Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Aviation (2)
- Cybersecurity (2)
- General aviation (2)
- UAS (2)
- Accident investigations (1)
-
- Accidents (1)
- Air Traffic Control (1)
- Air Traffic Control (ATC) (1)
- Air traffic control (1)
- Aircraft accidents & safety (1)
- Aircraft crash (1)
- Aircraft design (1)
- Aircraft standards (1)
- Altimeter (1)
- Altimetry (1)
- Artificial intelligence (1)
- Automation (1)
- Aviation Mental Health (1)
- Aviation Meteorology (1)
- Aviation Safety (1)
- Aviation Security (1)
- Aviation Weather (1)
- Aviation Wildlife Hazard (Birdstrikes) (1)
- Aviation bird hazard (1)
- Aviation education (1)
- Aviation meteorology (1)
- Aviation security (1)
- Aviation weather information (1)
- Bird strike damage (1)
- Birds NEXRAD (1)
- Publication Year
- Publication
- Publication Type
- File Type
Articles 31 - 60 of 96
Full-Text Articles in Physical Sciences and Mathematics
Front Matter, Adfsl
Front Matter, Adfsl
Annual ADFSL Conference on Digital Forensics, Security and Law
No abstract provided.
Contents, Adfsl
Contents, Adfsl
Annual ADFSL Conference on Digital Forensics, Security and Law
No abstract provided.
Quantitative Examination And Comparison Of Altimetry Rules-Of-Thumb For General Aviation, Thomas A. Guinn
Quantitative Examination And Comparison Of Altimetry Rules-Of-Thumb For General Aviation, Thomas A. Guinn
International Journal of Aviation, Aeronautics, and Aerospace
General aviation rules of thumb (ROTs) for density altitude and true altitude are examined and developed. Both ROTs originate from the same basic principle of hydrostatic balance, but differ significantly in the assumptions made regarding the atmospheric temperature profile. While the ROT for DA assumes a standard atmospheric vertical temperature lapse rate, the ROT for true altitude requires information regarding the observed layer-mean temperature of the atmosphere. Since the layer-mean temperature between the aircraft and the surface is typically unknown, it must be inferred from the temperature at a single level by again assuming a linear lapse rate. This method …
Space Operations In The Suborbital Space Flight Simulator And Mission Control Center: Lessons Learned With Xcor Lynx, Pedro Llanos, Christopher Nguyen, David Williams, Kim O. Chambers Ph.D., Erik Seedhouse, Robert Davidson
Space Operations In The Suborbital Space Flight Simulator And Mission Control Center: Lessons Learned With Xcor Lynx, Pedro Llanos, Christopher Nguyen, David Williams, Kim O. Chambers Ph.D., Erik Seedhouse, Robert Davidson
Journal of Aviation/Aerospace Education & Research
This study was conducted to better understand the performance of the XCOR Lynx vehicle. Because the Lynx development was halted, the best knowledge of vehicle dynamics can only be found through simulator flights. X-Plane 10 was chosen for its robust applications and accurate portrayal of dynamics on a vehicle in flight. The Suborbital Space Flight Simulator (SSFS) and Mission Control Center (MCC) were brought to the Applied Aviation Sciences department in fall 2015 at Embry-Riddle Aeronautical University, Daytona Beach campus. This academic and research tool is a department asset capable of providing multiple fields of data about suborbital simulated flights. …
Rates And Causes Of Accidents For General Aviation Aircraft Operating In A Mountainous And High Elevation Terrain Environment, Marisa Aguiar, Alan Stolzer, Douglas D. Boyd
Rates And Causes Of Accidents For General Aviation Aircraft Operating In A Mountainous And High Elevation Terrain Environment, Marisa Aguiar, Alan Stolzer, Douglas D. Boyd
Publications
Flying over mountainous and/or high elevation terrain is challenging due to rapidly changeable visibility, gusty/rotor winds and downdrafts and the necessity of terrain avoidance. Herein, general aviation accident rates and mishap cause/factors were determined (2001–2014) for a geographical region characterized by such terrain.
