Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Digital forensics (8)
- Digital evidence (4)
- Forensics (4)
- Mobile device forensics (3)
- Approximate matching (2)
-
- Behavioral analysis (2)
- Biofuel (2)
- Bloom filter (2)
- Cloud forensics (2)
- Computer forensics (2)
- Cyber security (2)
- Energy (2)
- Microbes (2)
- Mrsh-v2 (2)
- Privacy (2)
- 3-D printing (1)
- AAtS (1)
- AFC (1)
- Abstraction-Filtration-Comparison (1)
- Admissibility (1)
- Airplane landing flare (1)
- Airplane stability and control (1)
- Algae (1)
- Altai (1)
- Amphibious vehicles (1)
- Anomaly detection (1)
- Authentication (1)
- Benzoic acid (1)
- Best practices for mobile device forensics. (1)
- Biomass (1)
- Publication
- Publication Type
Articles 61 - 71 of 71
Full-Text Articles in Physical Sciences and Mathematics
Forensics Of Software Copyright Infringement Crimes: The Modern Posar Test Juxtaposed With The Dated Afc Test, Vinod P. Bhattathiripad
Forensics Of Software Copyright Infringement Crimes: The Modern Posar Test Juxtaposed With The Dated Afc Test, Vinod P. Bhattathiripad
Journal of Digital Forensics, Security and Law
This paper presents a new development in the forensics of software copyright through a juxtaposed comparison between the proven AFC test and the recent POSAR test, the two forensic procedures for establishing software copyright infringement cases. First, the paper separately overviews the 3-stage, linear sequential AFC test and then the 5-phase, cyclic POSAR test (as AFC’s logical extension). The paper then compares the processes involved in each of the 5 phases of the POSAR test with the processes involved in the 3 stages in the AFC test, for the benefit of forensic practitioners and researchers. Finally, the paper discusses some …
Developing A Conceptual Framework For Modeling Deviant Cyber Flash Mob: A Socio-Computational Approach Leveraging Hypergraph Constructs, Samer Al-Khateeb, Nitin Agarwal
Developing A Conceptual Framework For Modeling Deviant Cyber Flash Mob: A Socio-Computational Approach Leveraging Hypergraph Constructs, Samer Al-Khateeb, Nitin Agarwal
Journal of Digital Forensics, Security and Law
In a Flash Mob (FM) a group of people get together in the physical world perform an unpredicted act and disperse quickly. Cyber Flash Mob (CFM) is the cyber manifestation of flash mob coordinated primarily using social media. Deviant Cyber Flash Mob (or, DCFM) is a special case of CFM, which is categorized as the new face of transnational crime organizations (TCOs). The DCFM phenomenon can be considered as a form of a cyber-collective action that is defined as an action aiming to improve group’s conditions (such as, status or power). In this paper, we conduct a conceptual analysis of …
Audit: Automated Disk Investigation Toolkit, Umit Karabiyik, Sudhir Aggarwal
Audit: Automated Disk Investigation Toolkit, Umit Karabiyik, Sudhir Aggarwal
Journal of Digital Forensics, Security and Law
Software tools designed for disk analysis play a critical role today in forensics investigations. However, these digital forensics tools are often difficult to use, usually task specific, and generally require professionally trained users with IT backgrounds. The relevant tools are also often open source requiring additional technical knowledge and proper configuration. This makes it difficult for investigators without some computer science background to easily conduct the needed disk analysis. In this paper, we present AUDIT, a novel automated disk investigation toolkit that supports investigations conducted by non-expert (in IT and disk technology) and expert investigators. Our proof of concept design …
A Study Of Forensic Imaging In The Absence Of Write-Blockers, Gary C. Kessler, Gregory H. Carlton
A Study Of Forensic Imaging In The Absence Of Write-Blockers, Gary C. Kessler, Gregory H. Carlton
Journal of Digital Forensics, Security and Law
Best practices in digital forensics demand the use of write-blockers when creating forensic images of digital media, and this has been a core tenet of computer forensics training for decades. The practice is so ingrained that the integrity of images created without a write-blocker are immediately suspect. This paper describes a research framework that compares forensic images acquired with and without utilizing write-blockers in order to understand the extent of the differences, if any, in the resultant forensic copies. We specifically address whether differences are superficial or evidentiary, and we discuss the impact of admitting evidence acquired without write blocking. …
Book Review: The X-Ways Forensics Practitioner's Guide, Linda Lau
Book Review: The X-Ways Forensics Practitioner's Guide, Linda Lau
Journal of Digital Forensics, Security and Law
Brett Shavers is a former law enforcement officer, a digital forensics examiner, an adjunct instructor, and a frequent speaker at many conferences. After writing his first book, titled Placing the Suspect Behind the Keyboard: Using Digital Forensics and Investigative Techniques to Identify Cybercrime Suspects, he co-wrote his 2nd book with Eric Zimmerman and Jimmy Weg, who is a knowledgeable technical editor. Both Brett and Eric are experts in cyber forensics, with many years of law enforcement experience at both the state and federal levels.
