Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Computer Sciences (62)
- Information Security (59)
- Computer Law (58)
- Law (58)
- Engineering (57)
-
- Social and Behavioral Sciences (47)
- Computer Engineering (46)
- Electrical and Computer Engineering (46)
- Forensic Science and Technology (46)
- Legal Studies (46)
- Oceanography and Atmospheric Sciences and Meteorology (16)
- Astrophysics and Astronomy (11)
- Atmospheric Sciences (7)
- Meteorology (6)
- Aerospace Engineering (4)
- Applied Mathematics (4)
- Aviation (4)
- Physics (4)
- Education (3)
- Mathematics (3)
- The Sun and the Solar System (3)
- Acoustics, Dynamics, and Controls (2)
- Chemistry (2)
- Climate (2)
- Curriculum and Instruction (2)
- Dynamic Systems (2)
- Educational Assessment, Evaluation, and Research (2)
- Electro-Mechanical Systems (2)
- Energy Systems (2)
- Keyword
-
- Digital forensics (4)
- Acoustic-gravity waves (3)
- Astronautics (3)
- Astronomy (3)
- Computer Forensics (3)
-
- Science (3)
- Technology (3)
- Activated carbon (2)
- Computer forensics (2)
- Curriculum (2)
- Digital evidence (2)
- Evidence (2)
- Exosphere (2)
- Meteorology (2)
- Microstructured solids (2)
- Synoptic climatology (2)
- White dwarfs (2)
- 2 day wave (1)
- ACPO (1)
- ACR (1)
- ADSL routers (1)
- Accidents (1)
- Acoustic and gravity waves (1)
- Admissibility (1)
- Adsorption (1)
- Aeronomy (1)
- Airglow (1)
- Airglow frontal events (1)
- Android (1)
- Anthraquinone Vat blue 4 (1)
- Publication
- Publication Type
Articles 31 - 60 of 104
Full-Text Articles in Physical Sciences and Mathematics
After Five Years Of E-Discovery Missteps: Sanctions Or Safe Harbor?, Milton Luoma, Vicki Luoma
After Five Years Of E-Discovery Missteps: Sanctions Or Safe Harbor?, Milton Luoma, Vicki Luoma
Annual ADFSL Conference on Digital Forensics, Security and Law
In 2003 the Zubulake case became the catalyst of change in the world of e-discovery. In that case Judge Shira Scheindlin of the United States District Court for the Southern District of New York set guidelines for e-discovery that served as the basis for amending the Federal Rules of Civil Procedure (FRCP) in December 2006. The amendments incorporated a number of concepts that were described by Judge Scheindlin in the Zubulake case. ( Zubulake v. UBS Warburg LLC, 2003) Since the Zubulake case and the FRCP amendments, numerous cases have interpreted these rules changes, but one of the main points …
A Case Study Of The Challenges Of Cyber Forensics Analysis Of Digital Evidence In A Child Pornography Trial, Richard Boddington
A Case Study Of The Challenges Of Cyber Forensics Analysis Of Digital Evidence In A Child Pornography Trial, Richard Boddington
Annual ADFSL Conference on Digital Forensics, Security and Law
Perfunctory case analysis, lack of evidence validation, and an inability or unwillingness to present understandable analysis reports adversely affect the outcome course of legal trials reliant on digital evidence. These issues have serious consequences for defendants facing heavy penalties or imprisonment yet expect their defence counsel to have clear understanding of the evidence. Poorly reasoned, validated and presented digital evidence can result in conviction of the innocent as well as acquittal of the guilty. A possession of child pornography Case Study highlights the issues that appear to plague case analysis and presentation of digital evidence relied on in these odious …
Facilitating Forensics In The Mobile Millennium Through Proactive Enterprise Security, Andrew R. Scholnick
Facilitating Forensics In The Mobile Millennium Through Proactive Enterprise Security, Andrew R. Scholnick
Annual ADFSL Conference on Digital Forensics, Security and Law
This work explores the impact of the emerging mobile communication device paradigm on the security-conscious enterprise, with regard to providing insights for proactive Information Assurance and facilitation of eventual Forensic analysis. Attention is given to technology evolution in the areas of best practices, attack vectors, software and hardware performance, access and activity monitoring, and architectural models.