Accidents in single piston engine-powered aircraft for states west of the US continental divide characterized by mountainous terrain and/or high elevation (MEHET) were identified from the NTSB database. MEHET-related-mishaps were defined as satisfying any one, or more, criteria (controlled flight into terrain/obstacles (CFIT), downdrafts, mountain obscuration, wind-shear, gusting winds, whiteout, instrument meteorological conditions; density altitude, dust-devil) cited …
Effects Of Graphical Weather Information Versus Textual Weather Information On Situation Awareness In Meteorology, Stefan Melendez M.S.A., Andrew Dattel Ph.D., Christopher Herbster Ph.D., Debbie Schaum M.A., Andrey Babin
Effects Of Graphical Weather Information Versus Textual Weather Information On Situation Awareness In Meteorology, Stefan Melendez M.S.A., Andrew Dattel Ph.D., Christopher Herbster Ph.D., Debbie Schaum M.A., Andrey Babin
National Training Aircraft Symposium (NTAS)
Prior to a flight, pilots gather meteorological information in order to assess the weather conditions pertaining to their flight and to make decisions based on it. This information can come in various formats, such as text and graphical weather information. Research has shown that people have varying learning preferences and that most people prefer visual learning to verbal learning (i.e., graphical over text). It is hypothesized that this difference in learning preference can affect the way pilots interpret and apply the information they obtain prior to their flight. The researcher hypothesizes that graphical weather information has a greater, more positive …
The Value Of A Collegiate Far Part 141 Jeopardy-Crew Resource Management (Crm)-Simulation Event, Samuel M. Vance
The Value Of A Collegiate Far Part 141 Jeopardy-Crew Resource Management (Crm)-Simulation Event, Samuel M. Vance
Journal of Aviation/Aerospace Education & Research
This article explores the viability of using a FAR Part 141 collegiate crew resource management (CRM) flight simulator scenario event as a jeopardy event (a graded, syllabus item) in an upper-level professional pilot curriculum course. Ultimately, the objective is to suggest this approach as a value-added curriculum consideration for other collegiate professional pilot programs. The selection of four CRM criteria to be examined was made by the course professor. Using the four principles, the students assembled the grading rubric for their event. The simulator scenario placed students in airspace, geography and weather dissimilar to that in which they were training …
Quantifying The Effects Of Humidity On Density Altitude Calculations For Professional Aviation Education, Thomas A. Guinn, Randell J. Barry
Quantifying The Effects Of Humidity On Density Altitude Calculations For Professional Aviation Education, Thomas A. Guinn, Randell J. Barry
International Journal of Aviation, Aeronautics, and Aerospace
The effects of humidity on density altitude are quantified in detail and graphically represented as a function of temperature and dew-point temperature for ease of use in professional aviation education. A ten-year climatology of dew-point temperatures for various representative locations throughout the United States is created to provide a basis for comparison and use with the graphical displays. Density altitude is demonstrated to be a function only of dew-point temperature for a given pressure altitude. The absolute errors between density altitude calculations that incorporate humidity to those that do not are combined with linear regression techniques to create a simple …
Aviation And Cybersecurity: Opportunities For Applied Research, Jon Haass, Radhakrishna Sampigethaya, Vincent Capezzuto
Aviation And Cybersecurity: Opportunities For Applied Research, Jon Haass, Radhakrishna Sampigethaya, Vincent Capezzuto
Publications
Aviation connects the global community and is moving more people and payloads faster than ever. The next decade will experience an increase in manned and unmanned aircraft and systems with new features and unprecedented applications. Cybertechnologies—including software, computer networks, and information technology—are critical and fundamental to these advances in meeting the needs of the aviation ecosystem of aircraft, pilots, personnel, passengers, stakeholders, and society. This article discusses current and evolving threats as well as opportunities for applied research to improve the global cybersecurity stance in the aviation and connected transportation industry of tomorrow.
