Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Singapore Management University (427)
- TÜBİTAK (372)
- Selected Works (147)
- University of Texas at El Paso (107)
- Purdue University (81)
-
- Embry-Riddle Aeronautical University (70)
- Governors State University (70)
- University for Business and Technology in Kosovo (69)
- Marquette University (52)
- Missouri University of Science and Technology (52)
- Kennesaw State University (49)
- Nova Southeastern University (47)
- Walden University (45)
- San Jose State University (40)
- University of Nebraska at Omaha (37)
- Western University (37)
- California Polytechnic State University, San Luis Obispo (36)
- Wright State University (36)
- Old Dominion University (34)
- University of South Florida (34)
- City University of New York (CUNY) (32)
- Dartmouth College (32)
- Brigham Young University (31)
- University of Nebraska - Lincoln (31)
- Edith Cowan University (30)
- University of Nevada, Las Vegas (26)
- Air Force Institute of Technology (25)
- Technological University Dublin (25)
- Zayed University (23)
- University of Dayton (22)
- Keyword
-
- Applied sciences (78)
- Machine learning (48)
- Security (48)
- Optimization (31)
- Privacy (29)
-
- Education (26)
- Android (24)
- Department of Computer Science and Engineering (23)
- Classification (21)
- Computer science (21)
- Deep learning (19)
- Clustering (18)
- Information technology (18)
- Machine Learning (18)
- Algorithms (17)
- Data mining (17)
- Visualization (17)
- Computer vision (16)
- Digital forensics (16)
- Twitter (16)
- Genetic algorithm (15)
- Information security (15)
- Artificial intelligence (14)
- Computer Science (14)
- Image processing (14)
- Information Technology (14)
- Particle swarm optimization (14)
- Simulation (14)
- Cloud computing (13)
- Feature extraction (13)
- Publication
-
- Research Collection School Of Computing and Information Systems (413)
- Turkish Journal of Electrical Engineering and Computer Sciences (372)
- Theses and Dissertations (146)
- Departmental Technical Reports (CS) (94)
- All Capstone Projects (70)
-
- Walden Dissertations and Doctoral Studies (45)
- Journal of Digital Forensics, Security and Law (43)
- Mathematics, Statistics and Computer Science Faculty Research and Publications (42)
- CCE Theses and Dissertations (41)
- Electronic Theses and Dissertations (39)
- Open Access Dissertations (36)
- Master's Projects (32)
- Doctoral Dissertations (31)
- KSU Proceedings on Cybersecurity Education, Research and Practice (30)
- Computer Science Faculty Publications (28)
- USF Tampa Graduate Theses and Dissertations (28)
- Open Access Theses (27)
- Electronic Thesis and Dissertation Repository (25)
- All Works (23)
- Browse all Theses and Dissertations (23)
- Annual ADFSL Conference on Digital Forensics, Security and Law (21)
- Computer Science Faculty Publications and Presentations (21)
- Davide Andrea Mauro (21)
- Faculty Publications (21)
- UNLV Theses, Dissertations, Professional Papers, and Capstones (21)
- UBT International Conference (20)
- Conference papers (18)
- Publications and Research (18)
- Computer Science: Faculty Publications and Other Works (17)
- Honors Theses (17)
- Publication Type
Articles 1 - 30 of 2818
Full-Text Articles in Physical Sciences and Mathematics
Bloom Filters Optimized Wu-Manber For Intrusion Detection, Monther Aldwairi, Koloud Al-Khamaiseh, Fatima Alharbi, Babar Shah
Bloom Filters Optimized Wu-Manber For Intrusion Detection, Monther Aldwairi, Koloud Al-Khamaiseh, Fatima Alharbi, Babar Shah
Journal of Digital Forensics, Security and Law
With increasing number and severity of attacks, monitoring ingress and egress network traffic is becoming essential everyday task. Intrusion detection systems are the main tools for capturing and searching network traffic for potential harm. Signature-based intrusion detection systems are the most widely used, and they simply use a pattern matching algorithms to locate attack signatures in intercepted network traffic. Pattern matching algorithms are very expensive in terms of running time and memory usage, leaving intrusion detection systems unable to detect attacks in real-time. We propose a Bloom filters optimized Wu-Manber pattern matching algorithm to speed up intrusion detection. The Bloom …
