Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Computer Sciences (199)
- Engineering (198)
- Social and Behavioral Sciences (193)
- Forensic Science and Technology (187)
- Information Security (187)
-
- Legal Studies (187)
- Law (184)
- Computer Law (182)
- Computer Engineering (105)
- Electrical and Computer Engineering (100)
- Aviation (77)
- OS and Networks (77)
- Other Computer Sciences (77)
- Defense and Security Studies (75)
- National Security Law (75)
- Public Affairs, Public Policy and Public Administration (75)
- Social Control, Law, Crime, and Deviance (75)
- Sociology (75)
- Aviation Safety and Security (74)
- Oceanography and Atmospheric Sciences and Meteorology (10)
- Applied Mathematics (9)
- Data Science (9)
- Aerospace Engineering (7)
- Astrophysics and Astronomy (7)
- Atmospheric Sciences (5)
- Environmental Sciences (5)
- Meteorology (5)
- Sustainability (5)
- Artificial Intelligence and Robotics (4)
- Keyword
-
- Aviation (2)
- Accident prevention (1)
- Accountability (1)
- Analysis (1)
- Analytical data architecture (1)
-
- Atmospheric Reentry (1)
- Aviation Education (1)
- Aviation Mental Health (1)
- Aviation Outreach (1)
- Aviation STEM (1)
- Aviation Safety (1)
- Aviation Security (1)
- Aviation security (1)
- BiLSTM (1)
- Catapult Launch (1)
- Classroom (1)
- Clutter (1)
- Community of practice (1)
- Corporate culture (1)
- Cybersecurity (1)
- Deep learning (1)
- Desalination (1)
- Efficiency (1)
- Energy management (1)
- Fleet management (1)
- Flight data (1)
- Flight delay (1)
- Fuel conservation (1)
- GIS (1)
- Gestalt (1)
- Publication Year
- Publication
- File Type
Articles 31 - 60 of 235
Full-Text Articles in Physical Sciences and Mathematics
Reverse Osmosis; Addressing Freshwater Shortage With Sustainable Desalination, Jessica Savage
Reverse Osmosis; Addressing Freshwater Shortage With Sustainable Desalination, Jessica Savage
Sustainability Conference
Water security is an imperative part of high-functioning societies. Currently, large populations of the globe live in water-impoverished or water-stressed areas. With climate change and growing global populations, projections show more people being impacted by issues of water shortage.
One solution to water security is the implementation of desalination, specifically with reverse osmosis systems. This presentation walks through the history, capabilities, future work, and explanations on how reverse osmosis systems work. With continued research on improving desalination, communities in both developed and developing nations around the world can work towards total water security.
Recovering From Industrial Overshoot: Thermal Removal Of Atmospheric Co2, Ted Von Hippel, Sandra Boetcher, Matthew Traum, Farshid Azadian Ph.D., William Mackunis
Recovering From Industrial Overshoot: Thermal Removal Of Atmospheric Co2, Ted Von Hippel, Sandra Boetcher, Matthew Traum, Farshid Azadian Ph.D., William Mackunis
Sustainability Conference
Humanity will soon overshoot a safe level of atmospheric CO2, if it hasn't done so already. Countries, industries, and the global economy need to dramatically and quickly alter their behavior and technology to avoid this dangerous overshoot, yet this appears unlikely. Direct Air Capture of CO2 represents an insurance policy for society - a way of removing excess atmospheric CO2. I will present an approach to this problem based on thermal physics that cools cubic kilometers of air to extract CO2 as it sublimates. I propose a combination of an efficient heat exchanger, radiative cooling, and refrigeration, all at industrial …
Forensic Analysis Of Spy Applications In Android Devices, Shinelle Hutchinson, Umit Karabiyik
Forensic Analysis Of Spy Applications In Android Devices, Shinelle Hutchinson, Umit Karabiyik
Annual ADFSL Conference on Digital Forensics, Security and Law
Smartphones with Google's Android operating system are becoming more and more popular each year, and with this increased user base, comes increased opportunities to collect more of these users' private data. There have been several instances of malware being made available via the Google Play Store, which is one of the predominant means for users to download applications. One effective way of collecting users' private data is by using Android Spyware. In this paper, we conduct a forensic analysis of a malicious Android spyware application and present our findings. We also highlight what information the application accesses and what it …
Astria Ontology: Open, Standards-Based, Data-Aggregated Representation Of Space Objects, Jennie Wolfgang, Kathleen Krysher, Michael Slovenski, Unmil P. Karadkar, Shiva Iyer, Moriba K. Jah
Astria Ontology: Open, Standards-Based, Data-Aggregated Representation Of Space Objects, Jennie Wolfgang, Kathleen Krysher, Michael Slovenski, Unmil P. Karadkar, Shiva Iyer, Moriba K. Jah
Space Traffic Management Conference
The necessity for standards-based ontologies for long-term sustainability of space operations and safety of increasing space flights has been well-established [6, 7]. Current ontologies, such as DARPA’s OrbitOutlook [5], are not publicly available, complicating efforts for their broad adoption. Most sensor data is siloed in proprietary databases [2] and provided only to authorized users, further complicating efforts to create a holistic view of resident space objects (RSOs) in order to enhance space situational awareness (SSA).