Sim Card Forensics: Digital Evidence, Nada Ibrahim, Nuha Al Naqbi, Farkhund Iqbal, Omar Alfandi
Sim Card Forensics: Digital Evidence, Nada Ibrahim, Nuha Al Naqbi, Farkhund Iqbal, Omar Alfandi
Annual ADFSL Conference on Digital Forensics, Security and Law
With the rapid evolution of the smartphone industry, mobile device forensics has become essential in cybercrime investigation. Currently, evidence forensically-retrieved from a mobile device is in the form of call logs, contacts, and SMSs; a mobile forensic investigator should also be aware of the vast amount of user data and network information that are stored in the mobile SIM card such as ICCID, IMSI, and ADN. The aim of this study is to test various forensic tools to effectively gather critical evidence stored on the SIM card. In the first set of experiments, we compare the selected forensic tools in …
Assessing The Gap: Measure The Impact Of Phishing On An Organization, Brad Wardman
Assessing The Gap: Measure The Impact Of Phishing On An Organization, Brad Wardman
Annual ADFSL Conference on Digital Forensics, Security and Law
Phishing has become one of the most recognized words associated with cybercrime. As more organizations are being targeted by phishing campaigns, there are more options within the industry to deter such attacks. However, there is little research into how much damage these campaigns are causing organizations. This paper will show how financial organizations can be impacted by phishing and present a method for accurately quantifying resultant monetary losses. The methodology presented in this paper can be adapted to other organizations in order to quantify phishing losses across industries.
Keywords: phishing, cybercrime, economics
Wban Security Management In Healthcare Enterprise Environments, Karina Bahena, Manghui Tu
Wban Security Management In Healthcare Enterprise Environments, Karina Bahena, Manghui Tu
Annual ADFSL Conference on Digital Forensics, Security and Law
As healthcare data are pushed online, consumers have raised big concerns on the breach of their personal information. Law and regulations have placed businesses and public organizations under obligations to take actions to prevent such data breaches. Various vulnerabilities have been identified in healthcare enterprise environments, in which the Wireless Body Area Networks (WBAN) remains to be a major vulnerability, which can be easily taken advantage of by determined adversaries. Thus, vulnerabilities of WBAN systems and the effective countermeasure mechanisms to secure WBAN are urgently needed. In this research, first, the architecture of WBAN system has been explored, and the …
Forensics Analysis Of Privacy Of Portable Web Browsers, Ahmad Ghafarian
Forensics Analysis Of Privacy Of Portable Web Browsers, Ahmad Ghafarian
Annual ADFSL Conference on Digital Forensics, Security and Law
Web browser vendors offer a portable web browser option which is considered as one of the features that provides user privacy. Portable web browser is a browser that can be launched from a USB flash drive without the need for its installation on the host machine. Most popular web browsers have portable versions of their browsers as well. Portable web browsing poses a great challenge to computer forensic investigators who try to reconstruct the past browsing history, in case of any computer incidence. This research examines various sources in the host machine such as physical memory, temporary, recent, event files, …
Reverse Engineering A Nit That Unmasks Tor Users, Matthew Miller, Joshua Stroschein, Ashley Podhradsky
Reverse Engineering A Nit That Unmasks Tor Users, Matthew Miller, Joshua Stroschein, Ashley Podhradsky
Annual ADFSL Conference on Digital Forensics, Security and Law
This paper is a case study of a forensic investigation of a Network Investigative Technique (NIT) used by the FBI to deanonymize users of a The Onion Router (Tor) Hidden Service. The forensic investigators were hired by the defense to determine how the NIT worked. The defendant was ac- cused of using a browser to access illegal information. The authors analyzed the source code, binary files and logs that were used by the NIT. The analysis was used to validate that the NIT collected only necessary and legally authorized information. This paper outlines the publicly available case details, how the …
Forensic Analysis Of Smartphone Applications For Privacy Leakage, Diana Hintea, Chrysanthi Taramonli, Robert Bird, Rezhna Yusuf
Forensic Analysis Of Smartphone Applications For Privacy Leakage, Diana Hintea, Chrysanthi Taramonli, Robert Bird, Rezhna Yusuf
Annual ADFSL Conference on Digital Forensics, Security and Law