The Impact Of Md5 File Hash Collisions On Digital Forensic Imaging, Gary C. Kessler
The Impact Of Md5 File Hash Collisions On Digital Forensic Imaging, Gary C. Kessler
Journal of Digital Forensics, Security and Law
The Message Digest 5 (MD5) hash is commonly used as for integrity verification in the forensic imaging process. The ability to force MD5 hash collisions has been a reality for more than a decade, although there is a general consensus that hash collisions are of minimal impact to the practice of computer forensics. This paper describes an experiment to determine the results of imaging two disks that are identical except for one file, the two versions of which have different content but otherwise occupy the same byte positions on the disk, are the same size, and have the same hash …
Leveraging The Windows Amcache.Hve File In Forensic Investigations, Bhupendra Singh, Upasna Singh
Leveraging The Windows Amcache.Hve File In Forensic Investigations, Bhupendra Singh, Upasna Singh
Journal of Digital Forensics, Security and Law
The Amcache.hve is a registry hive file that is created by Microsoft® Windows® to store the information related to execution of programs. This paper highlights the evidential potential of Amcache.hve file and its application in the area of user activity analysis. The study uncovers numerous artifacts retained in Amcache.hve file when a user performs certain actions such as running host-based applications, installation of new applications, or running portable applications from external devices. The results of experiments demonstrate that Amcache.hve file stores intriguing artifacts related to applications such as timestamps of creation and last modification of any application; name, description, publisher …
The 2016 Analysis Of Information Remaining On Computer Hard Disks Offered For Sale On The Second Hand Market In The Uae, Thomas Martin, Andy Jones, Mohammed Alzaabi
The 2016 Analysis Of Information Remaining On Computer Hard Disks Offered For Sale On The Second Hand Market In The Uae, Thomas Martin, Andy Jones, Mohammed Alzaabi
Journal of Digital Forensics, Security and Law
This research describes our survey of data remaining on computer hard disks sold on the second hand market in the United Arab Emirates (UAE). This is a repetition of the first survey conducted in 2012 (Jones, Martin, & Alzaabi, 2012). Similar studies have been carried over the last ten years in the United Kingdom, Australia, USA, Germany and France: (Jones, Mee, Meyler, & Gooch, 2005), (Jones, Valli, Sutherland, & Thomas, 2006), (Jones, Valli, Dardick, & Sutherland, 2008), (Jones, Valli, Dardick, & Sutherland, 2009). This research was undertaken to gain insight into the volumes of data found on second-hand disks purchased …
A New Distributed Chinese Wall Security Policy Model, Saad Fehis, Omar Nouali, Mohand-Tahar Kechadi
A New Distributed Chinese Wall Security Policy Model, Saad Fehis, Omar Nouali, Mohand-Tahar Kechadi
Journal of Digital Forensics, Security and Law
The application of the Chinese wall security policy model (CWSPM) to control the information flows between two or more competing and/or conflicting companies in cloud computing (Multi-tenancy) or in the social network, is a very interesting solution. The main goal of the Chinese Wall Security Policy is to build a wall between the datasets of competing companies, and among the system subjects. This is done by the applying to the subjects mandatory rules, in order to control the information flow caused between them. This problem is one of the hottest topics in the area of cloud computing (as a distributed …
The Impact Of Sha-1 File Hash Collisions On Digital Forensic Imaging: A Follow-Up Experiment, Gary C. Kessler
The Impact Of Sha-1 File Hash Collisions On Digital Forensic Imaging: A Follow-Up Experiment, Gary C. Kessler
Journal of Digital Forensics, Security and Law
A previous paper described an experiment showing that Message Digest 5 (MD5) hash collisions of files have no impact on integrity verification in the forensic imaging process. This paper describes a similar experiment applied when two files have a Secure Hash Algorithm (SHA-1) collision.