The ASTRIA project is developing an open data model with the goal of aggregating data about RSOs, parts, space weather, and governing policies in order …
Nanosat Tracking And Identification Techniques And Technologies, Mark A. Skinner
Nanosat Tracking And Identification Techniques And Technologies, Mark A. Skinner
Space Traffic Management Conference
Nanosats (and CubeSats, ‘Smallsats’, etc.) are of order 10 cm in size, and are at or near the limits of what can be tracked and characterized, using existing space surveillance assets. Additionally, given the CubeSat form-factor, they are often launched in large numbers (scores), and can be virtually identical. Thus are they difficult to track and to identify.
We have identified a number of technologies that future nanosat missions could employ that would enhance the trackability and/or identification of their satellites when on-orbit. Some of these technologies require active illumination of the satellite with electromagnetic energy, either in the radio …
Expected And Achievable Accuracy In Estimating Parameters Of Standing Accretion Shock Instability (Sasi) Fluctuations From Neutrinos And Gravitational Wave Oscillations, Colter Richardson, Jonathan Westhouse
Expected And Achievable Accuracy In Estimating Parameters Of Standing Accretion Shock Instability (Sasi) Fluctuations From Neutrinos And Gravitational Wave Oscillations, Colter Richardson, Jonathan Westhouse
Undergraduate Research Symposium - Prescott
Core collapse supernovae are one of the most interesting sources of gravitational waves. When the progenitor star is particularly massive, hydrodynamic instability called standing accretion shock instability can develop and it is characterized by deterministic oscillations in the gravitational wave signal as well as in the neutrino luminosity with frequencies of 100hz. In this talk we will review current efforts to extract physical information from the SASI components of the gravitational wave and enhance the detectability of gravitational waves with such components both using laser interferometers and neutrino detectors.
Modeling And Detectability Of Gravitational Wave Waveform Memory From Core Collapse Supernovae, Pedro Jesus Quinonez, Emily Grimes
Modeling And Detectability Of Gravitational Wave Waveform Memory From Core Collapse Supernovae, Pedro Jesus Quinonez, Emily Grimes
Undergraduate Research Symposium - Prescott
Ever since the discovery of gravitational waves by LIGO, studying these waves have become of utmost importance. This is because gravitational waves have the potential to carry information that have remain unseen by physicist in the past. For example, take the case of a core collapse supernovae. Any information transferred through electromagnetic waves that attempts to escape the inner core of a dying star is blocked out by the intense radiation of its outer shell. For this reason, astronomers have been unable to truly study what goes in the core. However, this is not the case for gravitational waves, which …
Research In Optics For Gravitational Wave Detection, Britney Biltz, Noura Ibrahim, Brennan Moore
Research In Optics For Gravitational Wave Detection, Britney Biltz, Noura Ibrahim, Brennan Moore
Undergraduate Research Symposium - Prescott
B.Biltz uses a horizontal “Zollner style” pendulum to monitor changes in the local gravitational field. The pendulum is attracted to the moon and the Sun and so, as the Earth turns, the pendulum’s equilibrium point shifts within a 24-hour period. This is an experiment designed to test the limits of such a pendulum. This sort of system may be useful as a method of monitoring and correcting for gravity gradient noise in future gravitational wave detectors.