Keywords: Forensics, enterprise security, mobile communication, best practices, attack vectors.
Multi-Parameter Sensitivity Analysis Of A Bayesian Network From A Digital Forensic Investigation, Richard E. Overill, Echo P. Zhang, Kam-Pui Chow
Multi-Parameter Sensitivity Analysis Of A Bayesian Network From A Digital Forensic Investigation, Richard E. Overill, Echo P. Zhang, Kam-Pui Chow
Annual ADFSL Conference on Digital Forensics, Security and Law
A multi-parameter sensitivity analysis of a Bayesian network (BN) used in the digital forensic investigation of the Yahoo! email case has been performed using the principle of ‘steepest gradient’ in the parameter space of the conditional probabilities. This procedure delivers a more reliable result for the dependence of the posterior probability of the BN on the values used to populate the conditional probability tables (CPTs) of the BN. As such, this work extends our previous studies using singleparameter sensitivity analyses of BNs, with the overall aim of more deeply understanding the indicative use of BNs within the digital forensic and …
Ipad2 Logical Acquisition: Automated Or Manual Examination?, Somaya Ali, Sumaya Alhosani, Farah Alzarooni, Ibrahim Baggili
Ipad2 Logical Acquisition: Automated Or Manual Examination?, Somaya Ali, Sumaya Alhosani, Farah Alzarooni, Ibrahim Baggili
Annual ADFSL Conference on Digital Forensics, Security and Law
Due to their usage increase worldwide, iPads are on the path of becoming key sources of digital evidence in criminal investigations. This research investigated the logical backup acquisition and examination of the iPad2 device using the Apple iTunes backup utility while manually examining the backup data (manual examination) and automatically parsing the backup data (Lantern software - automated examination). The results indicate that a manual examination of the logical backup structure from iTunes reveals more digital evidence, especially if installed application data is required for an investigation. However, the researchers note that if a quick triage is needed of an …
Cloud Forensics Investigation: Tracing Infringing Sharing Of Copyrighted Content In Cloud, Yi-Jun He, Echo P. Zhang, Lucas C.K. Hui, Siu Ming Yiu, K.P. Chow
Cloud Forensics Investigation: Tracing Infringing Sharing Of Copyrighted Content In Cloud, Yi-Jun He, Echo P. Zhang, Lucas C.K. Hui, Siu Ming Yiu, K.P. Chow
Annual ADFSL Conference on Digital Forensics, Security and Law
Cloud Computing is becoming a significant technology trend nowadays, but its abrupt rise also creates a brand new front for cybercrime investigation with various challenges. One of the challenges is to track down infringing sharing of copyrighted content in cloud. To solve this problem, we study a typical type of content sharing technologies in cloud computing, analyze the challenges that the new technologies bring to forensics, formalize a procedure to get digital evidences and obtain analytical results based on the evidences to track down illegal uploader. Furthermore, we propose a reasoning model based on the probability distribution in a Bayesian …
A Fuzzy Hashing Approach Based On Random Sequences And Hamming Distance, Frank Breitinger, Harald Baier
A Fuzzy Hashing Approach Based On Random Sequences And Hamming Distance, Frank Breitinger, Harald Baier
Annual ADFSL Conference on Digital Forensics, Security and Law
Hash functions are well-known methods in computer science to map arbitrary large input to bit strings of a fixed length that serve as unique input identifier/fingerprints. A key property of cryptographic hash functions is that even if only one bit of the input is changed the output behaves pseudo randomly and therefore similar files cannot be identified. However, in the area of computer forensics it is also necessary to find similar files (e.g. different versions of a file), wherefore we need a similarity preserving hash function also called fuzzy hash function. In this paper we present a new approach for …
The Xbox 360 And Steganography: How Criminals And Terrorists Could Be "Going Dark", Ashley Podhradsky, Rob D’Ovidio, Cindy Casey
The Xbox 360 And Steganography: How Criminals And Terrorists Could Be "Going Dark", Ashley Podhradsky, Rob D’Ovidio, Cindy Casey
Annual ADFSL Conference on Digital Forensics, Security and Law
Video game consoles have evolved from single-player embedded systems with rudimentary processing and graphics capabilities to multipurpose devices that provide users with parallel functionality to contemporary desktop and laptop computers. Besides offering video games with rich graphics and multiuser network play, today's gaming consoles give users the ability to communicate via email, video and text chat; transfer pictures, videos, and file;, and surf the World-Wide-Web. These communication capabilities have, unfortunately, been exploited by people to plan and commit a variety of criminal activities. In an attempt to cover the digital tracks of these unlawful undertakings, anti-forensic techniques, such as steganography, …