A Survey Of Social Network Forensics, Umit Karabiyik, Muhammed Abdullah Canbaz, Ahmet Aksoy, Tayfun Tuna, Esra Akbas, Bilal Gonen, Ramazan S. Aygun
A Survey Of Social Network Forensics, Umit Karabiyik, Muhammed Abdullah Canbaz, Ahmet Aksoy, Tayfun Tuna, Esra Akbas, Bilal Gonen, Ramazan S. Aygun
Journal of Digital Forensics, Security and Law
Social networks in any form, specifically online social networks (OSNs), are becoming a part of our everyday life in this new millennium especially with the advanced and simple communication technologies through easily accessible devices such as smartphones and tablets. The data generated through the use of these technologies need to be analyzed for forensic purposes when criminal and terrorist activities are involved. In order to deal with the forensic implications of social networks, current research on both digital forensics and social networks need to be incorporated and understood. This will help digital forensics investigators to predict, detect and even prevent …
Investigating The Spatial Complexity Of Various Pke-Peks Schematics, Jacob Patterson
Investigating The Spatial Complexity Of Various Pke-Peks Schematics, Jacob Patterson
Rose-Hulman Undergraduate Research Publications
With the advent of cloud storage, people upload all sorts of information to third party servers. However, uploading plaintext does not seem like a good idea for users who wish to keep their data private. Current solutions to this problem in literature involves integrating Public Key Encryption and Public key encryption with keyword search techniques. The intent of this paper is to analyze the spatial complexities of various PKE-PEKS schemes at various levels of security and discuss potential avenues for improvement.
Table Of Contents
Journal of Digital Forensics, Security and Law
No abstract provided.
Analysis Porter's Five Forces Model On Airbnb, Osiany Nurlansa, Handaru Jati
Analysis Porter's Five Forces Model On Airbnb, Osiany Nurlansa, Handaru Jati
Elinvo (Electronics, Informatics, and Vocational Education)
This paper discusses about Airbnb. Airbnb is a company website that allows ordinary people to rent their residence as tourist accommodation. Anyone can rent rooms to suit their budget. The company established in 2008, and eight years later by a very rapid growth, the company reaches a turnover of millions of rooms per year. Airbnb analyzed using Porter's Five Forces Model. According to Porter, the competitive nature of the industry could be seen as a combination of top five strengths, namely Rivalry Among Existing Competitors, Threat of New Entrants, Threat of substitude Products or Services, Bargaining Power of Suppliers, Bargaining …
Analisis Sistem E-Commerce Pada Perusahan Jual-Beli Online Lazada Indonesia, Galih Setiyo Budhi
Analisis Sistem E-Commerce Pada Perusahan Jual-Beli Online Lazada Indonesia, Galih Setiyo Budhi
Elinvo (Electronics, Informatics, and Vocational Education)
Tujuan dari penulisan paper ini adalah untuk menganalisis mengenai system e-commerce pada situs belanjan online terbesar di Indonesia yaitu Lazada.co.id. Analisis meliputi, kelebihan dan kekurangan dari lazada Indonesia serta analisis SWOT pada situs tersebut. Hasil analisis menunjukan bahwa lazada Indonesia mampu menjadi perusahaan belanja online terbesar di Indonesia dengan berbagai kelebihan pelayanan maupun jaminan keamanan transaksi. Namun, lazada juga masih memliki beberapa kelemahan, diantara mengenai security system, dengan masih banyaknya konsumen yang mengalami penipuan. Perusahaan lazada Indonesia menggunakan strategi iovation, bargaining power of consumer dan bargaining power of suppliers untuk menjadikan perusahaan belanja online terbesar di Indonesia.