Book Review: Judiciary-Friendly Forensics Of Software Copyright Infringement (Vinod Polpaya Bhattathiripad), Pedro L. P. Sanchez
Book Review: Judiciary-Friendly Forensics Of Software Copyright Infringement (Vinod Polpaya Bhattathiripad), Pedro L. P. Sanchez
Journal of Digital Forensics, Security and Law
Judiciary-Friendly Forensics of Software Copyright Infringement is a book by Dr. Vinod Polpaya Bhattathiripad, published by IGI-Global as part of its Research Essentials series. The book discusses the forensics of software copyright infringement and highlights theoretical, functional, and procedural matters in the investigation of copyright infringement of software products, as well as the development of forensic technologies to detect and avoid software piracy. It is of interest to software forensic experts, lawyers in the field of copyright infringement, judges, software professionals, and students.
Standoff Methods For The Detection Of Threat Agents: A Review Of Several Promising Laser-Based Techniques, J. Bruce Johnson, Susan D. Allen, Jonathan Merten, Lewis Johnson, Daniel Pinkham, Scott W. Reeve
Standoff Methods For The Detection Of Threat Agents: A Review Of Several Promising Laser-Based Techniques, J. Bruce Johnson, Susan D. Allen, Jonathan Merten, Lewis Johnson, Daniel Pinkham, Scott W. Reeve
Publications
Detection of explosives, explosive precursors, or other threat agents presents a number of technological challenges for optical sensing methods. Certainly detecting trace levels of threat agents against a complex background is chief among these challenges; however, the related issues of multiple target distances (from standoff to proximity) and sampling time scales (from passive mines to rapid rate of march convoy protection) for different applications make it unlikely that a single technique will be ideal for all sensing situations. A number of methods for spanning the range of optical sensor technologies exist which, when integrated, could produce a fused sensor system …
Differential Spectral Imaging Of The Cn Violet Band In Laser-Induced Plasmas On Tnt Simulant Molecules, J. Merten, M. Jones, S. Hoke, S. Allen
Differential Spectral Imaging Of The Cn Violet Band In Laser-Induced Plasmas On Tnt Simulant Molecules, J. Merten, M. Jones, S. Hoke, S. Allen
Publications
Dual channel emission imaging of m-nitrobenzoic acid and benzoic acid was performed in order to visualize the morphology of the CN violet band emission of a TNT analogue. The CN channel was corrected for continuum emission using a simultaneously imaged background channel. Simultaneous dual channel imaging alleviated problems with shot to shot variation in the plasma morphology due to the friable substrates and showed differences between plasmas formed on the two targets.
The 6th Mode Of Transportation, Robert O. Walton
The 6th Mode Of Transportation, Robert O. Walton
Publications
The five modes of freight transportation are normally characterized as motor carriers, railroads, airlines, water carriers, and pipelines. This paper will attempt to position the Internet as the sixth mode of transportation. This paper compares the strengths and weaknesses of the traditional five modes of transportation against the proposed 6th mode of the Internet. Without including the Internet as a mode of transportation, and tracking the economic value that it adds to the economy, the economic impact of the Internet as a mode is not considered. The recommendation of this study is that the Internet should be added to the …
Robust And Adaptive Nonlinear Control Of Limit Cycle Oscillations In Uavs Using Synthetic Jet Actuators, Natalie Ramos Pedroza
Robust And Adaptive Nonlinear Control Of Limit Cycle Oscillations In Uavs Using Synthetic Jet Actuators, Natalie Ramos Pedroza
Doctoral Dissertations and Master's Theses
Limit cycle oscillations (LCO), also known as utter, cause significant challenges in fight control of unmanned aerial vehicles (UAVs), and could potentially lead to structural damage and catastrophic failures. LCO can be described as vibrational motions in the pitching and plunging displacements of an aircraft wing. Even in low Reynolds number (low-Re) fight regimes, LCO can exceed the limiting boundary for safe UAV fight. Further, as practical considerations motivate the design of smaller, lighter weight UAVs, there is a growing need for UAV systems that do not require heavy mechanical actuators (e.g., ailerons). To address this, the use of synthetic …
Design And Development Of Scalable Solar Powered Water Purification Systems For Developing Nations, Shavin Pinto
Design And Development Of Scalable Solar Powered Water Purification Systems For Developing Nations, Shavin Pinto
Doctoral Dissertations and Master's Theses
This thesis presents the design and development of solar powered water purification systems. The systems were designed to meet specific customer requirements that were established from the experiences gained after the installation of five water purification systems in various Haitian communities. The systems are scalable and are able to supply 10,000-20,000 gallons of clean drinking water per day. The design consists of a three-stage filtration system with a disc-type sediment filter, a 0.1 micron ultrafiltration membrane, and an ultraviolet light for disinfection. The backwash cycle extends the life of the ultrafiltration membrane to 4-7 years before a new filter is …