Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 61 - 71 of 71

Full-Text Articles in Physical Sciences and Mathematics

Forensics Of Software Copyright Infringement Crimes: The Modern Posar Test Juxtaposed With The Dated Afc Test, Vinod P. Bhattathiripad Jan 2014

Forensics Of Software Copyright Infringement Crimes: The Modern Posar Test Juxtaposed With The Dated Afc Test, Vinod P. Bhattathiripad

Journal of Digital Forensics, Security and Law

This paper presents a new development in the forensics of software copyright through a juxtaposed comparison between the proven AFC test and the recent POSAR test, the two forensic procedures for establishing software copyright infringement cases. First, the paper separately overviews the 3-stage, linear sequential AFC test and then the 5-phase, cyclic POSAR test (as AFC’s logical extension). The paper then compares the processes involved in each of the 5 phases of the POSAR test with the processes involved in the 3 stages in the AFC test, for the benefit of forensic practitioners and researchers. Finally, the paper discusses some …


Developing A Conceptual Framework For Modeling Deviant Cyber Flash Mob: A Socio-Computational Approach Leveraging Hypergraph Constructs, Samer Al-Khateeb, Nitin Agarwal Jan 2014

Developing A Conceptual Framework For Modeling Deviant Cyber Flash Mob: A Socio-Computational Approach Leveraging Hypergraph Constructs, Samer Al-Khateeb, Nitin Agarwal

Journal of Digital Forensics, Security and Law

In a Flash Mob (FM) a group of people get together in the physical world perform an unpredicted act and disperse quickly. Cyber Flash Mob (CFM) is the cyber manifestation of flash mob coordinated primarily using social media. Deviant Cyber Flash Mob (or, DCFM) is a special case of CFM, which is categorized as the new face of transnational crime organizations (TCOs). The DCFM phenomenon can be considered as a form of a cyber-collective action that is defined as an action aiming to improve group’s conditions (such as, status or power). In this paper, we conduct a conceptual analysis of …


Audit: Automated Disk Investigation Toolkit, Umit Karabiyik, Sudhir Aggarwal Jan 2014

Audit: Automated Disk Investigation Toolkit, Umit Karabiyik, Sudhir Aggarwal

Journal of Digital Forensics, Security and Law

Software tools designed for disk analysis play a critical role today in forensics investigations. However, these digital forensics tools are often difficult to use, usually task specific, and generally require professionally trained users with IT backgrounds. The relevant tools are also often open source requiring additional technical knowledge and proper configuration. This makes it difficult for investigators without some computer science background to easily conduct the needed disk analysis. In this paper, we present AUDIT, a novel automated disk investigation toolkit that supports investigations conducted by non-expert (in IT and disk technology) and expert investigators. Our proof of concept design …


A Study Of Forensic Imaging In The Absence Of Write-Blockers, Gary C. Kessler, Gregory H. Carlton Jan 2014

A Study Of Forensic Imaging In The Absence Of Write-Blockers, Gary C. Kessler, Gregory H. Carlton

Journal of Digital Forensics, Security and Law

Best practices in digital forensics demand the use of write-blockers when creating forensic images of digital media, and this has been a core tenet of computer forensics training for decades. The practice is so ingrained that the integrity of images created without a write-blocker are immediately suspect. This paper describes a research framework that compares forensic images acquired with and without utilizing write-blockers in order to understand the extent of the differences, if any, in the resultant forensic copies. We specifically address whether differences are superficial or evidentiary, and we discuss the impact of admitting evidence acquired without write blocking. …


Book Review: The X-Ways Forensics Practitioner's Guide, Linda Lau Jan 2014

Book Review: The X-Ways Forensics Practitioner's Guide, Linda Lau

Journal of Digital Forensics, Security and Law

Brett Shavers is a former law enforcement officer, a digital forensics examiner, an adjunct instructor, and a frequent speaker at many conferences. After writing his first book, titled Placing the Suspect Behind the Keyboard: Using Digital Forensics and Investigative Techniques to Identify Cybercrime Suspects, he co-wrote his 2nd book with Eric Zimmerman and Jimmy Weg, who is a knowledgeable technical editor. Both Brett and Eric are experts in cyber forensics, with many years of law enforcement experience at both the state and federal levels.


