Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- TÜBİTAK (372)
- Selected Works (99)
- Embry-Riddle Aeronautical University (36)
- Singapore Management University (31)
- Wright State University (17)
-
- Purdue University (13)
- University of Dayton (13)
- University of Nebraska - Lincoln (11)
- University of New Haven (10)
- Loyola University Chicago (7)
- San Jose State University (6)
- University of South Carolina (6)
- Edith Cowan University (5)
- Washington University in St. Louis (5)
- Old Dominion University (4)
- California Polytechnic State University, San Luis Obispo (3)
- Chapman University (3)
- Portland State University (3)
- Technological University Dublin (3)
- University of Arkansas, Fayetteville (3)
- University of Nevada, Las Vegas (3)
- Florida International University (2)
- Fordham University (2)
- Kennesaw State University (2)
- Macalester College (2)
- Missouri University of Science and Technology (2)
- South Dakota State University (2)
- University of Massachusetts Amherst (2)
- University of South Florida (2)
- University of Tennessee, Knoxville (2)
- Keyword
-
- Department of Computer Science and Engineering (17)
- Applied sciences (14)
- Particle swarm optimization (13)
- Genetic algorithm (11)
- Optimization (11)
-
- Digital forensics (10)
- Security (8)
- Power quality (7)
- Classification (6)
- Computer forensics (6)
- Engineering, Computer Science and Engineering (6)
- Artificial neural network (5)
- Atomic requirements (5)
- FPGA (5)
- Feature extraction (5)
- Fuzzy logic (5)
- Image processing (5)
- Induction motor (5)
- Maximum power point tracking (5)
- Privacy (5)
- Renewable energy (5)
- Singular requirements (5)
- Support vector machines (5)
- Survey (5)
- Wireless sensor networks (5)
- Android (4)
- Computer Science (4)
- Computer vision (4)
- Cyber forensics (4)
- Field-programmable gate array (4)
- Publication
-
- Turkish Journal of Electrical Engineering and Computer Sciences (372)
- Monish R. Chatterjee (47)
- Partha Banerjee (35)
- Journal of Digital Forensics, Security and Law (31)
- Research Collection School Of Computing and Information Systems (31)
-
- Browse all Theses and Dissertations (17)
- Electrical and Computer Engineering Faculty Publications (12)
- Electrical & Computer Engineering and Computer Science Faculty Publications (10)
- Faculty Publications (8)
- Oleg Sokolsky (8)
- Computer Science: Faculty Publications and Other Works (7)
- Theses and Dissertations (7)
- Department of Computer Science and Engineering: Dissertations, Theses, and Student Research (6)
- Open Access Dissertations (6)
- Open Access Theses (6)
- All Computer Science and Engineering Research (5)
- Annual ADFSL Conference on Digital Forensics, Security and Law (5)
- CSE Conference and Workshop Papers (3)
- Computer Engineering (3)
- Electronic Theses and Dissertations (3)
- Engineering Faculty Articles and Research (3)
- UNLV Theses, Dissertations, Professional Papers, and Capstones (3)
- Australian Digital Forensics Conference (2)
- Computer Science Faculty Publications (2)
- Dissertations (2)
- Doctoral Dissertations (2)
- Electronic Thesis and Dissertation Repository (2)
- Elena A. Guliants (2)
- FIU Electronic Theses and Dissertations (2)
- Graduate Theses and Dissertations (2)
- Publication Type
- File Type
Articles 661 - 690 of 698
Full-Text Articles in Physical Sciences and Mathematics
A Designed Converter For Minimizing Srm Torque Ripple With Controlled Boost Capacitor Automatically, Loghman Samani, Mahdi Abdolhamidi, Amir Rashidi, Sayed Morteza Saghaiannezhad
A Designed Converter For Minimizing Srm Torque Ripple With Controlled Boost Capacitor Automatically, Loghman Samani, Mahdi Abdolhamidi, Amir Rashidi, Sayed Morteza Saghaiannezhad
Turkish Journal of Electrical Engineering and Computer Sciences
Direct instantaneous torque control (DITC) is one way of controlling torque in switched reluctance motors. Despite the presence of DITC control, torque ripple at nominal or higher speeds is considerable due to the back emf increasing. To overcome this drawback, many converters have been proposed. In most convertors proposed for fast excitation in DITC, controlling of boost capacity is an important problem. This paper presents a DITC for a switched reluctance motor using a proposed converter to reduce the torque ripple with controlled boost capacitor automatically. The proposed converter reduces the torque ripple at rated or higher speeds and no …
Design And Implementation Of A Compact Avionics Instrument For Light Aviation, Mustafa Emre Aydemi̇r
Design And Implementation Of A Compact Avionics Instrument For Light Aviation, Mustafa Emre Aydemi̇r
Turkish Journal of Electrical Engineering and Computer Sciences
In this study, a low-cost compact avionics instrument has been designed and implemented for light aviation vehicles such as ultralight airplanes, hang glider-trikes, and paramotors. At the moment there are a few commercial products that provide flight data and vehicle statuses such as altitude, temperature, fuel level, and engine hours meter. However, due to low production rates, customization for different air vehicles, and complex electronics and signal processing hardware, these instruments are generally far from being affordable; their cost may even be more than that of the air vehicle. This study presents a novel approach such that recent state-of-the-art hardware …