N.Ibrahim characterizes thermo-optic noise in high-performance mirror coatings of the type used in Advanced LIGO. To characterize thermo-optic noise, she measures the change in …
Discrete Information Object Analysis Of Primary Flight Display Clutter, Kenneth Ward
Discrete Information Object Analysis Of Primary Flight Display Clutter, Kenneth Ward
National Training Aircraft Symposium (NTAS)
Modern aircraft utilize digital display screens to provide critical flight and system status information to pilots. As computing power has increased, the number of data sources and information presented has also increased, with the goal of increasing situational awareness. However, the display can become cluttered with extraneous or irrelevant information, to the detriment of pilot cognitive workload. Pilot perceptions of clutter vary with flight experience, introducing unique considerations in the flight training environment, given the experience difference between instructors and students. Researchers have studied the problem, identifying both the number of visual objects and information density as predictors of perception …
Suas: Cybersecurity Threats, Vulnerabilities, And Exploits, Philip Craiger, Gary Kessler, William Rose
Suas: Cybersecurity Threats, Vulnerabilities, And Exploits, Philip Craiger, Gary Kessler, William Rose
National Training Aircraft Symposium (NTAS)
The FAA predicts that purchases of hobbyist small unmanned aerial systems (sUAS) will grow from 1.9 million in 2016 to 4.3 million by 2020, and commercial sUAS to increase from 600,000 in 2016 to 2.7 million by 2020. sUAS, often referred to as 'drones,' are comprised of aeronautical hardware, a CPU, RAM, onboard storage, radio frequency communications, sensors, a camera, and a controller used by the pilot-in-command (PIC). Some have argued that a sUAS is essentially a flying computer. As such, sUAS are sometimes susceptible to many of the types of attacks that are often used on PC-based computers attached …
Contents, Adfsl
Contents, Adfsl
Annual ADFSL Conference on Digital Forensics, Security and Law
No abstract provided.
Front Matter, Adfsl
Front Matter, Adfsl
Annual ADFSL Conference on Digital Forensics, Security and Law
No abstract provided.
A Survey Of Lawyers’ Cyber Security Practises In Western Australia, Craig Valli, Mike Johnstone, Rochelle Fleming
A Survey Of Lawyers’ Cyber Security Practises In Western Australia, Craig Valli, Mike Johnstone, Rochelle Fleming
Annual ADFSL Conference on Digital Forensics, Security and Law
This paper reports on the results of a survey that is the initial phase of an action research project being conducted with the Law Society of Western Australia. The online survey forms a baseline for the expression of a targeted training regime aimed at improving the cyber security awareness and posture of the membership of the Society. The full complement of over 3000 members were given the opportunity to participate in the survey, with 122 members responding in this initial round. The survey was designed to elicit responses about information technology use and the awareness of good practices with respect …
Analysis Of Data Erasure Capability On Sshd Drives For Data Recovery, Andrew Blyth
Analysis Of Data Erasure Capability On Sshd Drives For Data Recovery, Andrew Blyth
Annual ADFSL Conference on Digital Forensics, Security and Law
Data Protection and Computer Forensics/Anti-Forensics has now become a critical area of concern for organizations. A key element to this is how data is sanitized at end of life. In this paper we explore Hybrid Solid State Hybrid Drives (SSHD) and the impact that various Computer Forensics and Data Recovery techniques have when performing data erasure upon a SSHD.
Knowledge Expiration In Security Awareness Training, Tianjian Zhang
Knowledge Expiration In Security Awareness Training, Tianjian Zhang
Annual ADFSL Conference on Digital Forensics, Security and Law
No abstract provided.
Positive Identification Of Lsb Image Steganography Using Cover Image Comparisons, Michael Pelosi, Nimesh Poudel, Pratap Lamichhane, Devon Lam, Gary Kessler, Joshua Macmonagle
Positive Identification Of Lsb Image Steganography Using Cover Image Comparisons, Michael Pelosi, Nimesh Poudel, Pratap Lamichhane, Devon Lam, Gary Kessler, Joshua Macmonagle
Annual ADFSL Conference on Digital Forensics, Security and Law
In this paper we introduce a new software concept specifically designed to allow the digital forensics professional to clearly identify and attribute instances of LSB image steganography by using the original cover image in side-by-side comparison with a suspected steganographic payload image. The “CounterSteg” software allows detailed analysis and comparison of both the original cover image and any modified image, using sophisticated bit- and color-channel visual depiction graphics. In certain cases, the steganographic software used for message transmission can be identified by the forensic analysis of LSB and other changes in the payload image. The paper demonstrates usage and typical …
Exploring The Use Of Graph Databases To Catalog Artifacts For Client Forensics, Rose Shumba
Exploring The Use Of Graph Databases To Catalog Artifacts For Client Forensics, Rose Shumba
Annual ADFSL Conference on Digital Forensics, Security and Law
