Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

2016

Computer Sciences

Institution
Keyword
Publication
Publication Type
File Type

Articles 1 - 30 of 2818

Full-Text Articles in Physical Sciences and Mathematics

Back Matter Dec 2016

Back Matter

Journal of Digital Forensics, Security and Law

No abstract provided.


Front Matter Dec 2016

Front Matter

Journal of Digital Forensics, Security and Law

No abstract provided.


Bloom Filters Optimized Wu-Manber For Intrusion Detection, Monther Aldwairi, Koloud Al-Khamaiseh, Fatima Alharbi, Babar Shah Dec 2016

Bloom Filters Optimized Wu-Manber For Intrusion Detection, Monther Aldwairi, Koloud Al-Khamaiseh, Fatima Alharbi, Babar Shah

Journal of Digital Forensics, Security and Law

With increasing number and severity of attacks, monitoring ingress and egress network traffic is becoming essential everyday task. Intrusion detection systems are the main tools for capturing and searching network traffic for potential harm. Signature-based intrusion detection systems are the most widely used, and they simply use a pattern matching algorithms to locate attack signatures in intercepted network traffic. Pattern matching algorithms are very expensive in terms of running time and memory usage, leaving intrusion detection systems unable to detect attacks in real-time. We propose a Bloom filters optimized Wu-Manber pattern matching algorithm to speed up intrusion detection. The Bloom …


The Impact Of Md5 File Hash Collisions On Digital Forensic Imaging, Gary C. Kessler Dec 2016

The Impact Of Md5 File Hash Collisions On Digital Forensic Imaging, Gary C. Kessler

Journal of Digital Forensics, Security and Law

The Message Digest 5 (MD5) hash is commonly used as for integrity verification in the forensic imaging process. The ability to force MD5 hash collisions has been a reality for more than a decade, although there is a general consensus that hash collisions are of minimal impact to the practice of computer forensics. This paper describes an experiment to determine the results of imaging two disks that are identical except for one file, the two versions of which have different content but otherwise occupy the same byte positions on the disk, are the same size, and have the same hash …


Leveraging The Windows Amcache.Hve File In Forensic Investigations, Bhupendra Singh, Upasna Singh Dec 2016

Leveraging The Windows Amcache.Hve File In Forensic Investigations, Bhupendra Singh, Upasna Singh

Journal of Digital Forensics, Security and Law

The Amcache.hve is a registry hive file that is created by Microsoft® Windows® to store the information related to execution of programs. This paper highlights the evidential potential of Amcache.hve file and its application in the area of user activity analysis. The study uncovers numerous artifacts retained in Amcache.hve file when a user performs certain actions such as running host-based applications, installation of new applications, or running portable applications from external devices. The results of experiments demonstrate that Amcache.hve file stores intriguing artifacts related to applications such as timestamps of creation and last modification of any application; name, description, publisher …


The 2016 Analysis Of Information Remaining On Computer Hard Disks Offered For Sale On The Second Hand Market In The Uae, Thomas Martin, Andy Jones, Mohammed Alzaabi Dec 2016

The 2016 Analysis Of Information Remaining On Computer Hard Disks Offered For Sale On The Second Hand Market In The Uae, Thomas Martin, Andy Jones, Mohammed Alzaabi

Journal of Digital Forensics, Security and Law

This research describes our survey of data remaining on computer hard disks sold on the second hand market in the United Arab Emirates (UAE). This is a repetition of the first survey conducted in 2012 (Jones, Martin, & Alzaabi, 2012). Similar studies have been carried over the last ten years in the United Kingdom, Australia, USA, Germany and France: (Jones, Mee, Meyler, & Gooch, 2005), (Jones, Valli, Sutherland, & Thomas, 2006), (Jones, Valli, Dardick, & Sutherland, 2008), (Jones, Valli, Dardick, & Sutherland, 2009). This research was undertaken to gain insight into the volumes of data found on second-hand disks purchased …


Masthead Dec 2016

Masthead

Journal of Digital Forensics, Security and Law

No abstract provided.


A New Distributed Chinese Wall Security Policy Model, Saad Fehis, Omar Nouali, Mohand-Tahar Kechadi Dec 2016

A New Distributed Chinese Wall Security Policy Model, Saad Fehis, Omar Nouali, Mohand-Tahar Kechadi

Journal of Digital Forensics, Security and Law

The application of the Chinese wall security policy model (CWSPM) to control the information flows between two or more competing and/or conflicting companies in cloud computing (Multi-tenancy) or in the social network, is a very interesting solution. The main goal of the Chinese Wall Security Policy is to build a wall between the datasets of competing companies, and among the system subjects. This is done by the applying to the subjects mandatory rules, in order to control the information flow caused between them. This problem is one of the hottest topics in the area of cloud computing (as a distributed …


The Impact Of Sha-1 File Hash Collisions On Digital Forensic Imaging: A Follow-Up Experiment, Gary C. Kessler Dec 2016

The Impact Of Sha-1 File Hash Collisions On Digital Forensic Imaging: A Follow-Up Experiment, Gary C. Kessler

Journal of Digital Forensics, Security and Law

A previous paper described an experiment showing that Message Digest 5 (MD5) hash collisions of files have no impact on integrity verification in the forensic imaging process. This paper describes a similar experiment applied when two files have a Secure Hash Algorithm (SHA-1) collision.