Modeling And Performance Optimization Of Photovoltaic And Thermal Collector Hybrid System, Di̇lşad Engi̇n, Meti̇n Çolak
Modeling And Performance Optimization Of Photovoltaic And Thermal Collector Hybrid System, Di̇lşad Engi̇n, Meti̇n Çolak
Turkish Journal of Electrical Engineering and Computer Sciences
In this paper, the hybrid photovoltaic/thermal collector (PV/T) system's electrical and thermal efficiency was examined by stating a mathematical model and developing a prototype of the system. To enhance the electrical efficiency, the cell temperature of the PV module was decreased with cooling and the heated fluid could be used for low heating applications. For this purpose, a PV/T system was modeled and constructed using a thermal collector placed beneath the photovoltaic panel where the excess heat and solar radiation through the transparent PV module was the input of the thermal collector. A transparent solar module was used in order …
Iot+Small Data: Transforming In-Store Shopping Analytics And Services, Meera Radhakrishnan, Sougata Sen, Vigneshwaran Subbaraju, Archan Misra, Rajesh Balan
Iot+Small Data: Transforming In-Store Shopping Analytics And Services, Meera Radhakrishnan, Sougata Sen, Vigneshwaran Subbaraju, Archan Misra, Rajesh Balan
Research Collection School Of Computing and Information Systems
We espouse a vision of small data-based immersive retail analytics, where a combination of sensor data, from personal wearable-devices and store-deployed sensors & IoT devices, is used to create real-time, individualized services for in-store shoppers. Key challenges include (a) appropriate joint mining of sensor & wearable data to capture a shopper’s product level interactions, and (b) judicious triggering of power-hungry wearable sensors (e.g., camera) to capture only relevant portions of a shopper’s in-store activities. To explore the feasibility of our vision, we conducted experiments with 5 smartwatch-wearing users who interacted with objects placed on cupboard racks in our lab (to …
An Autoencoder-Based Image Descriptor For Image Matching And Retrieval, Chenyang Zhao
An Autoencoder-Based Image Descriptor For Image Matching And Retrieval, Chenyang Zhao
Browse all Theses and Dissertations
Local image features are used in many computer vision applications. Many point detectors and descriptors have been proposed in recent years; however, creation of effective descriptors is still a topic of research. The Scale Invariant Feature Transform (SIFT) developed by David Lowe is widely used in image matching and image retrieval. SIFT detects interest points in an image based on Scale-Space analysis, which is invariant to change in image scale. A SIFT descriptor contains gradient information about an image patch centered at a point of interest. SIFT is found to provide a high matching rate, is robust to image transformations; …
A Stochastic Petri Net Based Nlu Scheme For Technical Documents Understanding, Adamantia Psarologou
A Stochastic Petri Net Based Nlu Scheme For Technical Documents Understanding, Adamantia Psarologou
Browse all Theses and Dissertations
Natural Language Understanding (NLU) is a very old research field, which deals with machine reading comprehension. Despite the many years of work and the numerous accomplishments by several researchers in the field, there is still place for significant improvements. Here, our goal is to develop a novel NLU methodology for detecting and extracting event/action associations in technical documents. In order to achieve this goal we present a synergy of methods (Kernel extraction, Formal Language Modeling, Stochastic Petri-nets (SPN) mapping and Event Representation via SPN graph synthesis). In particular, the basic meaning of a natural language sentence is given by its …
Software Defined Secure Ad Hoc Wireless Networks, Maha Alqallaf
Software Defined Secure Ad Hoc Wireless Networks, Maha Alqallaf
Browse all Theses and Dissertations
Software defined networking (SDN), a new networking paradigm that separates the network data plane from the control plane, has been considered as a flexible, layered, modular, and efficient approach to managing and controlling networks ranging from wired, infrastructure-based wireless (e.g., cellular wireless networks, WiFi, wireless mesh net- works), to infrastructure-less wireless networks (e.g. mobile ad-hoc networks, vehicular ad-hoc networks) as well as to offering new types of services and to evolving the Internet architecture. Most work has focused on the SDN application in traditional and wired and/or infrastructure based networks. Wireless networks have become increasingly more heterogeneous. Secure and collab- …
Knowledge-Empowered Probabilistic Graphical Models For Physical-Cyber-Social Systems, Pramod Anantharam