Cloud computing has revolutionized the methods by which digital data is stored, processed, and transmitted. It is providing users with data storage and processing services, enabling access to resources through multiple devices. Although organizations continue to embrace the advantages of flexibility and scalability offered by cloud computing, insider threats are becoming a serious concern as cited by security researchers. Insiders can use authorized access to steal sensitive information, calling for the need for an investigation. This concept paper describes research in progress towards developing a Neo4j graph database tool to enhance client forensics. The tool, with a Python interface, allows …
Df 2.0: Designing An Automated, Privacy Preserving, And Efficient Digital Forensic Framework, Robin Verma, Jayaprakash Govindaraj, Gaurav Gupta
Df 2.0: Designing An Automated, Privacy Preserving, And Efficient Digital Forensic Framework, Robin Verma, Jayaprakash Govindaraj, Gaurav Gupta
Annual ADFSL Conference on Digital Forensics, Security and Law
The current state of digital forensic investigation is continuously challenged by the rapid technological changes, the increase in the use of digital devices (both the heterogeneity and the count), and the sheer volume of data that these devices could contain. Although it is not directly related to the performance of Digital Forensic Investigation process, preventing data privacy violations during the process is also a big challenge. The investigator gets full access to the forensic image including suspect's private data which may be sensitive at times as well as entirely unrelated to the given case under investigation. With a notion that …
Precognition: Automated Digital Forensic Readiness System For Mobile Computing Devices In Enterprises, Jayaprakash Govindaraj, Robin Verma, Gaurav Gupta
Precognition: Automated Digital Forensic Readiness System For Mobile Computing Devices In Enterprises, Jayaprakash Govindaraj, Robin Verma, Gaurav Gupta
Annual ADFSL Conference on Digital Forensics, Security and Law
Enterprises are facing an unprecedented risk of security incidents due to the influx of emerging technologies, like smartphones and wearables. Most of the current Mobile security systems are not maturing in pace with technological advances. They lack the ability to learn and adapt from the past knowledge base. In the case of a security incident, enterprises find themselves underprepared for the lack of evidence and data. The systems are not designed to be forensic ready. There is a need for automated security analysis and forensically ready solution, which can learn and continuously adapt to new challenges, improve efficiency and productivity …
Non-Use Of A Mobile Phone During Conducting Crime Can Also Be Evidential, Vinod Polpaya Bhattathiripad Ph D
Non-Use Of A Mobile Phone During Conducting Crime Can Also Be Evidential, Vinod Polpaya Bhattathiripad Ph D
Annual ADFSL Conference on Digital Forensics, Security and Law
Cyber-clever criminals who are aware of the consequence of using mobile phones during conducting crimes often stay away from their phones while involved in crimes. Some of them even change their handset and SIM card, subsequently. This article looks into how, intentional disassociation (and even unintentional non-use) of mobile phone in (non-cyber) crimes, can become evidential clues of the perpetrators’ involvement in criminal acts. With the help of a recent judicial episode, this article reveals how extremely careful and masterful handling of extensive and voluminous Call Details Records and tower dumps by a cyber-savvy investigating official can unearth evidential clues …
Forensic Analysis Of The Exfat Artifacts, Yves Vandermeer, An Lekhac, Tahar Kechadi, Joe Carthy
Forensic Analysis Of The Exfat Artifacts, Yves Vandermeer, An Lekhac, Tahar Kechadi, Joe Carthy
Annual ADFSL Conference on Digital Forensics, Security and Law
Although keeping some basic concepts inherited from FAT32, the exFAT file system introduces many differences, such as the new mapping scheme of directory entries. The combination of exFAT mapping scheme with the allocation of bitmap files and the use of FAT leads to new forensic possibilities. The recovery of deleted files, including fragmented ones and carving becomes more accurate compared with former forensic processes. Nowadays, the accurate and sound forensic analysis is more than ever needed, as there is a high risk of erroneous interpretation. Indeed, most of the related work in the literature on exFAT structure and forensics, is …
Live Gpu Forensics: The Process Of Recovering Video Frames From Nvidia Gpu, Yazeed M. Albabtain, Baijian Yang
Live Gpu Forensics: The Process Of Recovering Video Frames From Nvidia Gpu, Yazeed M. Albabtain, Baijian Yang
Annual ADFSL Conference on Digital Forensics, Security and Law
The purpose of this research is to apply a graphics processing unit (GPU) forensics method to recover video artifacts from NVIDIA GPU. The tested video specs are 512 x 512 in resolution for video 1 and 800 x 600 in resolution for video 2. Both videos are mpeg4 video codec. A VLC player was used in the experiment. A special program has been developed using OpenCL to recover 1) patterns that are frames consist of pixel values and 2) dump data from the GPU global memory. The dump data that represent the video frame were located using simple steps. The …