Toward Alignment Between Communities Of Practice And Knowledge-Based Decision Support, Jason Nichols, David Biros, Mark Weiser
Toward Alignment Between Communities Of Practice And Knowledge-Based Decision Support, Jason Nichols, David Biros, Mark Weiser
Annual ADFSL Conference on Digital Forensics, Security and Law
The National Repository of Digital Forensics Information (NRDFI) is a knowledge repository for law enforcement digital forensics investigators (LEDFI). Over six years, the NRDFI has undertaken significant design revisions in order to more closely align the architecture of the system with theory addressing motivation to share knowledge and communication within ego-centric groups and communities of practice. These revisions have been met with minimal change in usage patterns by LEDFI community members, calling into question the applicability of relevant theory when the domain for knowledge sharing activities expands beyond the confines of an individual organization to a community of practice. When …
Double-Compressed Jpeg Detection In A Steganalysis System, Jennifer L. Davidson, Pooja Parajape
Double-Compressed Jpeg Detection In A Steganalysis System, Jennifer L. Davidson, Pooja Parajape
Annual ADFSL Conference on Digital Forensics, Security and Law
The detection of hidden messages in JPEG images is a growing concern. Current detection of JPEG stego images must include detection of double compression: a JPEG image is double compressed if it has been compressed with one quality factor, uncompressed, and then re-compressed with a different quality factor. When detection of double compression is not included, erroneous detection rates are very high. The main contribution of this paper is to present an efficient double-compression detection algorithm that has relatively lower dimensionality of features and relatively lower computational time for the detection part, than current comparative classifiers. We use a model-based …
A Proposal For Incorporating Programming Blunder As Important Evidence In Abstraction-Filtration-Comparison Test, P. Vinod Bhattathiripad
A Proposal For Incorporating Programming Blunder As Important Evidence In Abstraction-Filtration-Comparison Test, P. Vinod Bhattathiripad
Annual ADFSL Conference on Digital Forensics, Security and Law
This paper investigates an unexplored concept in Cyber Forensics, namely, a Programming Blunder. Programming Blunder is identified as a variable or a code segment or a field in a database table, which is hardly used or executed in the context of the application or the user’s functionality. Blunder genes can be found in many parts of any program. It is the contention of this paper that this phenomenon of blunders needs to be studied systematically from its very genetic origins to their surface realizations in contrast to bugs and flaws, especially in view of their importance in software copyright infringement …
Update On The State Of The Science Of Digital Evidence Examination, Fred Cohen
Update On The State Of The Science Of Digital Evidence Examination, Fred Cohen
Annual ADFSL Conference on Digital Forensics, Security and Law
This paper updates previous work on the level of consensus in foundational elements of digital evidence examination. Significant consensus is found present only after definitions are made explicit, suggesting that, while there is a scientific agreement around some of the basic notions identified, the use of a common language is lacking.
Keywords: Digital forensics examination, terminology, scientific methodology, testability, validation, classification, scientific consensus
Gravity Wave Propagation In A Diffusively Separated Gas: Effects On The Total Gas, Michael P. Hickey Ph.D., R. L. Walterscheid
Gravity Wave Propagation In A Diffusively Separated Gas: Effects On The Total Gas, Michael P. Hickey Ph.D., R. L. Walterscheid
Publications
We present a full-wave model that simulates acoustic-gravity wave propagation in a binary-gas mixture of atomic oxygen and molecular nitrogen, including molecular viscosity and thermal conductivity appropriately partitioned between the two gases. Compositional effects include the collisional transfer of heat and momentum by mutual diffusion between the two gases. An important result of compositional effects is that the velocity and temperature summed over species can be significantly different from the results of one-gas models with the same height dependent mean molecular weight (M(z)). We compare the results of our binary-gas model to two one-gas full-wave models: one where M is …
Book Review: Astronomy At The Frontiers Of Science, T. D. Oswalt
Book Review: Astronomy At The Frontiers Of Science, T. D. Oswalt
Publications
This document is Dr. Oswalt’s review of Astronomy at the Frontiers of Science, edited by Jean-Pierre Lasota, Springer, 2011. 357p, 9789400716575 $179.00.
