Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Embry-Riddle Aeronautical University

2012

Discipline
Keyword
Publication
Publication Type

Articles 31 - 60 of 104

Full-Text Articles in Physical Sciences and Mathematics

After Five Years Of E-Discovery Missteps: Sanctions Or Safe Harbor?, Milton Luoma, Vicki Luoma May 2012

After Five Years Of E-Discovery Missteps: Sanctions Or Safe Harbor?, Milton Luoma, Vicki Luoma

Annual ADFSL Conference on Digital Forensics, Security and Law

In 2003 the Zubulake case became the catalyst of change in the world of e-discovery. In that case Judge Shira Scheindlin of the United States District Court for the Southern District of New York set guidelines for e-discovery that served as the basis for amending the Federal Rules of Civil Procedure (FRCP) in December 2006. The amendments incorporated a number of concepts that were described by Judge Scheindlin in the Zubulake case. ( Zubulake v. UBS Warburg LLC, 2003) Since the Zubulake case and the FRCP amendments, numerous cases have interpreted these rules changes, but one of the main points …


A Case Study Of The Challenges Of Cyber Forensics Analysis Of Digital Evidence In A Child Pornography Trial, Richard Boddington May 2012

A Case Study Of The Challenges Of Cyber Forensics Analysis Of Digital Evidence In A Child Pornography Trial, Richard Boddington

Annual ADFSL Conference on Digital Forensics, Security and Law

Perfunctory case analysis, lack of evidence validation, and an inability or unwillingness to present understandable analysis reports adversely affect the outcome course of legal trials reliant on digital evidence. These issues have serious consequences for defendants facing heavy penalties or imprisonment yet expect their defence counsel to have clear understanding of the evidence. Poorly reasoned, validated and presented digital evidence can result in conviction of the innocent as well as acquittal of the guilty. A possession of child pornography Case Study highlights the issues that appear to plague case analysis and presentation of digital evidence relied on in these odious …


Facilitating Forensics In The Mobile Millennium Through Proactive Enterprise Security, Andrew R. Scholnick May 2012

Facilitating Forensics In The Mobile Millennium Through Proactive Enterprise Security, Andrew R. Scholnick

Annual ADFSL Conference on Digital Forensics, Security and Law

This work explores the impact of the emerging mobile communication device paradigm on the security-conscious enterprise, with regard to providing insights for proactive Information Assurance and facilitation of eventual Forensic analysis. Attention is given to technology evolution in the areas of best practices, attack vectors, software and hardware performance, access and activity monitoring, and architectural models.

Keywords: Forensics, enterprise security, mobile communication, best practices, attack vectors.


Multi-Parameter Sensitivity Analysis Of A Bayesian Network From A Digital Forensic Investigation, Richard E. Overill, Echo P. Zhang, Kam-Pui Chow May 2012

Multi-Parameter Sensitivity Analysis Of A Bayesian Network From A Digital Forensic Investigation, Richard E. Overill, Echo P. Zhang, Kam-Pui Chow

Annual ADFSL Conference on Digital Forensics, Security and Law

A multi-parameter sensitivity analysis of a Bayesian network (BN) used in the digital forensic investigation of the Yahoo! email case has been performed using the principle of ‘steepest gradient’ in the parameter space of the conditional probabilities. This procedure delivers a more reliable result for the dependence of the posterior probability of the BN on the values used to populate the conditional probability tables (CPTs) of the BN. As such, this work extends our previous studies using singleparameter sensitivity analyses of BNs, with the overall aim of more deeply understanding the indicative use of BNs within the digital forensic and …


Ipad2 Logical Acquisition: Automated Or Manual Examination?, Somaya Ali, Sumaya Alhosani, Farah Alzarooni, Ibrahim Baggili May 2012

Ipad2 Logical Acquisition: Automated Or Manual Examination?, Somaya Ali, Sumaya Alhosani, Farah Alzarooni, Ibrahim Baggili

