Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Social and Behavioral Sciences (24)
- Physical Sciences and Mathematics (21)
- Public Affairs, Public Policy and Public Administration (17)
- Sociology (17)
- Engineering (14)
-
- Computer Sciences (13)
- Information Security (13)
- Computer Law (12)
- Social Control, Law, Crime, and Deviance (12)
- Constitutional Law (11)
- Legal Studies (11)
- Legislation (11)
- Aviation (10)
- Aviation Safety and Security (10)
- Defense and Security Studies (10)
- Forensic Science and Technology (10)
- National Security Law (10)
- OS and Networks (10)
- Other Computer Sciences (10)
- Arts and Humanities (9)
- Education (9)
- Land Use Law (9)
- Law and Society (9)
- Business (8)
- Environmental Sciences (8)
- Law and Economics (8)
- Science and Technology Law (8)
- Architecture (7)
- Criminal Law (7)
- Institution
-
- Liberty University (28)
- Embry-Riddle Aeronautical University (10)
- Western University (9)
- Seattle University School of Law (6)
- University of Massachusetts Amherst (6)
-
- Georgia Southern University (4)
- Arcadia University (3)
- Old Dominion University (2)
- Rhode Island School of Design (2)
- Duquesne University (1)
- Emory University School of Law (1)
- Kennesaw State University (1)
- Pepperdine University (1)
- Stephen F. Austin State University (1)
- University for Business and Technology in Kosovo (1)
- University of Nebraska at Kearney (1)
- University of North Florida (1)
- Washington and Lee University School of Law (1)
- Keyword
-
- Government (3)
- Liberty (3)
- Natural law (3)
- China (2)
- Constitution (2)
-
- Cultural landscapes (2)
- Genocide (2)
- Law (2)
- Reform (2)
- Rule of Law (2)
- Social Contract Theory (2)
- Theology (2)
- ASAT (1)
- Abortion (1)
- Academic achievement (1)
- Administrative (1)
- Advocacy (1)
- Advocating (1)
- Agriculture (1)
- Alternatives to suspension (1)
- Arms Control (1)
- Asteroid bennu (1)
- Asteroid mining (1)
- Authority (1)
- Bhutan (1)
- Big Tech (1)
- Bomb ingredients (1)
- Bomb instructions (1)
- Bomb transportation (1)
- Burma (1)
- Publication
-
- Helm's School of Government Conference - American Revival: Citizenship & Virtue (24)
- Annual ADFSL Conference on Digital Forensics, Security and Law (10)
- Undergraduate Student Research Internships Conference (9)
- ISCCL Scientific Symposia and Annual General Meetings // Symposiums scientifiques et assemblées générales annuelles de l'ISCCL // Simposios científicos yy las Asambleas Generales Anuales (6)
- SITIE Symposiums (6)
-
- Liberty University Research Week (4)
- National Youth Advocacy and Resilience Conference (4)
- Capstone Showcase (3)
- Cybersecurity Undergraduate Research Showcase (2)
- Martin Luther King, Jr. Series (2)
- Library Events (1)
- Mountain Plains Business Conference (1)
- Randolph W. Thrower Symposium (1)
- Seaver College Research And Scholarly Achievement Symposium (1)
- Showcase of Faculty Scholarly & Creative Activity (1)
- Symposium of Student Scholars (1)
- UBT International Conference (1)
- Undergraduate Research Conference (1)
- Undergraduate Research and Scholarship Symposium (1)
- File Type
Articles 61 - 79 of 79
Full-Text Articles in Law
Significance, Opportunities And Challenges Of Cultural Landscape Conservation And Bhutan Heritage Bill – Unesco’S Experiences Of Bhutan, Roland Chih-Hung Lin
Significance, Opportunities And Challenges Of Cultural Landscape Conservation And Bhutan Heritage Bill – Unesco’S Experiences Of Bhutan, Roland Chih-Hung Lin
ISCCL Scientific Symposia and Annual General Meetings // Symposiums scientifiques et assemblées générales annuelles de l'ISCCL // Simposios científicos yy las Asambleas Generales Anuales
UNESCO was the first United Nations agency to deal with landscapes at a global scale, notably through the 1962 UNESCO Recommendation on the Beauty and Character of Landscapes and Sites and the 1972 Convention Concerning the Protection of the World Cultural and Natural Heritage. This article shares the knowledge and experience garnered by UNESCO through its conservation and management activities at Cultural Landscapes in Bhutan and highlights the urgent need for a cultural-historical-natural territory approach to address the pressing challenges for the conservation of Cultural Landscapes in Bhutan, and for a strong focus on the peoples and communities that …