Analisis Sistem Informasi Pada Padiciti Menggunakan Konsep Competitive Forces And Strategy, Vivi Kusuma Hertantri
Analisis Sistem Informasi Pada Padiciti Menggunakan Konsep Competitive Forces And Strategy, Vivi Kusuma Hertantri
Elinvo (Electronics, Informatics, and Vocational Education)
Perkembangan sistem informasi mendukung dalam menyediakan tiket secara online dan realtime. E-commerce merupakan proses bisnis yang menggunakan internet dalam menjalankannya. Padiciti merupakan salah satu e-commerse yang menyediakan aplikasi pemesanan tiket kereta api, tiket pesawat, dan hotel. Padiciti dapat diakses melalui aplikasi smartphone dan website yang terintegrasi. Tujuan paper ini adalah untuk menganalisis sistem informasi Padiciti menggunakan metode dengan konsep Competitive Forces and Strategy. Hasil analisis menunjukkan bahwa Padiciti telah dapat menjadi sistem informasi yang sesuai dengan Competitive Forces and Strategy dengan hasil yang baik dan dapat bertahan dengan kelebihan dan kekuatan yang kompetitif. Kekuatan Padiciti terdapat pada aspek Cost Leadership, …
Analisis Competitive Force Dan Competitive Strategy Sistem Informasi Kuliner Di Indonesia (Studi Kasus : Kulina.Id), Damar Purba Pamungkas
Analisis Competitive Force Dan Competitive Strategy Sistem Informasi Kuliner Di Indonesia (Studi Kasus : Kulina.Id), Damar Purba Pamungkas
Elinvo (Electronics, Informatics, and Vocational Education)
Abstrak - Tujuan dari penulisan paper ini untuk menganalisis Competitive Force yang di hadapi oleh Kulina dan Competitive Strategy apakah yang dilakukan Kulina dalam mengatasi adanya competitive forces dalam menjalankan bisnisnya. Penulisan paper ini dilakukan untuk menganalisis Sistem Informasi Kulina dengan menggunakan Model Porter. Michael A. Porter menjelaskan lima kekuatan (five forces module) sebagai alat untuk menganalisis lingkungan persaingan industri. Keadaan persaingan perusahaan dalam suatu industri tergantung pada lima kekuatan persaingan dasar yaitu : Rivalry of Competitors, Threat of New Entrants, Threat of substitutes, Bargaining Power of Customers, dan Bargaining Power of Suppliers. Michael A. Porter …
Pengolahan Citra Untuk Identifikasi Telur Berdasarkan Ukuran, Syahrul Awalludin Sidiq
Pengolahan Citra Untuk Identifikasi Telur Berdasarkan Ukuran, Syahrul Awalludin Sidiq
Elinvo (Electronics, Informatics, and Vocational Education)
Salah satu Home Industri penyortir telur di Yogyakarta, adalah Tempel Ambarukmo. Penyortiran awalnya dilakukan secara manual tetapi membutuhkan waktu yang lama. Pengunaan mesin grading untuk mengatasi masalah tersebut, namun harga relatif mahal. Oleh karena itu, perlu adanya sistem otomatis untuk penyortiran telur sehingga menghemat waktu, tenaga, dan biaya. Penelitian ini bertujuan untuk mengembangkan suatu sistem yang mampu mendeteksi dan memisah telur berdasarkan ukuran menggunakan citra digital dengan media interface GUI (Graphical User Interface) yang memanfaatkan software matlab. Telur dikategorikan menjadi 5 kategori (Sangat Kecil, Kecil, Sedang, Besar, Sangat Besar). Dalam proyek akhir ini dirancang dengan menggunakan metode waterfall. Pengolahan citra …
Analisis Competitive Forces And Competitive Strategy Pada Sistem Informasi "Zalora.Co.Id", Fitria Ekarini
Analisis Competitive Forces And Competitive Strategy Pada Sistem Informasi "Zalora.Co.Id", Fitria Ekarini
Elinvo (Electronics, Informatics, and Vocational Education)
Analisis Sistem Informasi Zalora.co.id ini bertujuan untuk mengetahui seberapa kuatnya strategi persaingan yang disiapkan oleh Zalora.co.id untuk menghadapi kuatnya persaingan bisnis dengan perusahaan yang bergerak di bidang yang sama. Sehingga dapat dilihat kelebihan dan kekurangan dari Sistem Informasi ini. Analisis Sistem Informasi ini menggunakan model analisis competitive forces and Competitive Strategy. Dan untuk mengatasi lima kekuatan kompetitif tersebut, perusahaan dapat menerapkan competitive strategies. Pada Zalora yang merupakan situs web belanja kebutuhan fashion yang menawarkan produk-produk dari berbagai brand termuka, baik lokal maupun internasional ini dapat dikatakan sebagai online shop yang siap untuk bersaing dengan para kompetitor di bidang yang sama. …
From The Editors, Herbert J. Mattord, Michael E. Whitman, Carole L. Hollingsworth
From The Editors, Herbert J. Mattord, Michael E. Whitman, Carole L. Hollingsworth
Journal of Cybersecurity Education, Research and Practice
Welcome to the second issue of the Journal of Cybersecurity Education, Research and Practice (JCERP).