Asteroid Retrieval Feasibility Study, John Brophy, Fred Culick, Louis Friedman, Pedro Llanos, Et Al.
Asteroid Retrieval Feasibility Study, John Brophy, Fred Culick, Louis Friedman, Pedro Llanos, Et Al.
Publications
This report describes the results of a study sponsored by the Keck Institute for Space Studies (KISS) to investigate the feasibility of identifying, robotically capturing, and returning an entire Near-Earth Asteroid (NEA) to the vicinity of the Earth by the middle of the next decade. The KISS study was performed by people from Ames Research Center, Glenn Research Center, Goddard Space Flight Center, Jet Propulsion Laboratory, Johnson Space Center, Langley Research Center, the California Institute of Technology, Carnegie Mellon, Harvard University, the Naval Postgraduate School, University of California at Los Angeles, University of California at Santa Cruz, University of Southern …
Evaluating The Effect Of Smart Parking Technology On Campus Parking System Efficiency Using Discrete Event Simulation, Glenn Phillip Surpris
Evaluating The Effect Of Smart Parking Technology On Campus Parking System Efficiency Using Discrete Event Simulation, Glenn Phillip Surpris
Doctoral Dissertations and Master's Theses
This study was conducted to investigate the effect of smart parking systems (SPS) on parking search times (PST) in large parking lots. SPSs are systems that disseminate real-time parking spot availability to drivers searching for parking. The literature review revealed discrete event simulation (DES) to be a suitable tool for studying the dynamic behavior in parking lots. The parking lot selected for data collection was a university parking lot with 234 spaces. The data collected included arrival rates, departure rates, the geometric properties of the parking lot, preferred parking search strategies, and driving speeds. Arena 13.9, by Rockwell Automation, Inc, …
Synoptic-Scale Analysis Of Freezing Rain Events In Montreal, Quebec, Canada, Gina M. Ressler, Shawn M. Milrad, Eyad H. Atallah, John R. Gyakum
Synoptic-Scale Analysis Of Freezing Rain Events In Montreal, Quebec, Canada, Gina M. Ressler, Shawn M. Milrad, Eyad H. Atallah, John R. Gyakum
Publications
Freezing rain is a major environmental hazard that is especially common along the St. Lawrence River valley (SLRV) in southern Quebec, Canada. For large cities such as Montreal, severe events can have a devastating effect on people, property, and commerce. In this study, a composite analysis of 46 long-duration events for the period 1979–2008 is presented to identify key synoptic-scale structures and precursors of Montreal freezing rain events. Based on the observed structures of the 500-hPa heights, these events are manually partitioned into three types—west, central, and east—depending on the location and tilt of the 500-hPa trough axis. West events …
Table Of Contents
Journal of Digital Forensics, Security and Law
No abstract provided.