Smartphone and tablets are personal devices that have diffused to near universal ubiquity in recent years. As Smartphone users become more privacy-aware and -conscious, research is needed to understand how “leakage” of private information (personally identifiable information – PII) occurs. This study explores how leakage studies in Droid devices should be adapted to Apple iOS devices. The OWASP Zed Attack Proxy (ZAP) is examined for 50 apps in various categories. This study confirms that: (1) most apps transmit unencrypted sensitive PII, (2) SSL is used by some recipient websites, but without corresponding app compliance with SSL, and (3) most apps …
Malware In The Mobile Device Android Environment, Diana Hintea, Robert Bird, Andrew Walker
Malware In The Mobile Device Android Environment, Diana Hintea, Robert Bird, Andrew Walker
Annual ADFSL Conference on Digital Forensics, Security and Law
exploit smartphone operating systems has exponentially expanded. Android has become the main target to exploit due to having the largest install base amongst the smartphone operating systems and owing to the open access nature in which application installations are permitted. Many Android users are unaware of the risks associated with a malware infection and to what level current malware scanners protect them. This paper tests how efficient the currently available malware scanners are. To achieve this, ten representative Android security products were selected and tested against a set of 5,560 known and categorized Android malware samples. The tests were carried …
One-Time Pad Encryption Steganography System, Michael J. Pelosi, Gary Kessler, Michael Scott S. Brown
One-Time Pad Encryption Steganography System, Michael J. Pelosi, Gary Kessler, Michael Scott S. Brown
Annual ADFSL Conference on Digital Forensics, Security and Law
In this paper we introduce and describe a novel approach to adaptive image steganography which is combined with One-Time Pad encryption, and demonstrate the software which implements this methodology. Testing using the state-of-the-art steganalysis software tool StegExpose concludes the image hiding is reliably secure and undetectable using reasonably-sized message payloads (≤25% message bits per image pixel; bpp). Payload image file format outputs from the software include PNG, BMP, JP2, JXR, J2K, TIFF, and WEBP. A variety of file output formats is empirically important as most steganalysis programs will only accept PNG, BMP, and possibly JPG, as the file inputs.
Keywords: …
Inferring Previously Uninstalled Applications From Residual Partial Artifacts, Jim Jones, Tahir Khan, Kathryn Laskey, Alex Nelson, Mary Laamanen, Douglas White
Inferring Previously Uninstalled Applications From Residual Partial Artifacts, Jim Jones, Tahir Khan, Kathryn Laskey, Alex Nelson, Mary Laamanen, Douglas White
Annual ADFSL Conference on Digital Forensics, Security and Law
In this paper, we present an approach and experimental results to suggest the past presence of an application after the application has been uninstalled and the system has remained in use. Current techniques rely on the recovery of intact artifacts and traces, e.g., whole files, Windows Registry entries, or log file entries, while our approach requires no intact artifact recovery and leverages trace evidence in the form of residual partial files. In the case of recently uninstalled applications or an instrumented infrastructure, artifacts and traces may be intact and complete. In most cases, however, digital artifacts and traces are al- …
Covert6: A Tool To Corroborate The Existence Of Ipv6 Covert Channels, Raymond A. Hansen, Lourdes Gino, Dominic Savio
Covert6: A Tool To Corroborate The Existence Of Ipv6 Covert Channels, Raymond A. Hansen, Lourdes Gino, Dominic Savio
Annual ADFSL Conference on Digital Forensics, Security and Law
Covert channels are any communication channel that can be exploited to transfer information in a manner that violates the system’s security policy. Research in the field has shown that, like many communication channels, IPv4 and the TCP/IP protocol suite have been susceptible to covert channels, which could be exploited to leak data or be used for anonymous communications. With the introduction of IPv6, researchers are acutely aware that many vulnerabilities of IPv4 have been remediated in IPv6. However, a proof of concept covert channel system was demonstrated in 2006. A decade later, IPv6 and its related protocols have undergone major …
Applying Grounded Theory Methods To Digital Forensics Research, Ahmed Almarzooqi, Andrew Jones, Richard Howley
Applying Grounded Theory Methods To Digital Forensics Research, Ahmed Almarzooqi, Andrew Jones, Richard Howley
Annual ADFSL Conference on Digital Forensics, Security and Law