A Survey Of Social Network Forensics, Umit Karabiyik, Muhammed Abdullah Canbaz, Ahmet Aksoy, Tayfun Tuna, Esra Akbas, Bilal Gonen, Ramazan S. Aygun Dec 2016

A Survey Of Social Network Forensics, Umit Karabiyik, Muhammed Abdullah Canbaz, Ahmet Aksoy, Tayfun Tuna, Esra Akbas, Bilal Gonen, Ramazan S. Aygun

Journal of Digital Forensics, Security and Law

Social networks in any form, specifically online social networks (OSNs), are becoming a part of our everyday life in this new millennium especially with the advanced and simple communication technologies through easily accessible devices such as smartphones and tablets. The data generated through the use of these technologies need to be analyzed for forensic purposes when criminal and terrorist activities are involved. In order to deal with the forensic implications of social networks, current research on both digital forensics and social networks need to be incorporated and understood. This will help digital forensics investigators to predict, detect and even prevent …


Investigating The Spatial Complexity Of Various Pke-Peks Schematics, Jacob Patterson Dec 2016

Investigating The Spatial Complexity Of Various Pke-Peks Schematics, Jacob Patterson

Rose-Hulman Undergraduate Research Publications

With the advent of cloud storage, people upload all sorts of information to third party servers. However, uploading plaintext does not seem like a good idea for users who wish to keep their data private. Current solutions to this problem in literature involves integrating Public Key Encryption and Public key encryption with keyword search techniques. The intent of this paper is to analyze the spatial complexities of various PKE-PEKS schemes at various levels of security and discuss potential avenues for improvement.


Table Of Contents Dec 2016

Table Of Contents

Journal of Digital Forensics, Security and Law

No abstract provided.


Analysis Porter's Five Forces Model On Airbnb, Osiany Nurlansa, Handaru Jati Dec 2016

Analysis Porter's Five Forces Model On Airbnb, Osiany Nurlansa, Handaru Jati

Elinvo (Electronics, Informatics, and Vocational Education)

This paper discusses about Airbnb. Airbnb is a company website that allows ordinary people to rent their residence as tourist accommodation. Anyone can rent rooms to suit their budget. The company established in 2008, and eight years later by a very rapid growth, the company reaches a turnover of millions of rooms per year. Airbnb analyzed using Porter's Five Forces Model. According to Porter, the competitive nature of the industry could be seen as a combination of top five strengths, namely Rivalry Among Existing Competitors, Threat of New Entrants, Threat of substitude Products or Services, Bargaining Power of Suppliers, Bargaining …


Analisis Sistem E-Commerce Pada Perusahan Jual-Beli Online Lazada Indonesia, Galih Setiyo Budhi Dec 2016

Analisis Sistem E-Commerce Pada Perusahan Jual-Beli Online Lazada Indonesia, Galih Setiyo Budhi

Elinvo (Electronics, Informatics, and Vocational Education)

Tujuan dari penulisan paper ini adalah untuk menganalisis mengenai system e-commerce pada situs belanjan online terbesar di Indonesia yaitu Lazada.co.id. Analisis meliputi, kelebihan dan kekurangan dari lazada Indonesia serta analisis SWOT pada situs tersebut. Hasil analisis menunjukan bahwa lazada Indonesia mampu menjadi perusahaan belanja online terbesar di Indonesia dengan berbagai kelebihan pelayanan maupun jaminan keamanan transaksi. Namun, lazada juga masih memliki beberapa kelemahan, diantara mengenai security system, dengan masih banyaknya konsumen yang mengalami penipuan. Perusahaan lazada Indonesia menggunakan strategi iovation, bargaining power of consumer dan bargaining power of suppliers untuk menjadikan perusahaan belanja online terbesar di Indonesia.