Knowledge-Empowered Probabilistic Graphical Models For Physical-Cyber-Social Systems, Pramod Anantharam
Browse all Theses and Dissertations
There is a rapid intertwining of sensors and mobile devices into the fabric of our lives. This has resulted in unprecedented growth in the number of observations from the physical and social worlds reported in the cyber world. Sensing and computational components embedded in the physical world constitute a Cyber-Physical System (CPS). Current science of CPS is yet to effectively integrate citizen observations in CPS analysis. We demonstrate the role of citizen observations in CPS and propose a novel approach to perform a holistic analysis of machine and citizen sensor observations. Specifically, we demonstrate the complementary, corroborative, and timely aspects …
Knowledge Driven Search Intent Mining, Ashutosh Jadhav
Knowledge Driven Search Intent Mining, Ashutosh Jadhav
Browse all Theses and Dissertations
Understanding users' latent intents behind search queries is essential for satisfying a user's search needs. Search intent mining can help search engines to enhance its ranking of search results, enabling new search features like instant answers, personalization, search result diversification, and the recommendation of more relevant ads. Hence, there has been increasing attention on studying how to effectively mine search intents by analyzing search engine query logs. While state-of-the-art techniques can identify the domain of the queries (e.g. sports, movies, health), identifying domain-specific intent is still an open problem. Among all the topics available on the Internet, health is one …
Mining And Analyzing Subjective Experiences In User Generated Content, Lu Chen
Mining And Analyzing Subjective Experiences In User Generated Content, Lu Chen
Browse all Theses and Dissertations
Web 2.0 and social media enable people to create, share and discover information instantly anywhere, anytime. A great amount of this information is subjective information -- the information about people's subjective experiences, ranging from feelings of what is happening in our daily lives to opinions on a wide variety of topics. Subjective information is useful to individuals, businesses, and government agencies to support decision making in areas such as product purchase, marketing strategy, and policy making. However, much useful subjective information is buried in ever-growing user generated data on social media platforms, it is still difficult to extract high quality …
Knowledge-Driven Implicit Information Extraction, Pathirage Dinindu Perera
Knowledge-Driven Implicit Information Extraction, Pathirage Dinindu Perera
Browse all Theses and Dissertations
Natural language is a powerful tool developed by humans over hundreds of thousands of years. The extensive usage, flexibility of the language, creativity of the human beings, and social, cultural, and economic changes that have taken place in daily life have added new constructs, styles, and features to the language. One such feature of the language is its ability to express ideas, opinions, and facts in an implicit manner. This is a feature that is used extensively in day to day communications in situations such as: 1) expressing sarcasm, 2) when trying to recall forgotten things, 3) when required to …
Miniatured Inertial Motion And Position Tracking And Visualization Systems Using Android Wear Platform, Dhruvkumar Navinchandra Patel
Miniatured Inertial Motion And Position Tracking And Visualization Systems Using Android Wear Platform, Dhruvkumar Navinchandra Patel
Browse all Theses and Dissertations
In this thesis, we have designed and developed a motion tracking and visualization system using the latest motion tracking sensory technologies. It is one of the enabling technologies for our novel visual-inertial odometer and human anatomy based 3D Locating, Mapping and Navigation system for endoscopy and drug delivery capsules used inside GI tract. In particular, we have: i) designed and completed a cloud-based sensory data collecting, processing and storage system to provide the reliable computing and storage platform; ii) explored different data processing methods to obtain improved-quality motion results from extremely noisy raw data, e.g., by using a low pass …
Educational Methods For Inverted-Lecture Computer Science And Engineering Classrooms To Overcome Common Barriers To Stem Student Success, Kathleen Timmerman
Educational Methods For Inverted-Lecture Computer Science And Engineering Classrooms To Overcome Common Barriers To Stem Student Success, Kathleen Timmerman
Browse all Theses and Dissertations
New educational pedagogies are emerging in an effort to increase the number of new engineers available to enter the workforce in the coming years. One of the re-occurring themes in these pedagogies is variations of the flipped classroom. Often the additional classroom time gained from flipping is used to reinforce learning objectives. It is hypothesized that it might be more beneficial to students if a portion of that time is used to address common non-cognitive barriers that prevent students from succeeding in the major. In a freshman Introductory Computer Science course, three different pedagogies are compared: a hybrid lecture-active learning …