Annual ADFSL Conference on Digital Forensics, Security and Law

Due to their usage increase worldwide, iPads are on the path of becoming key sources of digital evidence in criminal investigations. This research investigated the logical backup acquisition and examination of the iPad2 device using the Apple iTunes backup utility while manually examining the backup data (manual examination) and automatically parsing the backup data (Lantern software - automated examination). The results indicate that a manual examination of the logical backup structure from iTunes reveals more digital evidence, especially if installed application data is required for an investigation. However, the researchers note that if a quick triage is needed of an …


Cloud Forensics Investigation: Tracing Infringing Sharing Of Copyrighted Content In Cloud, Yi-Jun He, Echo P. Zhang, Lucas C.K. Hui, Siu Ming Yiu, K.P. Chow May 2012

Cloud Forensics Investigation: Tracing Infringing Sharing Of Copyrighted Content In Cloud, Yi-Jun He, Echo P. Zhang, Lucas C.K. Hui, Siu Ming Yiu, K.P. Chow

Annual ADFSL Conference on Digital Forensics, Security and Law

Cloud Computing is becoming a significant technology trend nowadays, but its abrupt rise also creates a brand new front for cybercrime investigation with various challenges. One of the challenges is to track down infringing sharing of copyrighted content in cloud. To solve this problem, we study a typical type of content sharing technologies in cloud computing, analyze the challenges that the new technologies bring to forensics, formalize a procedure to get digital evidences and obtain analytical results based on the evidences to track down illegal uploader. Furthermore, we propose a reasoning model based on the probability distribution in a Bayesian …


A Fuzzy Hashing Approach Based On Random Sequences And Hamming Distance, Frank Breitinger, Harald Baier May 2012

A Fuzzy Hashing Approach Based On Random Sequences And Hamming Distance, Frank Breitinger, Harald Baier

Annual ADFSL Conference on Digital Forensics, Security and Law

Hash functions are well-known methods in computer science to map arbitrary large input to bit strings of a fixed length that serve as unique input identifier/fingerprints. A key property of cryptographic hash functions is that even if only one bit of the input is changed the output behaves pseudo randomly and therefore similar files cannot be identified. However, in the area of computer forensics it is also necessary to find similar files (e.g. different versions of a file), wherefore we need a similarity preserving hash function also called fuzzy hash function. In this paper we present a new approach for …


The Xbox 360 And Steganography: How Criminals And Terrorists Could Be "Going Dark", Ashley Podhradsky, Rob D’Ovidio, Cindy Casey May 2012

The Xbox 360 And Steganography: How Criminals And Terrorists Could Be "Going Dark", Ashley Podhradsky, Rob D’Ovidio, Cindy Casey

Annual ADFSL Conference on Digital Forensics, Security and Law

Video game consoles have evolved from single-player embedded systems with rudimentary processing and graphics capabilities to multipurpose devices that provide users with parallel functionality to contemporary desktop and laptop computers. Besides offering video games with rich graphics and multiuser network play, today's gaming consoles give users the ability to communicate via email, video and text chat; transfer pictures, videos, and file;, and surf the World-Wide-Web. These communication capabilities have, unfortunately, been exploited by people to plan and commit a variety of criminal activities. In an attempt to cover the digital tracks of these unlawful undertakings, anti-forensic techniques, such as steganography, …


Toward Alignment Between Communities Of Practice And Knowledge-Based Decision Support, Jason Nichols, David Biros, Mark Weiser May 2012

Toward Alignment Between Communities Of Practice And Knowledge-Based Decision Support, Jason Nichols, David Biros, Mark Weiser

Annual ADFSL Conference on Digital Forensics, Security and Law

The National Repository of Digital Forensics Information (NRDFI) is a knowledge repository for law enforcement digital forensics investigators (LEDFI). Over six years, the NRDFI has undertaken significant design revisions in order to more closely align the architecture of the system with theory addressing motivation to share knowledge and communication within ego-centric groups and communities of practice. These revisions have been met with minimal change in usage patterns by LEDFI community members, calling into question the applicability of relevant theory when the domain for knowledge sharing activities expands beyond the confines of an individual organization to a community of practice. When …