Planning And Implementing A Successful Nsa-Nsf Gencyber Summer Cyber Academy, Bryson R. Payne, Tamirat Abegaz, Keith Antonia
Planning And Implementing A Successful Nsa-Nsf Gencyber Summer Cyber Academy, Bryson R. Payne, Tamirat Abegaz, Keith Antonia
Journal of Cybersecurity Education, Research and Practice
The GenCyber program is jointly sponsored by the National Security Agency (NSA) and the National Science Foundation (NSF) to help faculty and cybersecurity experts provide summer cybersecurity camp experiences for K-12 students and teachers. The main objective of the program is to attract, educate, and motivate a new generation of young men and women to help address the nationwide shortage of trained cybersecurity professionals. The curriculum is flexible and centers on ten cybersecurity first principles. Currently, GenCyber provides cyber camp options for three types of audiences: students, teachers, and a combination of both teachers and students. In 2016, over 120 …
Towards An In-Depth Understanding Of Deep Packet Inspection Using A Suite Of Industrial Control Systems Protocol Packets, Guillermo A. Francia Iii, Xavier P. Francia, Anthony M. Pruitt
Towards An In-Depth Understanding Of Deep Packet Inspection Using A Suite Of Industrial Control Systems Protocol Packets, Guillermo A. Francia Iii, Xavier P. Francia, Anthony M. Pruitt
Journal of Cybersecurity Education, Research and Practice
Industrial control systems (ICS) are increasingly at risk and vulnerable to internal and external threats. These systems are integral part of our nation’s critical infrastructures. Consequently, a successful cyberattack on one of these could present disastrous consequences to human life and property as well. It is imperative that cybersecurity professionals gain a good understanding of these systems particularly in the area of communication protocols. Traditional Transmission Control Protocol (TCP) and User Datagram Protocol (UDP) are made to encapsulate some of these ICS protocols which may enable malicious payload to get through the network firewall and thus, gain entry into the …
Threats To Information Protection - Industry And Academic Perspectives: An Annotated Bibliography, Michael E. Whitman, Herbert J. Mattord
Threats To Information Protection - Industry And Academic Perspectives: An Annotated Bibliography, Michael E. Whitman, Herbert J. Mattord
Journal of Cybersecurity Education, Research and Practice
Threats to information assets have always been a concern to those responsible for making information useful and defending its value. The concepts of threat, threat agent, threat events and threat sources have evolved in recent years have very precise definitions. A summary of threat classification models used in academic research is provided along with a summary of recent industry threat assessment reports. Finally, the results from a recent study, 2015 SEC/CISE Threats to Information Protection Report Including a Current Snapshot of the State of the Industry, are given.
