Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- International Law (769)
- Intellectual Property Law (750)
- Constitutional Law (687)
- Criminal Law (418)
- Comparative and Foreign Law (377)
-
- Social and Behavioral Sciences (348)
- Environmental Law (313)
- Civil Rights and Discrimination (308)
- Arts and Humanities (277)
- Courts (277)
- Legislation (276)
- Law and Society (275)
- Human Rights Law (253)
- Health Law and Policy (240)
- State and Local Government Law (239)
- First Amendment (224)
- Criminal Procedure (219)
- Supreme Court of the United States (203)
- Science and Technology Law (187)
- Law and Economics (176)
- Jurisprudence (170)
- Labor and Employment Law (165)
- National Security Law (165)
- Legal Profession (161)
- Business Organizations Law (160)
- Public Affairs, Public Policy and Public Administration (160)
- Military, War, and Peace (159)
- Dispute Resolution and Arbitration (158)
- Entertainment, Arts, and Sports Law (156)
- Institution
-
- University of Georgia School of Law (591)
- Fordham Law School (361)
- St. John's University School of Law (323)
- Duke Law (185)
- University of Michigan Law School (177)
-
- Touro University Jacob D. Fuchsberg Law Center (174)
- University of Pennsylvania Carey Law School (171)
- William & Mary Law School (157)
- UC Law SF (155)
- Loyola University Chicago, School of Law (130)
- University of Richmond (127)
- Brooklyn Law School (126)
- Maurice A. Deane School of Law at Hofstra University (119)
- Seattle University School of Law (114)
- University of Washington School of Law (114)
- University of Oklahoma College of Law (111)
- The University of Akron (110)
- Case Western Reserve University School of Law (109)
- University of North Carolina School of Law (107)
- Vanderbilt University Law School (106)
- Maurer School of Law: Indiana University (105)
- University of Missouri School of Law (100)
- Washington and Lee University School of Law (94)
- American University Washington College of Law (93)
- Louisiana State University Law Center (90)
- Pepperdine University (87)
- Chicago-Kent College of Law (85)
- Southern Methodist University (85)
- University of Miami Law School (81)
- Notre Dame Law School (79)
- Keyword
-
- Copyright (120)
- Intellectual property (109)
- Supreme Court (78)
- Inc. (71)
- Law (70)
-
- First Amendment (64)
- Patent (59)
- Discrimination (53)
- New York (49)
- Arbitration (47)
- Constitutional law (45)
- Privacy (45)
- Education (43)
- Trademark (43)
- Constitution (42)
- Race (41)
- Legislation (40)
- Canada (38)
- Due process (37)
- Human rights (37)
- Fourth Amendment (35)
- United States (35)
- Jurisdiction (34)
- Lanham Act (34)
- Patents (34)
- Law reform (33)
- Tax (33)
- Internet (31)
- Patent law (31)
- Jurisprudence (30)
- Publication
-
- Journal of Intellectual Property Law (297)
- Georgia Journal of International & Comparative Law (256)
- The Catholic Lawyer (247)
- Fordham Urban Law Journal (170)
- Touro Law Review (156)
-
- Fordham Law Review (109)
- Akron Intellectual Property Journal (77)
- Florida Law Review (74)
- Water Law Review (63)
- Hofstra Law Review (58)
- Notre Dame Law Review (55)
- Seattle University Law Review (54)
- Mitchell Hamline Law Review (53)
- University of Richmond Law Review (51)
- Washington Law Review (51)
- The International Lawyer (50)
- Duke Law Journal (49)
- Georgia State University Law Review (49)
- Mercer Law Review (49)
- Missouri Law Review (49)
- Indiana Law Journal (48)
- Michigan Law Review (48)
- Tulsa Law Review (48)
- Law and Contemporary Problems (46)
- Louisiana Law Review (46)
- North Carolina Law Review (46)
- Oil and Gas, Natural Resources, and Energy Journal (46)
- Osgoode Hall Law Journal (46)
- Vanderbilt Law Review (46)
- Brooklyn Law Review (45)
- File Type
Articles 1 - 30 of 7387
Full-Text Articles in Law
The Contributions Of Louis Brandeis To The Law Of Lawyering, John S. Dzienkowski
The Contributions Of Louis Brandeis To The Law Of Lawyering, John S. Dzienkowski
Touro Law Review
No abstract provided.