Double-Compressed Jpeg Detection In A Steganalysis System, Jennifer L. Davidson, Pooja Parajape May 2012

Double-Compressed Jpeg Detection In A Steganalysis System, Jennifer L. Davidson, Pooja Parajape

Annual ADFSL Conference on Digital Forensics, Security and Law

The detection of hidden messages in JPEG images is a growing concern. Current detection of JPEG stego images must include detection of double compression: a JPEG image is double compressed if it has been compressed with one quality factor, uncompressed, and then re-compressed with a different quality factor. When detection of double compression is not included, erroneous detection rates are very high. The main contribution of this paper is to present an efficient double-compression detection algorithm that has relatively lower dimensionality of features and relatively lower computational time for the detection part, than current comparative classifiers. We use a model-based …


A Proposal For Incorporating Programming Blunder As Important Evidence In Abstraction-Filtration-Comparison Test, P. Vinod Bhattathiripad May 2012

A Proposal For Incorporating Programming Blunder As Important Evidence In Abstraction-Filtration-Comparison Test, P. Vinod Bhattathiripad

Annual ADFSL Conference on Digital Forensics, Security and Law

This paper investigates an unexplored concept in Cyber Forensics, namely, a Programming Blunder. Programming Blunder is identified as a variable or a code segment or a field in a database table, which is hardly used or executed in the context of the application or the user’s functionality. Blunder genes can be found in many parts of any program. It is the contention of this paper that this phenomenon of blunders needs to be studied systematically from its very genetic origins to their surface realizations in contrast to bugs and flaws, especially in view of their importance in software copyright infringement …


Update On The State Of The Science Of Digital Evidence Examination, Fred Cohen May 2012

Update On The State Of The Science Of Digital Evidence Examination, Fred Cohen

Annual ADFSL Conference on Digital Forensics, Security and Law

This paper updates previous work on the level of consensus in foundational elements of digital evidence examination. Significant consensus is found present only after definitions are made explicit, suggesting that, while there is a scientific agreement around some of the basic notions identified, the use of a common language is lacking.

Keywords: Digital forensics examination, terminology, scientific methodology, testability, validation, classification, scientific consensus


Gravity Wave Propagation In A Diffusively Separated Gas: Effects On The Total Gas, Michael P. Hickey Ph.D., R. L. Walterscheid May 2012

Gravity Wave Propagation In A Diffusively Separated Gas: Effects On The Total Gas, Michael P. Hickey Ph.D., R. L. Walterscheid

Publications

We present a full-wave model that simulates acoustic-gravity wave propagation in a binary-gas mixture of atomic oxygen and molecular nitrogen, including molecular viscosity and thermal conductivity appropriately partitioned between the two gases. Compositional effects include the collisional transfer of heat and momentum by mutual diffusion between the two gases. An important result of compositional effects is that the velocity and temperature summed over species can be significantly different from the results of one-gas models with the same height dependent mean molecular weight (M(z)). We compare the results of our binary-gas model to two one-gas full-wave models: one where M is …


Book Review: Astronomy At The Frontiers Of Science, T. D. Oswalt May 2012

Book Review: Astronomy At The Frontiers Of Science, T. D. Oswalt

Publications

This document is Dr. Oswalt’s review of Astronomy at the Frontiers of Science, edited by Jean-Pierre Lasota, Springer, 2011. 357p, 9789400716575 $179.00.


Asteroid Retrieval Feasibility Study, John Brophy, Fred Culick, Louis Friedman, Pedro Llanos, Et Al. Apr 2012

Asteroid Retrieval Feasibility Study, John Brophy, Fred Culick, Louis Friedman, Pedro Llanos, Et Al.