Mapping Neighborhood Scale Survey Responses With Uncertainty Metrics, Charles R. Ehlschlaeger, Yizhao Gao, James D. Westervelt, Robert C. Lozar, Marina V. Drigo, Jeffrey A. Burkhalter, Carey L. Baxter, Matthew D. Hiett, Natalie R. Myers, Ellen R. Hartman
Mapping Neighborhood Scale Survey Responses With Uncertainty Metrics, Charles R. Ehlschlaeger, Yizhao Gao, James D. Westervelt, Robert C. Lozar, Marina V. Drigo, Jeffrey A. Burkhalter, Carey L. Baxter, Matthew D. Hiett, Natalie R. Myers, Ellen R. Hartman
Journal of Spatial Information Science
This paper presents a methodology of mapping population-centric social, infrastructural, and environmental metrics at neighborhood scale. This methodology extends traditional survey analysis methods to create cartographic products useful in agent-based modeling and geographic information analysis. It utilizes and synthesizes survey microdata, sub-upazila attributes, land use information, and ground truth locations of attributes to create neighborhood scale multi-attribute maps. Monte Carlo methods are employed to combine any number of survey responses to stochastically weight survey cases and to simulate survey cases' locations in a study area. Through such Monte Carlo methods, known errors from each of the input sources can be …
Provenance And Credibility In Spatial And Platial Data, Grant Mckenzie, Martin Raubal, Krzysztof Janowicz, Andrew Flanagin
Provenance And Credibility In Spatial And Platial Data, Grant Mckenzie, Martin Raubal, Krzysztof Janowicz, Andrew Flanagin
Journal of Spatial Information Science
No abstract provided.
Trajectory Data Mining: A Review Of Methods And Applications, Jean Damascène Mazimpaka, Sabine Timpf
Trajectory Data Mining: A Review Of Methods And Applications, Jean Damascène Mazimpaka, Sabine Timpf
Journal of Spatial Information Science
The increasing use of location-aware devices has led to an increasing availability of trajectory data. As a result, researchers devoted their efforts to developing analysis methods including different data mining methods for trajectories. However, the research in this direction has so far produced mostly isolated studies and we still lack an integrated view of problems in applications of trajectory mining that were solved, the methods used to solve them, and applications using the obtained solutions. In this paper, we first discuss generic methods of trajectory mining and the relationships between them. Then, we discuss and classify application problems that were …
Enhancing Building Footprints With Squaring Operations, Imran Lokhat, Guillaume Touya
Enhancing Building Footprints With Squaring Operations, Imran Lokhat, Guillaume Touya
Journal of Spatial Information Science
Whatever the data source, or the capture process, the creation of a building footprint in a geographical dataset is error prone. Building footprints are designed with square angles, but once in a geographical dataset, the angles may not be exactly square. The almost-square angles blur the legibility of the footprints when displayed on maps, but might also be propagated in further applications based on the footprints, e.g., 3D city model construction. This paper proposes two new methods to square such buildings: a simple one, and a more complex one based on nonlinear least squares. The latter squares right and flat …
Mixed Map Labeling, Maarten Löffler, Martin Nöllenburg, Frank Staals
Mixed Map Labeling, Maarten Löffler, Martin Nöllenburg, Frank Staals
Journal of Spatial Information Science
Point feature map labeling is a geometric visualization problem, in which a set of input points must be labeled with a set of disjoint rectangles (the bounding boxes of the label texts). It is predominantly motivated by label placement in maps but it also has other visualization applications. Typically, labeling models either use internal labels, which must touch their feature point, or external (boundary) labels, which are placed outside the input image and which are connected to their feature points by crossing-free leader lines. In this paper we study polynomial-time algorithms for maximizing the number of internal labels in a …
Editorial, Matt Duckham
Mixed-Initiative Personal Assistants, Joshua W. Buck, Saverio Perugini
Mixed-Initiative Personal Assistants, Joshua W. Buck, Saverio Perugini
Saverio Perugini
Specification and implementation of flexible human-computer dialogs is challenging because of the complexity involved in rendering the dialog responsive to a vast number of varied paths through which users might desire to complete the dialog. To address this problem, we developed a toolkit for modeling and implementing task-based, mixed-initiative dialogs based on metaphors from lambda calculus. Our toolkit can automatically operationalize a dialog that involves multiple prompts and/or sub-dialogs, given a high-level dialog specification of it. Our current research entails incorporating the use of natural language to make the flexibility in communicating user utterances commensurate with that in dialog completion …
Rationality, Parapsychology, And Artificial Intelligence In Military And Intelligence Research By The United States Government In The Cold War, Guy M. Lomeo
Theses and Dissertations
A study analyzing the roles of rationality, parapsychology, and artificial intelligence in military and intelligence research by the United States Government in the Cold War. An examination of the methodology behind the decisions to pursue research in two fields that were initially considered irrational.