Deciding on a suitable research methodology is challenging for researchers. In this paper, grounded theory is presented as a systematic and comprehensive qualitative methodology in the emergent field of digital forensics research. This paper applies grounded theory in a digital forensics research project undertaken to study how organisations build and manage digital forensics capabilities. This paper gives a step-by-step guideline to explain the procedures and techniques of using grounded theory in digital forensics research. The paper gives a detailed explanation of how the three grounded theory coding methods (open, axial, and selective coding) can be used in digital forensics research. …
Using Computer Behavior Profiles To Differentiate Between Users In A Digital Investigation, Shruti Gupta, Marcus Rogers
Using Computer Behavior Profiles To Differentiate Between Users In A Digital Investigation, Shruti Gupta, Marcus Rogers
Annual ADFSL Conference on Digital Forensics, Security and Law
Most digital crimes involve finding evidence on the computer and then linking it to a suspect using login information, such as a username and a password. However, login information is often shared or compromised. In such a situation, there needs to be a way to identify the user without relying exclusively on login credentials. This paper introduces the concept that users may show behavioral traits which might provide more information about the user on the computer. This hypothesis was tested by conducting an experiment in which subjects were required to perform common tasks on a computer, over multiple sessions. The …
Acceleration Of Statistical Detection Of Zero-Day Malware In The Memory Dump Using Cuda-Enabled Gpu Hardware, Igor Korkin, Iwan Nesterow
Acceleration Of Statistical Detection Of Zero-Day Malware In The Memory Dump Using Cuda-Enabled Gpu Hardware, Igor Korkin, Iwan Nesterow
Annual ADFSL Conference on Digital Forensics, Security and Law
This paper focuses on the anticipatory enhancement of methods of detecting stealth software. Cyber security detection tools are insufficiently powerful to reveal the most recent cyber-attacks which use malware. In this paper, we will present first an idea of the highest stealth malware, as this is the most complicated scenario for detection because it combines both existing anti-forensic techniques together with their potential improvements. Second, we will present new detection methods which are resilient to this hidden prototype. To help solve this detection challenge, we have analyzed Windows’ memory content using a new method of Shannon Entropy calculation; methods of …
Current Challenges And Future Research Areas For Digital Forensic Investigation, David Lillis, Brett A. Becker, Tadhg O’Sullivan, Mark Scanlon
Current Challenges And Future Research Areas For Digital Forensic Investigation, David Lillis, Brett A. Becker, Tadhg O’Sullivan, Mark Scanlon
Annual ADFSL Conference on Digital Forensics, Security and Law
Given the ever-increasing prevalence of technology in modern life, there is a corresponding increase in the likelihood of digital devices being pertinent to a criminal investigation or civil litigation. As a direct consequence, the number of investigations requiring digital forensic expertise is resulting in huge digital evidence backlogs being encountered by law enforcement agencies throughout the world. It can be anticipated that the number of cases requiring digital forensic analysis will greatly increase in the future. It is also likely that each case will require the analysis of an increasing number of devices including computers, smartphones, tablets, cloud-based services, Internet …
Forensic Analysis Of Ares Galaxy Peer-To-Peer Network, Frank Kolenbrander, Nhien-An Le-Khac, Tahar Kechadi
Forensic Analysis Of Ares Galaxy Peer-To-Peer Network, Frank Kolenbrander, Nhien-An Le-Khac, Tahar Kechadi
Annual ADFSL Conference on Digital Forensics, Security and Law
Child Abuse Material (CAM) is widely available on P2P networks. Over the last decade several tools were made for 24/7 monitoring of peer-to-peer (P2P) networks to discover suspects that use these networks for downloading and distribution of CAM. For some countries the amount of cases generated by these tools is so great that Law Enforcement (LE) just cannot handle them all. This is not only leading to backlogs and prioritizing of cases but also leading to discussions about the possibility of disrupting these networks and sending warning messages to potential CAM offenders. Recently, investigators are reporting that they are creating …
Keynote Speaker, Chuck Easttom
Keynote Speaker, Chuck Easttom
Annual ADFSL Conference on Digital Forensics, Security and Law
Conference Keynote Speaker, Chuck Easttom
Comment On Faa Rule Revision - Transport Category Aircraft, Paul F. Eschenfelder, Valter Battistoni
Comment On Faa Rule Revision - Transport Category Aircraft, Paul F. Eschenfelder, Valter Battistoni
Paul F. Eschenfelder
No abstract provided.