Publications

This report describes the results of a study sponsored by the Keck Institute for Space Studies (KISS) to investigate the feasibility of identifying, robotically capturing, and returning an entire Near-Earth Asteroid (NEA) to the vicinity of the Earth by the middle of the next decade. The KISS study was performed by people from Ames Research Center, Glenn Research Center, Goddard Space Flight Center, Jet Propulsion Laboratory, Johnson Space Center, Langley Research Center, the California Institute of Technology, Carnegie Mellon, Harvard University, the Naval Postgraduate School, University of California at Los Angeles, University of California at Santa Cruz, University of Southern …


Evaluating The Effect Of Smart Parking Technology On Campus Parking System Efficiency Using Discrete Event Simulation, Glenn Phillip Surpris Apr 2012

Evaluating The Effect Of Smart Parking Technology On Campus Parking System Efficiency Using Discrete Event Simulation, Glenn Phillip Surpris

Doctoral Dissertations and Master's Theses

This study was conducted to investigate the effect of smart parking systems (SPS) on parking search times (PST) in large parking lots. SPSs are systems that disseminate real-time parking spot availability to drivers searching for parking. The literature review revealed discrete event simulation (DES) to be a suitable tool for studying the dynamic behavior in parking lots. The parking lot selected for data collection was a university parking lot with 234 spaces. The data collected included arrival rates, departure rates, the geometric properties of the parking lot, preferred parking search strategies, and driving speeds. Arena 13.9, by Rockwell Automation, Inc, …


Synoptic-Scale Analysis Of Freezing Rain Events In Montreal, Quebec, Canada, Gina M. Ressler, Shawn M. Milrad, Eyad H. Atallah, John R. Gyakum Apr 2012

Synoptic-Scale Analysis Of Freezing Rain Events In Montreal, Quebec, Canada, Gina M. Ressler, Shawn M. Milrad, Eyad H. Atallah, John R. Gyakum

Publications

Freezing rain is a major environmental hazard that is especially common along the St. Lawrence River valley (SLRV) in southern Quebec, Canada. For large cities such as Montreal, severe events can have a devastating effect on people, property, and commerce. In this study, a composite analysis of 46 long-duration events for the period 1979–2008 is presented to identify key synoptic-scale structures and precursors of Montreal freezing rain events. Based on the observed structures of the 500-hPa heights, these events are manually partitioned into three types—west, central, and east—depending on the location and tilt of the 500-hPa trough axis. West events …


Front Matter Mar 2012

Front Matter

Journal of Digital Forensics, Security and Law

No abstract provided.


Table Of Contents Mar 2012

Table Of Contents

Journal of Digital Forensics, Security and Law

No abstract provided.


Masthead Mar 2012

Masthead

Journal of Digital Forensics, Security and Law

No abstract provided.


Observed And Modeled Solar Cycle Variation In Geocoronal Hydrogen Using Nrlmsise-00 Thermosphere Conditions And The Bishop Analytic Exosphere Model, S. M. Nossal, E. J. Mierkiewicz, F. L. Roesler Mar 2012

Observed And Modeled Solar Cycle Variation In Geocoronal Hydrogen Using Nrlmsise-00 Thermosphere Conditions And The Bishop Analytic Exosphere Model, S. M. Nossal, E. J. Mierkiewicz, F. L. Roesler

Publications

High precision observations during Solar Cycle 23 using the Wisconsin H‐alpha Mapper (WHAM) Fabry‐Perot quantify a factor of 1.5 ± 0.15 higher Balmer α column emission intensity during near‐solar‐maximum than during solar minimum conditions. An unresolved question is how does the observed solar cycle variation in the hydrogen column emission compare with that calculated from the hydrogen distribution in atmospheric models? We have compared WHAM solar minimum and near‐solar‐maximum column intensity observations with calculations using the thermospheric hydrogen density profile and background thermospheric conditions from the Mass Spectrometer Incoherent Scatter (NRLMSISE‐00) empirical model extended to exospheric altitudes using the analytic …


Synoptic-Scale Environments Conducive To Orographic Impacts On Cold-Season Surface Wind Regimes At Montreal, Quebec, Alissa Razy, Shawn M. Milrad, Eyad H, Atallah, John R. Gyakum Mar 2012

Synoptic-Scale Environments Conducive To Orographic Impacts On Cold-Season Surface Wind Regimes At Montreal, Quebec, Alissa Razy, Shawn M. Milrad, Eyad H, Atallah, John R. Gyakum