Evolution Of Landscape Scale Protection In Australia Since 1974, Jane Lennon
Evolution Of Landscape Scale Protection In Australia Since 1974, Jane Lennon
ISCCL Scientific Symposia and Annual General Meetings // Symposiums scientifiques et assemblées générales annuelles de l'ISCCL // Simposios científicos yy las Asambleas Generales Anuales
Australia ICOMOS found the Venice Charter principles to be universally sound but not applicable to an ancient landscape encompassing 60,000 years of Aboriginal occupation and modified by only 200 years of European settlement. In response, Australia ICOMOS members created the Burra Charter to deal with conservation of places of cultural significance, and in the years since 1981, it has been updated to reflect contemporary practice and improved understanding of intangible values. Although its principles and planning steps have been followed for large publicly-owned conservation landscapes such as national parks or for urban historic parks, the challenge is to apply it …
Cultural Landscapes In Aotearoa New Zealand – Decolonisation And Challenges, Nicola Short, Carolyn Hill
Cultural Landscapes In Aotearoa New Zealand – Decolonisation And Challenges, Nicola Short, Carolyn Hill
ISCCL Scientific Symposia and Annual General Meetings // Symposiums scientifiques et assemblées générales annuelles de l'ISCCL // Simposios científicos yy las Asambleas Generales Anuales
The first place to be inscribed on the UNESCO World Heritage list as a cultural landscape was Tongariro National Park in Aotearoa New Zealand. Despite this early acknowledgement in the international arena there is a weak theoretical understanding of cultural landscapes in Aotearoa, both in the legislative environment and management regimes (Short 2020). The current state of cultural landscapes in Aotearoa can be seen as an expression of the colonial systems and perspectives which dominate environmental and heritage planning.
The identification and application of heritage status and associated protections in Aotearoa with respect to cultural landscapes has a number of …
When You Can't See The Trees For The Forest: An Analysis Of Heritage Tree Protection And The Implications For Nature Culture Integration, Elizabeth Brabec
When You Can't See The Trees For The Forest: An Analysis Of Heritage Tree Protection And The Implications For Nature Culture Integration, Elizabeth Brabec
ISCCL Scientific Symposia and Annual General Meetings // Symposiums scientifiques et assemblées générales annuelles de l'ISCCL // Simposios científicos yy las Asambleas Generales Anuales
Heritage trees provide a sense of permanency and sense of place, spiritual connections, and also a critical repository of a gene pool, climate adaptation history and future human resources. Characterized as the oldest and/or largest tree of a species, heritage or "champion" trees as they are often termed, contain a "library" of climate changes that have taken place over hundreds and in some cases thousands of years. But in the designation and protection of heritage trees, the criteria of ecosystem services and economic values are mentioned much more frequently in the legislation and research, than cultural or heritage values. This …
Policy Challenges To Recognizing And Conserving Cultural Landscapes In The United States, Brenda Barrett
Policy Challenges To Recognizing And Conserving Cultural Landscapes In The United States, Brenda Barrett
ISCCL Scientific Symposia and Annual General Meetings // Symposiums scientifiques et assemblées générales annuelles de l'ISCCL // Simposios científicos yy las Asambleas Generales Anuales
Cultural Landscapes have come late to the game in the US government’s historic preservation policy schemes. While the US National Park Service (NPS) established a documentation program - the Historic American Landscapes, landscapes are not specifically identified as a historic resource type to be recognized and protected by any of the existing statutory frameworks. In 2013 the NPS cultural resource leadership sought to remedy this deficiency by undertaking an extensive study, the National Register Landscape Initiative, with the goal of proposing legislative changes to the National Historic Preservation Act. Cultural landscapes would be added as a distinct property type to …