Observed And Modeled Solar Cycle Variation In Geocoronal Hydrogen Using Nrlmsise-00 Thermosphere Conditions And The Bishop Analytic Exosphere Model, S. M. Nossal, E. J. Mierkiewicz, F. L. Roesler
Observed And Modeled Solar Cycle Variation In Geocoronal Hydrogen Using Nrlmsise-00 Thermosphere Conditions And The Bishop Analytic Exosphere Model, S. M. Nossal, E. J. Mierkiewicz, F. L. Roesler
Publications
High precision observations during Solar Cycle 23 using the Wisconsin H‐alpha Mapper (WHAM) Fabry‐Perot quantify a factor of 1.5 ± 0.15 higher Balmer α column emission intensity during near‐solar‐maximum than during solar minimum conditions. An unresolved question is how does the observed solar cycle variation in the hydrogen column emission compare with that calculated from the hydrogen distribution in atmospheric models? We have compared WHAM solar minimum and near‐solar‐maximum column intensity observations with calculations using the thermospheric hydrogen density profile and background thermospheric conditions from the Mass Spectrometer Incoherent Scatter (NRLMSISE‐00) empirical model extended to exospheric altitudes using the analytic …
Synoptic-Scale Environments Conducive To Orographic Impacts On Cold-Season Surface Wind Regimes At Montreal, Quebec, Alissa Razy, Shawn M. Milrad, Eyad H, Atallah, John R. Gyakum
Synoptic-Scale Environments Conducive To Orographic Impacts On Cold-Season Surface Wind Regimes At Montreal, Quebec, Alissa Razy, Shawn M. Milrad, Eyad H, Atallah, John R. Gyakum
Publications
Orographic wind channeling, defined as dynamically and thermally induced processes that force wind to blow along the axis of a valley, is a common occurrence along the St. Lawrence River Valley (SLRV) in Quebec, Canada, and produces substantial observed weather impacts at stations along the valley, including Montreal (CYUL). Cold-season observed north-northeast (n = 55) and south-southeast (n = 16) surface wind events at CYUL are identified from 1979 to 2002. The authors partition the north-northeast wind events into four groups using manual synoptic typing. Types A and D (“inland cyclone” and “northwestern cyclone”) are associated with strong lower-tropospheric geostrophic …
Gravity-Wave-Induced Variations In Exothermic Heating In The Low-Latitude, Equinox Mesophere And Lower Thermosphere Region, Michael P. Hickey Ph.D., Tai-Yin Huang
Gravity-Wave-Induced Variations In Exothermic Heating In The Low-Latitude, Equinox Mesophere And Lower Thermosphere Region, Michael P. Hickey Ph.D., Tai-Yin Huang
Publications
We investigate gravity-wave-induced variations in exothermic heating in the OH nightglow region at a latitude of 18° in the Northern and Southern Hemispheres during March. An OH nightglow chemistry model with gravity wavefields from a spectral full-wave model is used for the investigation. Our simulation results show that the wave packet induces a large secular increase in the number densities of the minor species involved in the OH chemistry, a 50% increase in O3, 42% in O, and 29% in OH (v= 8), and the ultimate driver for these increases is the wave-driven downward transport of O. We find that …
Observational Constraints On The Degenerate Mass-Radius Relation, J. B. Holberg, Terry D. Oswalt, M. A. Barstow
Observational Constraints On The Degenerate Mass-Radius Relation, J. B. Holberg, Terry D. Oswalt, M. A. Barstow
Publications
The white dwarf mass–radius relationship is fundamental to modern astrophysics. It is central to routine estimation of DA white dwarf masses derived from spectroscopic temperatures and gravities. It is also the basis for observational determinations of the white dwarf initial–final-mass relation. Nevertheless, definitive and detailed observational confirmations of the mass–radius relation (MRR) remain elusive owing to a lack of sufficiently accurate white dwarf masses and radii. Current best estimates of masses and radii allow only broad conclusions about the expected inverse relation between masses and radii in degenerate stars. In this paper, we examine a restricted set of 12 DA …
On The Stability Of A Microstructure Model, Mihhail Berezovski, Arkadi Berezovski
On The Stability Of A Microstructure Model, Mihhail Berezovski, Arkadi Berezovski
Publications
Abstract
The asymptotic stability of solutions of the Mindlin-type microstructure model for solids is analyzed in the paper. It is shown that short waves are asymptotically stable even in the case of a weakly non-convex free energy dependence on microdeformation.
Research highlights
The Mindlin-type microstructure model cannot describe properly short wave propagation in laminates. A modified Mindlin-type microstructure model with weakly non-convex free energy resolves this discrepancy. It is shown that the improved model with weakly non-convex free energy is asymptotically stable for short waves.
