Law and special advisor to Dean Eric Lane.
Migration : Some Observations About Contemporary Trends, Gervais Appave
Migration : Some Observations About Contemporary Trends, Gervais Appave
WMU Symposium on Migration by Sea, Malmö, Sweden, 26-27 April 2016
No abstract provided.
Opening Speech, Cleopatra Doumbia-Henry
Opening Speech, Cleopatra Doumbia-Henry
WMU Symposium on Migration by Sea, Malmö, Sweden, 26-27 April 2016
No abstract provided.
Constitutional Utopianism, Susan N. Herman
Constitutional Utopianism, Susan N. Herman
UTOPIA500
The sixth and final UTOPIA500 presentation was April 21, 2016. Professor Susan Herman, Centennial Professor of Law at Brooklyn Law School and President of the American Civil Liberties Union, received the official "Me and Tommy More" polo shirt from Dr. Michael P. Malloy, organizer of the UTOPIA500 project. Professor Herman delivered a presentation on Constitutional Utopianism. She explored the literary devices that More employed as narrative strategies in Utopia, and argued that his intention may have been to give focus to discussion about important issues of governance and societal structures, rather than to provide definitive answers. Professor Herman also compared …
Panel Presentation, Peter J. Smith, Heidi Freese, Grace Meng, Lori Ulrich
Panel Presentation, Peter J. Smith, Heidi Freese, Grace Meng, Lori Ulrich
Center For Immigrants’ Rights Clinic Events
No abstract provided.
Defending Dissent: From The Career Of Allan Brotsky To Black Lives Matter, Marvin Stender, Walter Riley, Michael Flynn, Gabriela Lopez
Defending Dissent: From The Career Of Allan Brotsky To Black Lives Matter, Marvin Stender, Walter Riley, Michael Flynn, Gabriela Lopez
The Jesse Carter Distinguished Lecture Series
No abstract provided.
The Power Of A Secret: Ireland’S Secret Societies Involvement In Irish Nationalism, Sierra M. Harlan
The Power Of A Secret: Ireland’S Secret Societies Involvement In Irish Nationalism, Sierra M. Harlan
Scholarly and Creative Works Conference (2015 - 2021)
The Irish Republican Brotherhood (I.R.B.) and the Irish Volunteer Force (I.V.F.) altered Irish Nationalist tactics from Parliamentary supported Home Rule to a republican movement for Irish Independence. The actions of these secret societies between the years of 1900 through 1917, before the Irish Revolutionary period,[1] are the reason that Ireland gained independence from United Kingdom in 1921. The change from political negotiations by the ineffective Irish Parliamentary Party to the republican movement would never have happened without the Easter Rising of 1916. The centennial anniversary of this Easter Rising makes The Power of a Secret: Ireland’s secret societies involvement …
Eating Disorders In Prison Populations, Samantha Donovan
Eating Disorders In Prison Populations, Samantha Donovan
Georgia State Undergraduate Research Conference
No abstract provided.
St. Thomas More And His Utopia In Antebellum American Lawyer's Thought, Michael H. Hoeflich
St. Thomas More And His Utopia In Antebellum American Lawyer's Thought, Michael H. Hoeflich
UTOPIA500
The fifth UTOPIA500 presentation was April 7, 2016 about St. Thomas More and his Utopia in Antebellum American Lawyers' Thought. A former dean at Kansas Law and a renowned historian of colonial and pre-Civil War America, Professor Michael H. Hoeflich is also a fellow of the Royal Historical Society. He explored the publication history of More's UTOPIA, and the extent to which editions of the book were available in antebellum America. Professor Hoeflich noted that the novel, as a work of "politics," was well known by the likes of Jefferson, Madison, and John Adams, but its influence thereafter ebbed and …