Anatomy Of An Internet Hijack And Interception Attack: A Global And Educational Perspective, Ben A. Scott, Michael N. Johnstone, Patryk Szewczyk
Anatomy Of An Internet Hijack And Interception Attack: A Global And Educational Perspective, Ben A. Scott, Michael N. Johnstone, Patryk Szewczyk
Annual ADFSL Conference on Digital Forensics, Security and Law
The Internet’s underlying vulnerable protocol infrastructure is a rich target for cyber crime, cyber espionage and cyber warfare operations. The stability and security of the Internet infrastructure are important to the function of global matters of state, critical infrastructure, global e-commerce and election systems. There are global approaches to tackle Internet security challenges that include governance, law, educational and technical perspectives. This paper reviews a number of approaches to these challenges, the increasingly surgical attacks that target the underlying vulnerable protocol infrastructure of the Internet, and the extant cyber security education curricula; we find the majority of predominant cyber security …
A Low-Cost Machine Learning Based Network Intrusion Detection System With Data Privacy Preservation, Jyoti Fakirah, Lauhim Mahfuz Zishan, Roshni Mooruth, Michael L. Johnstone, Wencheng Yang
A Low-Cost Machine Learning Based Network Intrusion Detection System With Data Privacy Preservation, Jyoti Fakirah, Lauhim Mahfuz Zishan, Roshni Mooruth, Michael L. Johnstone, Wencheng Yang
Annual ADFSL Conference on Digital Forensics, Security and Law
Network intrusion is a well-studied area of cyber security. Current machine learning-based network intrusion detection systems (NIDSs) monitor network data and the patterns within those data but at the cost of presenting significant issues in terms of privacy violations which may threaten end-user privacy. Therefore, to mitigate risk and preserve a balance between security and privacy, it is imperative to protect user privacy with respect to intrusion data. Moreover, cost is a driver of a machine learning-based NIDS because such systems are increasingly being deployed on resource-limited edge devices. To solve these issues, in this paper we propose a NIDS …
Detection Of Overlapping Passive Manipulation Techniques In Image Forensics, Gianna S. Lint, Umit Karabiyik
Detection Of Overlapping Passive Manipulation Techniques In Image Forensics, Gianna S. Lint, Umit Karabiyik
Annual ADFSL Conference on Digital Forensics, Security and Law
With a growing number of images uploaded daily to social media sites, it is essential to understand if an image can be used to trace its origin. Forensic investigations are focusing on analyzing images that are uploaded to social media sites resulting in an emphasis on building and validating tools. There has been a strong focus on understanding active manipulation or tampering techniques and building tools for analysis. However, research on manipulation is often studied in a vacuum, involving only one technique at a time. Additionally, less focus has been placed on passive manipulation, which can occur by simply uploading …
Human-Controlled Fuzzing With Afl, Maxim Grishin, Igor Korkin, Phd
Human-Controlled Fuzzing With Afl, Maxim Grishin, Igor Korkin, Phd
Annual ADFSL Conference on Digital Forensics, Security and Law
Fuzzing techniques are applied to reveal different types of bugs and vulnerabilities. American Fuzzy Lop (AFL) is a free most popular software fuzzer used by many other fuzzing frameworks. AFL supports autonomous mode of operation that uses the previous step output into the next step, as a result fuzzer spends a lot of time analyzing minor code sections. By making fuzzing process more focused and human controlled security expert can save time and find more bugs in less time. We designed a new module that can fuzz only the specified functions. As a result, the chosen ones will be inspected …
The Amorphous Nature Of Hackers: An Exploratory Study, Kento Yasuhara, Daniel Walnycky, Ibrahim Baggili, Ahmed Alhishwan
The Amorphous Nature Of Hackers: An Exploratory Study, Kento Yasuhara, Daniel Walnycky, Ibrahim Baggili, Ahmed Alhishwan
Annual ADFSL Conference on Digital Forensics, Security and Law