Bloom Filters Optimized Wu-Manber For Intrusion Detection, Monther Aldwairi, Koloud Al-Khamaiseh, Fatima Alharbi, Babar Shah
Bloom Filters Optimized Wu-Manber For Intrusion Detection, Monther Aldwairi, Koloud Al-Khamaiseh, Fatima Alharbi, Babar Shah
Journal of Digital Forensics, Security and Law
With increasing number and severity of attacks, monitoring ingress and egress network traffic is becoming essential everyday task. Intrusion detection systems are the main tools for capturing and searching network traffic for potential harm. Signature-based intrusion detection systems are the most widely used, and they simply use a pattern matching algorithms to locate attack signatures in intercepted network traffic. Pattern matching algorithms are very expensive in terms of running time and memory usage, leaving intrusion detection systems unable to detect attacks in real-time. We propose a Bloom filters optimized Wu-Manber pattern matching algorithm to speed up intrusion detection. The Bloom …
The Impact Of Md5 File Hash Collisions On Digital Forensic Imaging, Gary C. Kessler
The Impact Of Md5 File Hash Collisions On Digital Forensic Imaging, Gary C. Kessler
Journal of Digital Forensics, Security and Law
The Message Digest 5 (MD5) hash is commonly used as for integrity verification in the forensic imaging process. The ability to force MD5 hash collisions has been a reality for more than a decade, although there is a general consensus that hash collisions are of minimal impact to the practice of computer forensics. This paper describes an experiment to determine the results of imaging two disks that are identical except for one file, the two versions of which have different content but otherwise occupy the same byte positions on the disk, are the same size, and have the same hash …
Leveraging The Windows Amcache.Hve File In Forensic Investigations, Bhupendra Singh, Upasna Singh
Leveraging The Windows Amcache.Hve File In Forensic Investigations, Bhupendra Singh, Upasna Singh
Journal of Digital Forensics, Security and Law
The Amcache.hve is a registry hive file that is created by Microsoft® Windows® to store the information related to execution of programs. This paper highlights the evidential potential of Amcache.hve file and its application in the area of user activity analysis. The study uncovers numerous artifacts retained in Amcache.hve file when a user performs certain actions such as running host-based applications, installation of new applications, or running portable applications from external devices. The results of experiments demonstrate that Amcache.hve file stores intriguing artifacts related to applications such as timestamps of creation and last modification of any application; name, description, publisher …
The 2016 Analysis Of Information Remaining On Computer Hard Disks Offered For Sale On The Second Hand Market In The Uae, Thomas Martin, Andy Jones, Mohammed Alzaabi
The 2016 Analysis Of Information Remaining On Computer Hard Disks Offered For Sale On The Second Hand Market In The Uae, Thomas Martin, Andy Jones, Mohammed Alzaabi
Journal of Digital Forensics, Security and Law
This research describes our survey of data remaining on computer hard disks sold on the second hand market in the United Arab Emirates (UAE). This is a repetition of the first survey conducted in 2012 (Jones, Martin, & Alzaabi, 2012). Similar studies have been carried over the last ten years in the United Kingdom, Australia, USA, Germany and France: (Jones, Mee, Meyler, & Gooch, 2005), (Jones, Valli, Sutherland, & Thomas, 2006), (Jones, Valli, Dardick, & Sutherland, 2008), (Jones, Valli, Dardick, & Sutherland, 2009). This research was undertaken to gain insight into the volumes of data found on second-hand disks purchased …
A New Distributed Chinese Wall Security Policy Model, Saad Fehis, Omar Nouali, Mohand-Tahar Kechadi
A New Distributed Chinese Wall Security Policy Model, Saad Fehis, Omar Nouali, Mohand-Tahar Kechadi