De-Anonymization Attack Anatomy And Analysis Of Ohio Nursing Workforce Data Anonymization, Jacob M. Miracle
De-Anonymization Attack Anatomy And Analysis Of Ohio Nursing Workforce Data Anonymization, Jacob M. Miracle
Browse all Theses and Dissertations
Data generalization (anonymization) is a widely misunderstood technique for preserving individual privacy in non-interactive data publishing. Easily avoidable anonymization failures are still occurring 14 years after the discovery of basic techniques to protect against them. Identities of individuals in anonymized datasets are at risk of being disclosed by cyber attackers who exploit these failures. To demonstrate the importance of proper data anonymization we present three perspectives on data anonymization. First, we examine several de-anonymization attacks to formalize the anatomy used to conduct attacks on anonymous data. Second, we examine the vulnerabilities of an anonymous nursing workforce survey to convey how …
A Hybrid Approach To Aerial Video Image Registration, Karol T. Salva
A Hybrid Approach To Aerial Video Image Registration, Karol T. Salva
Browse all Theses and Dissertations
Many video processing applications, such as motion detection and tracking, rely on accurate and robust alignment between consecutive video frames. Traditional approaches to video image registration, such as pyramidal Kanade-Lucas-Tomasi (KLT) feature detection and tracking are fast and subpixel accurate, but are not robust to large inter-frame displacements due to rotation, scale, or translation. This thesis presents an alternative hybrid approach using normalized gradient correlation (NGC) in the frequency domain and normalized cross-correlation (NCC) in the spatial domain that is fast, accurate, and robust to large displacements. A scale space search is incorporated into NGC to enable more consistent recovery …
Intelligent Caching To Mitigate The Impact Of Web Robots On Web Servers, Howard Nathan Rude
Intelligent Caching To Mitigate The Impact Of Web Robots On Web Servers, Howard Nathan Rude
Browse all Theses and Dissertations
With an ever increasing amount of data that is shared and posted on the Web, the desire and necessity to automatically glean this information has led to an increase in the sophistication and volume of software agents called web robots or crawlers. Recent measurements, including our own across the entire logs of Wright State University Web servers over the past two years, suggest that at least 60\% of all requests originate from robots rather than humans. Web robots display different statistical and behavioral patterns in their traffic compared to humans, yet present Web server optimizations presume that traffic exhibits predominantly …
Identifying Offensive Videos On Youtube, Rajeshwari Kandakatla
Identifying Offensive Videos On Youtube, Rajeshwari Kandakatla
Browse all Theses and Dissertations
Harassment on social media has become a critical problem and social media content depicting harassment is becoming common place. Video-sharing websites such as YouTube contain content that may be offensive to certain community, insulting to certain religion, race etc., or make fun of disabilities. These videos can also provoke and promote altercations leading to online harassment of individuals and groups. In this thesis, we present a system that identifies offensive videos on YouTube. Our goal is to determine features that can be used to detect offensive videos efficiently and reliably. We conducted experiments using content and metadata available for each …
Evidential Reasoning For Forensic Readiness, Yi-Ching Liao, Hanno Langweg
Evidential Reasoning For Forensic Readiness, Yi-Ching Liao, Hanno Langweg
Journal of Digital Forensics, Security and Law
To learn from the past, we analyse 1,088 "computer as a target" judgements for evidential reasoning by extracting four case elements: decision, intent, fact, and evidence. Analysing the decision element is essential for studying the scale of sentence severity for cross-jurisdictional comparisons. Examining the intent element can facilitate future risk assessment. Analysing the fact element can enhance an organization's capability of analysing criminal activities for future offender profiling. Examining the evidence used against a defendant from previous judgements can facilitate the preparation of evidence for upcoming legal disclosure. Follow the concepts of argumentation diagrams, we develop an automatic judgement summarizing …
Low Budget Forensic Drive Imaging Using Arm Based Single Board Computers, Eric Olson, Narasimha Shashidhar
Low Budget Forensic Drive Imaging Using Arm Based Single Board Computers, Eric Olson, Narasimha Shashidhar
Journal of Digital Forensics, Security and Law