In this work, we aim to better understand outsider perspectives of the hacker community through a series of situation based survey questions. By doing this, we hope to gain insight into the overall reputation of hackers from participants in a wide range of technical and non-technical backgrounds. This is important to digital forensics since convicted hackers will be tried by people, each with their own perception of who hackers are. Do cyber crimes and national security issues negatively affect people’s perceptions of hackers? Does hacktivism and information warfare positively affect people’s perception of hackers? Do individual personality factors affect one’s …
Smart Home Forensics: Identifying Ddos Attack Patterns On Iot Devices, Samuel Ho, Hope Greeson, Umit Karabiyik
Smart Home Forensics: Identifying Ddos Attack Patterns On Iot Devices, Samuel Ho, Hope Greeson, Umit Karabiyik
Annual ADFSL Conference on Digital Forensics, Security and Law
Smart homes are becoming more common as more people integrate IoT devices into their home environment. As such, these devices have access to personal data on their homeowners’ networks. One of the advantages of IoT devices is that they are compact. However, this limits the incorporation of security measures in their hardware. Misconfigured IoT devices are commonly the target of malicious attacks. Additionally, distributed denial-of-service attacks are becoming more common due to applications and software that provides users with easy-to-use user interfaces. Since one vulnerable device is all an attacker needs to launch an attack on a network, in regards …
Digital Forensics For Mobility As A Service Platform: Analysis Of Uber Application On Iphone And Cloud, Nina Matulis, Umit Karabiyik
Digital Forensics For Mobility As A Service Platform: Analysis Of Uber Application On Iphone And Cloud, Nina Matulis, Umit Karabiyik
Annual ADFSL Conference on Digital Forensics, Security and Law
Uber is a ride-hailing smartphone application (app) that allows users to order a ride in a highly efficient manner. The Uber app provides Mobility as a Service and allows users to easily order a ride in a private car with just a few clicks. Uber stores large amounts of data on both the mobile device the app is being used on, and in the cloud. Examples of this data include geolocation data, date/time, origin/destination addresses, departure/arrival times, and distance. Uber geolocation data has been previously researched to investigate the privacy of the Uber app; however, there is minimal research relating …
Microsoft Defender Will Be Defended: Memoryranger Prevents Blinding Windows Av, Denis Pogonin, Igor Korkin, Phd
Microsoft Defender Will Be Defended: Memoryranger Prevents Blinding Windows Av, Denis Pogonin, Igor Korkin, Phd
Annual ADFSL Conference on Digital Forensics, Security and Law
Windows OS is facing a huge rise in kernel attacks. An overview of popular techniques that result in loading kernel drivers will be presented. One of the key targets of modern threats is disabling and blinding Microsoft Defender, a default Windows AV. The analysis of recent driver-based attacks will be given, the challenge is to block them. The survey of user- and kernel-level attacks on Microsoft Defender will be given. One of the recently published attackers’ techniques abuses Mandatory Integrity Control (MIC) and Security Reference Monitor (SRM) by modifying Integrity Level and Debug Privileges for the Microsoft Defender via syscalls. …
A Lightweight Reliably Quantified Deepfake Detection Approach, Tianyi Wang, Kam Pui Chow
A Lightweight Reliably Quantified Deepfake Detection Approach, Tianyi Wang, Kam Pui Chow
Annual ADFSL Conference on Digital Forensics, Security and Law
Deepfake has brought huge threats to society such that everyone can become a potential victim. Current Deepfake detection approaches have unsatisfactory performance in either accuracy or efficiency. Meanwhile, most models are only evaluated on different benchmark test datasets with different accuracies, which could not imitate the real-life Deepfake unknown population. As Deepfake cases have already been raised and brought challenges at the court, it is disappointed that no existing work has studied the model reliability and attempted to make the detection model act as the evidence at the court. We propose a lightweight Deepfake detection deep learning approach using the …