Journal of Digital Forensics, Security and Law
The application of the Chinese wall security policy model (CWSPM) to control the information flows between two or more competing and/or conflicting companies in cloud computing (Multi-tenancy) or in the social network, is a very interesting solution. The main goal of the Chinese Wall Security Policy is to build a wall between the datasets of competing companies, and among the system subjects. This is done by the applying to the subjects mandatory rules, in order to control the information flow caused between them. This problem is one of the hottest topics in the area of cloud computing (as a distributed …
The Impact Of Sha-1 File Hash Collisions On Digital Forensic Imaging: A Follow-Up Experiment, Gary C. Kessler
The Impact Of Sha-1 File Hash Collisions On Digital Forensic Imaging: A Follow-Up Experiment, Gary C. Kessler
Journal of Digital Forensics, Security and Law
A previous paper described an experiment showing that Message Digest 5 (MD5) hash collisions of files have no impact on integrity verification in the forensic imaging process. This paper describes a similar experiment applied when two files have a Secure Hash Algorithm (SHA-1) collision.
A Survey Of Social Network Forensics, Umit Karabiyik, Muhammed Abdullah Canbaz, Ahmet Aksoy, Tayfun Tuna, Esra Akbas, Bilal Gonen, Ramazan S. Aygun
A Survey Of Social Network Forensics, Umit Karabiyik, Muhammed Abdullah Canbaz, Ahmet Aksoy, Tayfun Tuna, Esra Akbas, Bilal Gonen, Ramazan S. Aygun
Journal of Digital Forensics, Security and Law
Social networks in any form, specifically online social networks (OSNs), are becoming a part of our everyday life in this new millennium especially with the advanced and simple communication technologies through easily accessible devices such as smartphones and tablets. The data generated through the use of these technologies need to be analyzed for forensic purposes when criminal and terrorist activities are involved. In order to deal with the forensic implications of social networks, current research on both digital forensics and social networks need to be incorporated and understood. This will help digital forensics investigators to predict, detect and even prevent …
A Journey Through The Health Care Safety Net, Brietta R. Clark
A Journey Through The Health Care Safety Net, Brietta R. Clark
Saint Louis University Law Journal
No abstract provided.
Inequity In Private Child Custody Litigation, Dale Margolin Cecka
Inequity In Private Child Custody Litigation, Dale Margolin Cecka
City University of New York Law Review
No abstract provided.
Translating The Charitable Affectation In Private Law, Anne-Sophie Hulin
Translating The Charitable Affectation In Private Law, Anne-Sophie Hulin
Journal of Civil Law Studies
Traduire sans trahir, voilà la difficulté du traducteur comme celle du comparatiste. Comment garantir que les notions, une fois passées au filtre juridique, ne subissent pas une certaine altération, et ne perdent par là un peu d’elles-mêmes? Cet article s’intéresse donc à un genre particulier de traduction où des concepts universels se voient convertis en notions juridiques. Dans le cas précis de la philanthropie, la traduction se révèle moins aisée en droit civil qu’en common law au point de s’interroger de la capacité de ce premier à accueillir les mécanismes philanthropiques. Il en ressort alors que les traditions juridiques n’ont …
Basic Questions Of Tort Law From A Comparative Perspective, Michael L. Wells
Basic Questions Of Tort Law From A Comparative Perspective, Michael L. Wells
Journal of Civil Law Studies
No abstract provided.
Introduction, Angela Olivia Burton
Introduction, Angela Olivia Burton
City University of New York Law Review
No abstract provided.
Ruminations Around The Dictionary Of The Civil Code, Alain Levasseur
Ruminations Around The Dictionary Of The Civil Code, Alain Levasseur
Journal of Civil Law Studies
No abstract provided.