Book Review: Judiciary-Friendly Forensics Of Software Copyright Infringement (Vinod Polpaya Bhattathiripad), Pedro L. P. Sanchez Jan 2014

Book Review: Judiciary-Friendly Forensics Of Software Copyright Infringement (Vinod Polpaya Bhattathiripad), Pedro L. P. Sanchez

Journal of Digital Forensics, Security and Law

Judiciary-Friendly Forensics of Software Copyright Infringement is a book by Dr. Vinod Polpaya Bhattathiripad, published by IGI-Global as part of its Research Essentials series. The book discusses the forensics of software copyright infringement and highlights theoretical, functional, and procedural matters in the investigation of copyright infringement of software products, as well as the development of forensic technologies to detect and avoid software piracy. It is of interest to software forensic experts, lawyers in the field of copyright infringement, judges, software professionals, and students.


Standoff Methods For The Detection Of Threat Agents: A Review Of Several Promising Laser-Based Techniques, J. Bruce Johnson, Susan D. Allen, Jonathan Merten, Lewis Johnson, Daniel Pinkham, Scott W. Reeve Jan 2014

Standoff Methods For The Detection Of Threat Agents: A Review Of Several Promising Laser-Based Techniques, J. Bruce Johnson, Susan D. Allen, Jonathan Merten, Lewis Johnson, Daniel Pinkham, Scott W. Reeve

Publications

Detection of explosives, explosive precursors, or other threat agents presents a number of technological challenges for optical sensing methods. Certainly detecting trace levels of threat agents against a complex background is chief among these challenges; however, the related issues of multiple target distances (from standoff to proximity) and sampling time scales (from passive mines to rapid rate of march convoy protection) for different applications make it unlikely that a single technique will be ideal for all sensing situations. A number of methods for spanning the range of optical sensor technologies exist which, when integrated, could produce a fused sensor system …


Differential Spectral Imaging Of The Cn Violet Band In Laser-Induced Plasmas On Tnt Simulant Molecules, J. Merten, M. Jones, S. Hoke, S. Allen Jan 2014

Differential Spectral Imaging Of The Cn Violet Band In Laser-Induced Plasmas On Tnt Simulant Molecules, J. Merten, M. Jones, S. Hoke, S. Allen

Publications

Dual channel emission imaging of m-nitrobenzoic acid and benzoic acid was performed in order to visualize the morphology of the CN violet band emission of a TNT analogue. The CN channel was corrected for continuum emission using a simultaneously imaged background channel. Simultaneous dual channel imaging alleviated problems with shot to shot variation in the plasma morphology due to the friable substrates and showed differences between plasmas formed on the two targets.


The 6th Mode Of Transportation, Robert O. Walton Jan 2014

The 6th Mode Of Transportation, Robert O. Walton

Publications

The five modes of freight transportation are normally characterized as motor carriers, railroads, airlines, water carriers, and pipelines. This paper will attempt to position the Internet as the sixth mode of transportation. This paper compares the strengths and weaknesses of the traditional five modes of transportation against the proposed 6th mode of the Internet. Without including the Internet as a mode of transportation, and tracking the economic value that it adds to the economy, the economic impact of the Internet as a mode is not considered. The recommendation of this study is that the Internet should be added to the …


Robust And Adaptive Nonlinear Control Of Limit Cycle Oscillations In Uavs Using Synthetic Jet Actuators, Natalie Ramos Pedroza Jan 2014

Robust And Adaptive Nonlinear Control Of Limit Cycle Oscillations In Uavs Using Synthetic Jet Actuators, Natalie Ramos Pedroza

Doctoral Dissertations and Master's Theses

Limit cycle oscillations (LCO), also known as utter, cause significant challenges in fight control of unmanned aerial vehicles (UAVs), and could potentially lead to structural damage and catastrophic failures. LCO can be described as vibrational motions in the pitching and plunging displacements of an aircraft wing. Even in low Reynolds number (low-Re) fight regimes, LCO can exceed the limiting boundary for safe UAV fight. Further, as practical considerations motivate the design of smaller, lighter weight UAVs, there is a growing need for UAV systems that do not require heavy mechanical actuators (e.g., ailerons). To address this, the use of synthetic …


Design And Development Of Scalable Solar Powered Water Purification Systems For Developing Nations, Shavin Pinto Jan 2014

Design And Development Of Scalable Solar Powered Water Purification Systems For Developing Nations, Shavin Pinto

Doctoral Dissertations and Master's Theses

This thesis presents the design and development of solar powered water purification systems. The systems were designed to meet specific customer requirements that were established from the experiences gained after the installation of five water purification systems in various Haitian communities. The systems are scalable and are able to supply 10,000-20,000 gallons of clean drinking water per day. The design consists of a three-stage filtration system with a disc-type sediment filter, a 0.1 micron ultrafiltration membrane, and an ultraviolet light for disinfection. The backwash cycle extends the life of the ultrafiltration membrane to 4-7 years before a new filter is …