Timestamp Estimation From Outdoor Scenes, Tawfiq Salem, Jisoo Hwang, Rafael Padilha
Timestamp Estimation From Outdoor Scenes, Tawfiq Salem, Jisoo Hwang, Rafael Padilha
Annual ADFSL Conference on Digital Forensics, Security and Law
The increasing availability of smartphones allowed people to easily capture and share images on the internet. These images are often associated with metadata, including the image capture time (timestamp) and the location where the image was captured (geolocation). The metadata associated with images provides valuable information to better understand scenes and events presented in these images. The timestamp can be manipulated intentionally to provide false information to convey a twisted version of reality. Images with manipulated timestamps are often used as a cover-up for wrongdoing or broadcasting false claims and competing views on the internet. Estimating the time of capture …
Cybersecurity & Correctional Institutions, Kelly Himelwright
Cybersecurity & Correctional Institutions, Kelly Himelwright
Cybersecurity Undergraduate Research Showcase
Cybersecurity is becoming an increasingly important aspect of correctional operations. To properly maintain security, more jails and prisons are using comprehensive cyber protection techniques. Correctional facilities face risks that were perhaps unimaginable only a few decades ago. Many organizations have used information technology to help them run their businesses, but few have the resources or vision to foresee and adequately manage the cyber dangers that come with it. Institutions need to be more aware of these hazards, as well as have more information security experts on staff.
A Culture Of Institutional Racism: Housing Policies During The New Deal, Breyonna J. Bowen
A Culture Of Institutional Racism: Housing Policies During The New Deal, Breyonna J. Bowen
Capstone Showcase
There currently exists a distressed relationship between African Americans and housing due to previously enacted policies. In looking at this issue, I aim to use the theory of institutional racism to explain how past housing policies that enforce and perpetuate discrimination have impacted this current relationship. Through the method of policy analysis, I attempt to pinpoint where past housing policies have failed to provide housing to many African Americans. I find that there are several policies that were enacted during 1930s and 40s, specifically the New Deal Era, that inflicted discriminatory housing policies on African Americans. The findings indicate that …
The Intersection Of Judicial Interpretive Methods And Politics In Supreme Court Justices’ Due Process Opinions, Julie Castle
The Intersection Of Judicial Interpretive Methods And Politics In Supreme Court Justices’ Due Process Opinions, Julie Castle
Capstone Showcase
The Supreme Court, a nine seat bench of unelected and lifetime tenured Justices, determines the constitutionality of dozens of cases each year. In this thesis, I research to what extent the political affiliation of the Justices affect the judicial decision making process and, ultimately, outcomes. Using pattern matching, I evaluate due process opinions from Justice Breyer, Justice O’Connor, and Justice Scalia, all of whom have established constitutional analysis methods, in order to determine if they reasonably adhere to their established method. Due to the highly political nature of due process cases, variance between the expected (adherence to the Justices’ established …
Never Again? The United Nations And Genocide: A Doomed Mission?, Maria Terrinoni
Never Again? The United Nations And Genocide: A Doomed Mission?, Maria Terrinoni
Capstone Showcase
Despite their commitment to international peace and security and to the concept of “never again,” the United Nations has failed to end the many genocides of the late 20th century. In this thesis, I use the genocides in Rwanda (1994) and in the Yugoslav Wars (1991-1999) as case studies to understand the UN’s response to genocide and to attempt to understand why the UN cannot effectively respond to and end genocide. I discover that issues such as the limitations of the Genocide Convention, the importance of state sovereignty, and overall institutional failures of the United Nation make any attempt to …