Brazil: The Difficult Path Toward Democratization Of Civil Law, Lucas Abreu Barroso, Pablo Malheiros Da Cunha Frota, Brígida Roldi Passamani, Lúcio Moreira Andrade
Brazil: The Difficult Path Toward Democratization Of Civil Law, Lucas Abreu Barroso, Pablo Malheiros Da Cunha Frota, Brígida Roldi Passamani, Lúcio Moreira Andrade
Journal of Civil Law Studies
The Federal Constitution of 1988 reinstated the democratic rule of law in Brazil. Based on fundamental rights, the “Citizen’s Constitution” shaped the model of a welfare State, which objectives consist in the construction of a free, just and solidary society, the eradication of poverty and substandard living conditions and the promotion of the well-being of all, without prejudice as to origin, race, sex, color, age and any other forms of discrimination. From this context, the constitutional idealization of family democracy emerges, specifically represented in this paper by the recognition of civil union be-tween people of the same sex as family …
Afterword, Matthew I. Fraidin
Afterword, Matthew I. Fraidin
City University of New York Law Review
No abstract provided.
Family Defense And The Disappearing Problem-Solving Court, Jane M. Spinak
Family Defense And The Disappearing Problem-Solving Court, Jane M. Spinak
City University of New York Law Review
No abstract provided.
Nuclear Power: Black Sky Liability Or Black Sky Asset?, Sherrell R. Greene
Nuclear Power: Black Sky Liability Or Black Sky Asset?, Sherrell R. Greene
International Journal of Nuclear Security
Ready access to abundant electricity is a key enabler of modern life. During the past decade the vulnerability of Critical Infrastructure sectors in the U.S. to a variety of natural hazards and man-made threats has become increasingly apparent. The electrical infrastructure (the “Grid”) is the foundation for all other critical civil infrastructures upon which our society depends. Therefore, protection of the Grid is an energy security, homeland security, and national security issue of highest importance. Geomagnetic disturbances (GMD) induced by solar coronal mass ejections (CMEs), electromagnetic pulse (EMP) attacks, and cyber attacks are three events having the potential to plunge …
Student Competition Cover
International Journal of Nuclear Security
No abstract provided.
Improving Nuclear Safety, Security, And Nonproliferation In Northeast Asia Through Multinational Approach, Viet Phuong Nguyen
Improving Nuclear Safety, Security, And Nonproliferation In Northeast Asia Through Multinational Approach, Viet Phuong Nguyen
International Journal of Nuclear Security
No abstract provided.
Prospects For Cooperation On Tackling Nuclear And Radiological Terrorism In South Asia: India–Pakistan Nuclear Detection Architecture, Muhammad Umer Khan
Prospects For Cooperation On Tackling Nuclear And Radiological Terrorism In South Asia: India–Pakistan Nuclear Detection Architecture, Muhammad Umer Khan
International Journal of Nuclear Security
No abstract provided.
Table Of Contents
Journal of Digital Forensics, Security and Law
No abstract provided.
Les Termes Comme Miroir Et Loupe D’Une Société? L’Exemple Du Code Civil Italien, Enrica Bracchi
Les Termes Comme Miroir Et Loupe D’Une Société? L’Exemple Du Code Civil Italien, Enrica Bracchi
Journal of Civil Law Studies
La langue est souvent le vecteur de concepts et de visions propres à une société ou une partie de celle-ci ; c’est à travers la langue que se dévoilent les contradictions, le refus ou l’assentiment par rapport à de nouvelles réalités sociales et sociétales, qui peuvent être réglementées par le droit. Le droit, quant à lui, se sert de la langue pour nommer ces réalités et la terminologie juridique ou parajuridique devient d’une part un miroir qui reflète des tendances et des variations et d’autre part une loupe car elle amplifie les contrastes et les points de détail concernant certaines …
Pourquoi Et Comment Former Des Juristes Trilingues?, Dominique Garreau
Pourquoi Et Comment Former Des Juristes Trilingues?, Dominique Garreau
Journal of Civil Law Studies
No abstract provided.