Publications

Orographic wind channeling, defined as dynamically and thermally induced processes that force wind to blow along the axis of a valley, is a common occurrence along the St. Lawrence River Valley (SLRV) in Quebec, Canada, and produces substantial observed weather impacts at stations along the valley, including Montreal (CYUL). Cold-season observed north-northeast (n = 55) and south-southeast (n = 16) surface wind events at CYUL are identified from 1979 to 2002. The authors partition the north-northeast wind events into four groups using manual synoptic typing. Types A and D (“inland cyclone” and “northwestern cyclone”) are associated with strong lower-tropospheric geostrophic …


Gravity-Wave-Induced Variations In Exothermic Heating In The Low-Latitude, Equinox Mesophere And Lower Thermosphere Region, Michael P. Hickey Ph.D., Tai-Yin Huang Feb 2012

Gravity-Wave-Induced Variations In Exothermic Heating In The Low-Latitude, Equinox Mesophere And Lower Thermosphere Region, Michael P. Hickey Ph.D., Tai-Yin Huang

Publications

We investigate gravity-wave-induced variations in exothermic heating in the OH nightglow region at a latitude of 18° in the Northern and Southern Hemispheres during March. An OH nightglow chemistry model with gravity wavefields from a spectral full-wave model is used for the investigation. Our simulation results show that the wave packet induces a large secular increase in the number densities of the minor species involved in the OH chemistry, a 50% increase in O3, 42% in O, and 29% in OH (v= 8), and the ultimate driver for these increases is the wave-driven downward transport of O. We find that …


Observational Constraints On The Degenerate Mass-Radius Relation, J. B. Holberg, Terry D. Oswalt, M. A. Barstow Feb 2012

Observational Constraints On The Degenerate Mass-Radius Relation, J. B. Holberg, Terry D. Oswalt, M. A. Barstow

Publications

The white dwarf mass–radius relationship is fundamental to modern astrophysics. It is central to routine estimation of DA white dwarf masses derived from spectroscopic temperatures and gravities. It is also the basis for observational determinations of the white dwarf initial–final-mass relation. Nevertheless, definitive and detailed observational confirmations of the mass–radius relation (MRR) remain elusive owing to a lack of sufficiently accurate white dwarf masses and radii. Current best estimates of masses and radii allow only broad conclusions about the expected inverse relation between masses and radii in degenerate stars. In this paper, we examine a restricted set of 12 DA …


On The Stability Of A Microstructure Model, Mihhail Berezovski, Arkadi Berezovski Feb 2012

On The Stability Of A Microstructure Model, Mihhail Berezovski, Arkadi Berezovski

Publications

Abstract

The asymptotic stability of solutions of the Mindlin-type microstructure model for solids is analyzed in the paper. It is shown that short waves are asymptotically stable even in the case of a weakly non-convex free energy dependence on microdeformation.

Research highlights

The Mindlin-type microstructure model cannot describe properly short wave propagation in laminates. A modified Mindlin-type microstructure model with weakly non-convex free energy resolves this discrepancy. It is shown that the improved model with weakly non-convex free energy is asymptotically stable for short waves.


The Initial–Final Mass Relation Among White Dwarfs In Wide Binaries, J. K. Zhao, T. D. Oswalt, L. A. Willson, Q. Wang, G. Zhao Feb 2012

The Initial–Final Mass Relation Among White Dwarfs In Wide Binaries, J. K. Zhao, T. D. Oswalt, L. A. Willson, Q. Wang, G. Zhao

Publications

We present the initial–final mass relation derived from 10 white dwarfs in wide binaries that consist of a main-sequence star and a white dwarf. The temperature and gravity of each white dwarf were measured by fitting theoretical model atmospheres to the observed spectrum using a χ2 fitting algorithm. The cooling time and mass were obtained using theoretical cooling tracks. The total age of each binary was estimated from the chromospheric activity of its main-sequence component to an uncertainty of about 0.17 dex in log t. The difference between the total age and white dwarf cooling time is taken …