Traditional forensic analysis of hard disks and external media typically involves a powered down machine and “dead analysis” of these devices. Forensic acquisition of hard drives and external media has traditionally been by one of several means: standalone forensic duplicator; using a hardware write-blocker or dock attached to a laptop, computer, workstation, etc., forensic operating systems that live boot from a USB, CD/DVD or virtual machines with preinstalled operating systems. Standalone forensics acquisition and imaging devices generally cost thousands of dollars. In this paper, we propose the use of single board computers as forensic imaging devices. Single board computers can …
Digital Forensics In Law Enforcement: A Needs Based Analysis Of Indiana Agencies, Teri A. Cummins Flory
Digital Forensics In Law Enforcement: A Needs Based Analysis Of Indiana Agencies, Teri A. Cummins Flory
Journal of Digital Forensics, Security and Law
Cyber crime is a growing problem, with the impact to society increasing exponentially, but the ability of local law enforcement agencies to investigate and successfully prosecute criminals for these crimes is unclear. Many national needs assessments have previously been conducted, and all indicated that state and local law enforcement did not have the training, tools, or staff to effectively conduct digital investigations, but very few have been completed recently. This study provided a current and localized assessment of the ability of Indiana law enforcement agencies to effectively investigate crimes involving digital evidence, the availability of training for both law enforcement …
Table Of Contents
Journal of Digital Forensics, Security and Law
No abstract provided.
Exploring Deviant Hacker Networks (Dhm) On Social Media Platforms, Samer Al-Khateeb, Kevin J. Conlan, Nitin Agarwal, Ibrahim Baggili, Frank Breitinger
Exploring Deviant Hacker Networks (Dhm) On Social Media Platforms, Samer Al-Khateeb, Kevin J. Conlan, Nitin Agarwal, Ibrahim Baggili, Frank Breitinger
Journal of Digital Forensics, Security and Law
Online Social Networks (OSNs) have grown exponentially over the past decade. The initial use of social media for benign purposes (e.g., to socialize with friends, browse pictures and photographs, and communicate with family members overseas) has now transitioned to include malicious activities (e.g., cybercrime, cyberterrorism, and cyberwarfare). These nefarious uses of OSNs poses a significant threat to society, and thus requires research attention. In this exploratory work, we study activities of one deviant groups: hacker groups on social media, which we term Deviant Hacker Networks (DHN). We investigated the connection between different DHNs on Twitter: how they are connected, identified …
Log Analysis Using Temporal Logic And Reconstruction Approach: Web Server Case, Murat Gunestas, Zeki Bilgin
Log Analysis Using Temporal Logic And Reconstruction Approach: Web Server Case, Murat Gunestas, Zeki Bilgin
Journal of Digital Forensics, Security and Law
We present a post-mortem log analysis method based on Temporal Logic (TL), Event Processing Language (EPL), and reconstruction approach. After showing that the proposed method could be adapted to any misuse event or attack, we specifically investigate the case of web server misuses. To this end, we examine 5 different misuses on Wordpress web servers, and generate corresponding log files of these attacks for forensic analysis. Then we establish attack patterns and formalize them by means of a special case of temporal logic, i.e. many sorted first order metric temporal logic (MSFOMTL). Later on, we implement these attack patterns in …
Bytewise Approximate Matching: The Good, The Bad, And The Unknown, Vikram S. Harichandran, Frank Breitinger, Ibrahim Baggili
Bytewise Approximate Matching: The Good, The Bad, And The Unknown, Vikram S. Harichandran, Frank Breitinger, Ibrahim Baggili
Journal of Digital Forensics, Security and Law
Hash functions are established and well-known in digital forensics, where they are commonly used for proving integrity and file identification (i.e., hash all files on a seized device and compare the fingerprints against a reference database). However, with respect to the latter operation, an active adversary can easily overcome this approach because traditional hashes are designed to be sensitive to altering an input; output will significantly change if a single bit is flipped. Therefore, researchers developed approximate matching, which is a rather new, less prominent area but was conceived as a more robust counterpart to traditional hashing. Since the conception …
On Efficiency Of Distributed Password Recovery, Radek Hranický, Martin Holkovič, Petr Matoušek
On Efficiency Of Distributed Password Recovery, Radek Hranický, Martin Holkovič, Petr Matoušek
Journal of Digital Forensics, Security and Law