Aviation Bird Hazard In Nexrad Dual Polarization Weather Radar Confirmed By Visual Observations, Bradley M. Muller, Frederick R. Mosher, Christopher G. Herbster, Anthony T. Brickhouse
Aviation Bird Hazard In Nexrad Dual Polarization Weather Radar Confirmed By Visual Observations, Bradley M. Muller, Frederick R. Mosher, Christopher G. Herbster, Anthony T. Brickhouse
International Journal of Aviation, Aeronautics, and Aerospace
Birds represent a significant hazard to flying aircraft as illustrated by the “Miracle on the Hudson” encounter in 2009 between U.S. Airways Flight 1549 and a flock of Canada Geese, forcing the flight to ditch in the river. Birds are common in the skies over Florida during the spring migration season, and often appear in the National Weather Service’s (NWS) NEXRAD weather radar imagery as an easily recognizable signature known as a “roost ring.” This paper presents a NEXRAD roost ring case in central Florida in a rare instance where the signatures were confirmed by visual observations of the birds. …
Tracking Criminals On Facebook: A Case Study From A Digital Forensics Reu Program, Daniel Weiss, Gary Warner
Tracking Criminals On Facebook: A Case Study From A Digital Forensics Reu Program, Daniel Weiss, Gary Warner
Annual ADFSL Conference on Digital Forensics, Security and Law
The 2014 Digital Forensics Research Experience for Undergraduates (REU) Program at the University of Alabama at Birmingham (UAB) focused its summer efforts on tracking criminal forums and Facebook groups. The UAB-REU Facebook team was provided with a list of about 60 known criminal groups on Facebook, with a goal to track illegal information posted in these groups and ultimately store the information in a searchable database for use by digital forensic analysts. Over the course of about eight weeks, the UAB-REU Facebook team created a database with over 400 Facebook groups conducting criminal activity along with over 100,000 unique users …
Towards A Digital Forensics Competency-Based Program: Making Assessment Count, Rose Shumba
Towards A Digital Forensics Competency-Based Program: Making Assessment Count, Rose Shumba
Annual ADFSL Conference on Digital Forensics, Security and Law
This paper describes an approach that UMUC has initiated to revise its graduate programs to a Competency-Based Education (CBE) curriculum. The approach, which is Learning Demonstration (LD) centric, includes the identification of learning goals and competences, identification and description of the LDs, mapping of the LDs to the competences, scripting the LDs, placing the LDs into the respective courses, validating the developed materials, and the development of the open learning resources. Programs in the Cybersecurity and Information Assurance Department, including the Digital Forensics and Cyber Investigations program, are being revised. An LD centric approach to curriculum development helps align programs …
Phishing Intelligence Using The Simple Set Comparison Tool, Jason Britt, Alan Sprague, Gary Warner
Phishing Intelligence Using The Simple Set Comparison Tool, Jason Britt, Alan Sprague, Gary Warner
Annual ADFSL Conference on Digital Forensics, Security and Law
Phishing websites, phish, attempt to deceive users into exposing their passwords, user IDs, and other sensitive information by imitating legitimate websites, such as banks, product vendors, and service providers. Phishing investigators need fast automated tools to analyze the volume of phishing attacks seen today. In this paper, we present the Simple Set Comparison tool. The Simple Set Comparison tool is a fast automated tool that groups phish by imitated brand allowing phishing investigators to quickly identify and focus on phish targeting a particular brand. The Simple Set Comparison tool is evaluated against a traditional clustering algorithm over a month's worth …