The Initial–Final Mass Relation Among White Dwarfs In Wide Binaries, J. K. Zhao, T. D. Oswalt, L. A. Willson, Q. Wang, G. Zhao
The Initial–Final Mass Relation Among White Dwarfs In Wide Binaries, J. K. Zhao, T. D. Oswalt, L. A. Willson, Q. Wang, G. Zhao
Publications
We present the initial–final mass relation derived from 10 white dwarfs in wide binaries that consist of a main-sequence star and a white dwarf. The temperature and gravity of each white dwarf were measured by fitting theoretical model atmospheres to the observed spectrum using a χ2 fitting algorithm. The cooling time and mass were obtained using theoretical cooling tracks. The total age of each binary was estimated from the chromospheric activity of its main-sequence component to an uncertainty of about 0.17 dex in log t. The difference between the total age and white dwarf cooling time is taken …
3-D Mesoscale Mhd Simulations Of Magnetospheric Cusp-Like Configurations: Cusp Diamagnetic Cavities And Boundary Structure, E. Adamson, A. Otto, K. Nykyri
3-D Mesoscale Mhd Simulations Of Magnetospheric Cusp-Like Configurations: Cusp Diamagnetic Cavities And Boundary Structure, E. Adamson, A. Otto, K. Nykyri
Publications
We present results from mesoscale simulations of the magnetospheric cusp region for both strongly northward and strongly southward interplanetary magnetic field (IMF). Simulation results indicate an extended region of depressed magnetic field and strongly enhanced plasma B which exhibits a strong dependence on IMF orientation. These structures correspond to the Cusp Diamagnetic Cavities (CDC’s). The typical features of these CDC’s are generally well reproduced by the simulation. The inner boundaries between the CDC and the magnetosphere are gradual transitions which form a clear funnel shape, regardless of IMF orientation. The outer CDC/magnetosheath boundary exhibits a clear indentation in both the …
Revisiting 3d Stereo Satellite Image Displays, Frederick R. Mosher
Revisiting 3d Stereo Satellite Image Displays, Frederick R. Mosher
Applied Aviation Sciences - Daytona Beach
Over 30 years ago, there were a number of development efforts to display 3D stereo satellite images and associated weather. Dr. Fritz Hasler showed how the GOES-east and west satellites could be remapped to generate true stereo pairs for obtaining cloud heights and he also showed how artificial stereo images could be generated using derived IR cloud heights to generate parallax shifts for the visible or infrared images. While there was a flurry of interest in the 1980s, the techniques had largely fallen from routine usage until recently. However, technology advances in both satellites and display technology has allowed for …
Optimization Of Magnetic Powdered Activated Carbon For Aqueous Hg(Ii) Removal And Magnetic Recovery, Emily K. Faulconer, Natalia Hoogesteijn Von Reitzenstein, David W. Mazyck
Optimization Of Magnetic Powdered Activated Carbon For Aqueous Hg(Ii) Removal And Magnetic Recovery, Emily K. Faulconer, Natalia Hoogesteijn Von Reitzenstein, David W. Mazyck
Physical Sciences - Daytona Beach
Activated carbon is known to adsorb aqueous Hg(II). MPAC (magnetic powdered activated carbon) has the potential to remove aqueous Hg to less than 0.2 mg/L while being magnetically recoverable. Magnetic recapture allows simple sorbent separation from the waste stream while an isolated waste potentially allows for mercury recycling. MPAC Hg-removal performance is verified by mercury mass balance, calculated by quantifying adsorbed, volatilized, and residual aqueous mercury. The batch reactor contained a sealed mercury-carbon contact chamber with mixing and constant N2(g) headspace flow to an oxidizingtrap. Mercury adsorption was performed using spiked ultrapure water (100 mg/L Hg). Mercury concentrations …
The Allen Telescope Array Search For Electrostatic Discharges On Mars, Marin M. Anderson, Andrew P.V. Siemion, William C. Barott, Geoffery C. Bower, Gregory T. Delory, Imke De Pater, Dan Werthimer
The Allen Telescope Array Search For Electrostatic Discharges On Mars, Marin M. Anderson, Andrew P.V. Siemion, William C. Barott, Geoffery C. Bower, Gregory T. Delory, Imke De Pater, Dan Werthimer
Department of Electrical Engineering and Computer Science - Daytona Beach
The Allen Telescope Array was used to monitor Mars between 2010 March 9 and June 2, over a total of approximately 30 hr, for radio emission indicative of electrostatic discharge. The search was motivated by the report from Ruf et al. of the detection of non-thermal microwave radiation from Mars characterized by peaks in the power spectrum of the kurtosis, or kurtstrum, at 10 Hz, coinciding with a large dust storm event on 2006 June 8. For these observations, we developed a wideband signal processor at the Center for Astronomy Signal Processing and Electronics Research. This 1024 channel spectrometer calculates …