One of the major challenges in digital forensics today is data encryption. Due to the leaked information about unlawful sniffing, many users decided to protect their data by encryption. In case of criminal activities, forensic experts are challenged how to decipher suspect's data that are subject to investigation. A common method how to overcome password-based protection is a brute force password recovery using GPU-accelerated hardware. This approach seems to be expensive. This paper presents an alternative approach using task distribution based on BOINC platform. The cost, time and energy efficiency of this approach is discussed and compared to the GPU-based …
Towards Syntactic Approximate Matching - A Pre-Processing Experiment, Doowon Jeong, Frank Breitinger, Hari Kang, Sangjin Lee
Towards Syntactic Approximate Matching - A Pre-Processing Experiment, Doowon Jeong, Frank Breitinger, Hari Kang, Sangjin Lee
Journal of Digital Forensics, Security and Law
Over the past few years the popularity of approximate matching algorithms (a.k.a. fuzzy hashing) has increased. Especially within the area of bytewise approximate matching, several algorithms were published, tested and improved. It has been shown that these algorithms are powerful, however they are sometimes too precise for real world investigations. That is, even very small commonalities (e.g., in the header of a le) can cause a match. While this is a desired property, it may also lead to unwanted results. In this paper we show that by using simple pre-processing, we signicantly can in uence the outcome. Although our test …
Electronic Voting Service Using Block-Chain, Kibin Lee, Joshua I. James, Tekachew G. Ejeta, Hyoung J. Kim
Electronic Voting Service Using Block-Chain, Kibin Lee, Joshua I. James, Tekachew G. Ejeta, Hyoung J. Kim
Journal of Digital Forensics, Security and Law
Cryptocurrency, and its underlying technologies, has been gaining popularity for transaction management beyond financial transactions. Transaction information is maintained in the block-chain, which can be used to audit the integrity of the transaction. The focus on this paper is the potential availability of block-chain technology of other transactional uses. Block-chain is one of the most stable open ledgers that preserves transaction information, and is difficult to forge. Since the information stored in block-chain is not related to personally identify information, it has the characteristics of anonymity. Also, the block-chain allows for transparent transaction verification since all information in the block-chain …
Countering Noise-Based Splicing Detection Using Noise Density Transfer, Thibault Julliand, Vincent Nozick, Hugues Talbot
Countering Noise-Based Splicing Detection Using Noise Density Transfer, Thibault Julliand, Vincent Nozick, Hugues Talbot
Journal of Digital Forensics, Security and Law
Image splicing is a common and widespread type of manipulation, which is defined as pasting a portion of an image onto a second image. Several forensic methods have been developed to detect splicing, using various image properties. Some of these methods exploit the noise statistics of the image to try and find discrepancies. In this paper, we propose a new counter-forensic approach to eliminate the noise differences that can appear in a spliced image. This approach can also be used when creating computer graphics images, in order to endow them with a realistic noise. This is performed by changing the …
An Automated Approach For Digital Forensic Analysis Of Heterogeneous Big Data, Hussam Mohammed, Nathan Clarke, Fudong Li
An Automated Approach For Digital Forensic Analysis Of Heterogeneous Big Data, Hussam Mohammed, Nathan Clarke, Fudong Li
Journal of Digital Forensics, Security and Law
The major challenges with big data examination and analysis are volume, complex interdependence across content, and heterogeneity. The examination and analysis phases are considered essential to a digital forensics process. However, traditional techniques for the forensic investigation use one or more forensic tools to examine and analyse each resource. In addition, when multiple resources are included in one case, there is an inability to cross-correlate findings which often leads to inefficiencies in processing and identifying evidence. Furthermore, most current forensics tools cannot cope with large volumes of data. This paper develops a novel framework for digital forensic analysis of heterogeneous …
Making Sense Of Email Addresses On Drives, Neil C. Rowe, Riqui Schwamm, Michael R. Mccarrin, Ralucca Gera
Making Sense Of Email Addresses On Drives, Neil C. Rowe, Riqui Schwamm, Michael R. Mccarrin, Ralucca Gera
Journal of Digital Forensics, Security and Law
Drives found during investigations often have useful information in the form of email addresses which can be acquired by search in the raw drive data independent of the file system. Using this data we can build a picture of the social networks that a drive owner participated in, even perhaps better than investigating their online profiles maintained by social-networking services because drives contain much data that users have not approved for public display. However, many addresses found on drives are not forensically interesting, such as sales and support links. We developed a program to filter these out using a Naïve …