Unmanned Aerial Vehicle Forensic Investigation Process: Dji Phantom 3 Drone As A Case Study, Alan Roder, Kim-Kwang Raymond Choo, Nhien-A Le-Khac
Unmanned Aerial Vehicle Forensic Investigation Process: Dji Phantom 3 Drone As A Case Study, Alan Roder, Kim-Kwang Raymond Choo, Nhien-A Le-Khac
Annual ADFSL Conference on Digital Forensics, Security and Law
Drones (also known as Unmanned Aerial Vehicles – UAVs) are a potential source of evidence in a digital investigation, partly due to their increasing popularity in our society. However, existing UAV/drone forensics generally rely on conventional digital forensic investigation guidelines such as those of ACPO and NIST, which may not be entirely fit-for-purpose. In this paper, we identify the challenges associated with UAV/drone forensics. We then explore and evaluate existing forensic guidelines, in terms of their effectiveness for UAV/drone forensic investigations. Next, we present our set of guidelines for UAV/drone investigations. Finally, we demonstrate how the proposed guidelines can be …
Detection And Recovery Of Anti-Forensic (Vault) Applications On Android Devices, Michaila Duncan, Umit Karabiyik
Detection And Recovery Of Anti-Forensic (Vault) Applications On Android Devices, Michaila Duncan, Umit Karabiyik
Annual ADFSL Conference on Digital Forensics, Security and Law
Significant number of mobile device users currently employ anti-forensics applications, also known as vault or locker applications, on their mobile devices in order to hide files such as photos. Because of this, investigators are required to spend a large portion of their time manually looking at the applications installed on the device. Currently, there is no automated method of detecting these anti-forensics applications on an Android device. This work presents the creation and testing of a vault application detection system to be used on Android devices. The main goal of this work is twofold: (i) Detecting and reporting the presence …
Hypervisor-Based Active Data Protection For Integrity And Confidentiality Of Dynamically Allocated Memory In Windows Kernel, Igor Korkin
Annual ADFSL Conference on Digital Forensics, Security and Law
One of the main issues in the OS security is providing trusted code execution in an untrusted environment. During executing, kernel-mode drivers dynamically allocate memory to store and process their data: Windows core kernel structures, users’ private information, and sensitive data of third-party drivers. All this data can be tampered with by kernel-mode malware. Attacks on Windows-based computers can cause not just hiding a malware driver, process privilege escalation, and stealing private data but also failures of industrial CNC machines. Windows built-in security and existing approaches do not provide the integrity and confidentiality of the allocated memory of third-party drivers. …
Back Matter, Adfsl
Back Matter, Adfsl
Annual ADFSL Conference on Digital Forensics, Security and Law
No abstract provided.
Front Matter, Adfsl
Front Matter, Adfsl
Annual ADFSL Conference on Digital Forensics, Security and Law
No abstract provided.
Contents, Adfsl
Contents, Adfsl
Annual ADFSL Conference on Digital Forensics, Security and Law
No abstract provided.
Effects Of Graphical Weather Information Versus Textual Weather Information On Situation Awareness In Meteorology, Stefan Melendez M.S.A., Andrew Dattel Ph.D., Christopher Herbster Ph.D., Debbie Schaum M.A., Andrey Babin
Effects Of Graphical Weather Information Versus Textual Weather Information On Situation Awareness In Meteorology, Stefan Melendez M.S.A., Andrew Dattel Ph.D., Christopher Herbster Ph.D., Debbie Schaum M.A., Andrey Babin
National Training Aircraft Symposium (NTAS)
Prior to a flight, pilots gather meteorological information in order to assess the weather conditions pertaining to their flight and to make decisions based on it. This information can come in various formats, such as text and graphical weather information. Research has shown that people have varying learning preferences and that most people prefer visual learning to verbal learning (i.e., graphical over text). It is hypothesized that this difference in learning preference can affect the way pilots interpret and apply the information they obtain prior to their flight. The researcher hypothesizes that graphical weather information has a greater, more positive …
Case Study: A New Method For Investigating Crimes Against Children, Hallstein Asheim Hansen, Stig Andersen, Stefan Axelsson, Svein Hopland
Case Study: A New Method For Investigating Crimes Against Children, Hallstein Asheim Hansen, Stig Andersen, Stefan Axelsson, Svein Hopland
Annual ADFSL Conference on Digital Forensics, Security and Law
Investigations of crimes against children are often complex, both in terms of the varied and large amount of digital technology encountered and the offensive nature of the crimes. Such cases are numerous, large, and prioritised, requiring digital forensics competence. Earlier digital forensics was considered and treated as a typical forensic science like fingerprint analysis, performed in a laboratory isolated from the investigative team. This decoupled way of working has proved to be both inefficient and error prone.
At the Digital Forensic Unit of Oslo Police District we have developed a new way of working that addresses many of the problems …