3-D Mesoscale Mhd Simulations Of Magnetospheric Cusp-Like Configurations: Cusp Diamagnetic Cavities And Boundary Structure, E. Adamson, A. Otto, K. Nykyri Feb 2012

3-D Mesoscale Mhd Simulations Of Magnetospheric Cusp-Like Configurations: Cusp Diamagnetic Cavities And Boundary Structure, E. Adamson, A. Otto, K. Nykyri

Publications

We present results from mesoscale simulations of the magnetospheric cusp region for both strongly northward and strongly southward interplanetary magnetic field (IMF). Simulation results indicate an extended region of depressed magnetic field and strongly enhanced plasma B which exhibits a strong dependence on IMF orientation. These structures correspond to the Cusp Diamagnetic Cavities (CDC’s). The typical features of these CDC’s are generally well reproduced by the simulation. The inner boundaries between the CDC and the magnetosphere are gradual transitions which form a clear funnel shape, regardless of IMF orientation. The outer CDC/magnetosheath boundary exhibits a clear indentation in both the …


Revisiting 3d Stereo Satellite Image Displays, Frederick R. Mosher Jan 2012

Revisiting 3d Stereo Satellite Image Displays, Frederick R. Mosher

Applied Aviation Sciences - Daytona Beach

Over 30 years ago, there were a number of development efforts to display 3D stereo satellite images and associated weather. Dr. Fritz Hasler showed how the GOES-east and west satellites could be remapped to generate true stereo pairs for obtaining cloud heights and he also showed how artificial stereo images could be generated using derived IR cloud heights to generate parallax shifts for the visible or infrared images. While there was a flurry of interest in the 1980s, the techniques had largely fallen from routine usage until recently. However, technology advances in both satellites and display technology has allowed for …


Optimization Of Magnetic Powdered Activated Carbon For Aqueous Hg(Ii) Removal And Magnetic Recovery, Emily K. Faulconer, Natalia Hoogesteijn Von Reitzenstein, David W. Mazyck Jan 2012

Optimization Of Magnetic Powdered Activated Carbon For Aqueous Hg(Ii) Removal And Magnetic Recovery, Emily K. Faulconer, Natalia Hoogesteijn Von Reitzenstein, David W. Mazyck

Physical Sciences - Daytona Beach

Activated carbon is known to adsorb aqueous Hg(II). MPAC (magnetic powdered activated carbon) has the potential to remove aqueous Hg to less than 0.2 mg/L while being magnetically recoverable. Magnetic recapture allows simple sorbent separation from the waste stream while an isolated waste potentially allows for mercury recycling. MPAC Hg-removal performance is verified by mercury mass balance, calculated by quantifying adsorbed, volatilized, and residual aqueous mercury. The batch reactor contained a sealed mercury-carbon contact chamber with mixing and constant N2(g) headspace flow to an oxidizingtrap. Mercury adsorption was performed using spiked ultrapure water (100 mg/L Hg). Mercury concentrations …


The Allen Telescope Array Search For Electrostatic Discharges On Mars, Marin M. Anderson, Andrew P.V. Siemion, William C. Barott, Geoffery C. Bower, Gregory T. Delory, Imke De Pater, Dan Werthimer Jan 2012

The Allen Telescope Array Search For Electrostatic Discharges On Mars, Marin M. Anderson, Andrew P.V. Siemion, William C. Barott, Geoffery C. Bower, Gregory T. Delory, Imke De Pater, Dan Werthimer

Department of Electrical Engineering and Computer Science - Daytona Beach

The Allen Telescope Array was used to monitor Mars between 2010 March 9 and June 2, over a total of approximately 30 hr, for radio emission indicative of electrostatic discharge. The search was motivated by the report from Ruf et al. of the detection of non-thermal microwave radiation from Mars characterized by peaks in the power spectrum of the kurtosis, or kurtstrum, at 10 Hz, coinciding with a large dust storm event on 2006 June 8. For these observations, we developed a wideband signal processor at the Center for Astronomy Signal Processing and Electronics Research. This 1024 channel spectrometer calculates …