Analisis Sistem Informasi Pada Padiciti Menggunakan Konsep Competitive Forces And Strategy, Vivi Kusuma Hertantri Dec 2016

Analisis Sistem Informasi Pada Padiciti Menggunakan Konsep Competitive Forces And Strategy, Vivi Kusuma Hertantri

Elinvo (Electronics, Informatics, and Vocational Education)

Perkembangan sistem informasi mendukung dalam menyediakan tiket secara online dan realtime. E-commerce merupakan proses bisnis yang menggunakan internet dalam menjalankannya. Padiciti merupakan salah satu e-commerse yang menyediakan aplikasi pemesanan tiket kereta api, tiket pesawat, dan hotel. Padiciti dapat diakses melalui aplikasi smartphone dan website yang terintegrasi. Tujuan paper ini adalah untuk menganalisis sistem informasi Padiciti menggunakan metode dengan konsep Competitive Forces and Strategy. Hasil analisis menunjukkan bahwa Padiciti telah dapat menjadi sistem informasi yang sesuai dengan Competitive Forces and Strategy dengan hasil yang baik dan dapat bertahan dengan kelebihan dan kekuatan yang kompetitif. Kekuatan Padiciti terdapat pada aspek Cost Leadership, …


Analisis Competitive Force Dan Competitive Strategy Sistem Informasi Kuliner Di Indonesia (Studi Kasus : Kulina.Id), Damar Purba Pamungkas Dec 2016

Analisis Competitive Force Dan Competitive Strategy Sistem Informasi Kuliner Di Indonesia (Studi Kasus : Kulina.Id), Damar Purba Pamungkas

Elinvo (Electronics, Informatics, and Vocational Education)

Abstrak - Tujuan dari penulisan paper ini untuk menganalisis Competitive Force yang di hadapi oleh Kulina dan Competitive Strategy apakah yang dilakukan Kulina dalam mengatasi adanya competitive forces dalam menjalankan bisnisnya. Penulisan paper ini dilakukan untuk menganalisis Sistem Informasi Kulina dengan menggunakan Model Porter. Michael A. Porter menjelaskan lima kekuatan (five forces module) sebagai alat untuk menganalisis lingkungan persaingan industri. Keadaan persaingan perusahaan dalam suatu industri tergantung pada lima kekuatan persaingan dasar yaitu : Rivalry of Competitors, Threat of New Entrants, Threat of substitutes, Bargaining Power of Customers, dan Bargaining Power of Suppliers. Michael A. Porter …


Pengolahan Citra Untuk Identifikasi Telur Berdasarkan Ukuran, Syahrul Awalludin Sidiq Dec 2016

Pengolahan Citra Untuk Identifikasi Telur Berdasarkan Ukuran, Syahrul Awalludin Sidiq

Elinvo (Electronics, Informatics, and Vocational Education)

Salah satu Home Industri penyortir telur di Yogyakarta, adalah Tempel Ambarukmo. Penyortiran awalnya dilakukan secara manual tetapi membutuhkan waktu yang lama. Pengunaan mesin grading untuk mengatasi masalah tersebut, namun harga relatif mahal. Oleh karena itu, perlu adanya sistem otomatis untuk penyortiran telur sehingga menghemat waktu, tenaga, dan biaya. Penelitian ini bertujuan untuk mengembangkan suatu sistem yang mampu mendeteksi dan memisah telur berdasarkan ukuran menggunakan citra digital dengan media interface GUI (Graphical User Interface) yang memanfaatkan software matlab. Telur dikategorikan menjadi 5 kategori (Sangat Kecil, Kecil, Sedang, Besar, Sangat Besar). Dalam proyek akhir ini dirancang dengan menggunakan metode waterfall. Pengolahan citra …


Analisis Competitive Forces And Competitive Strategy Pada Sistem Informasi "Zalora.Co.Id", Fitria Ekarini Dec 2016

Analisis Competitive Forces And Competitive Strategy Pada Sistem Informasi "Zalora.Co.Id", Fitria Ekarini

Elinvo (Electronics, Informatics, and Vocational Education)

Analisis Sistem Informasi Zalora.co.id ini bertujuan untuk mengetahui seberapa kuatnya strategi persaingan yang disiapkan oleh Zalora.co.id untuk menghadapi kuatnya persaingan bisnis dengan perusahaan yang bergerak di bidang yang sama. Sehingga dapat dilihat kelebihan dan kekurangan dari Sistem Informasi ini. Analisis Sistem Informasi ini menggunakan model analisis competitive forces and Competitive Strategy. Dan untuk mengatasi lima kekuatan kompetitif tersebut, perusahaan dapat menerapkan competitive strategies. Pada Zalora yang merupakan situs web belanja kebutuhan fashion yang menawarkan produk-produk dari berbagai brand termuka, baik lokal maupun internasional ini dapat dikatakan sebagai online shop yang siap untuk bersaing dengan para kompetitor di bidang yang sama. …


From The Editors, Herbert J. Mattord, Michael E. Whitman, Carole L. Hollingsworth Dec 2016

From The Editors, Herbert J. Mattord, Michael E. Whitman, Carole L. Hollingsworth

Journal of Cybersecurity Education, Research and Practice

Welcome to the second issue of the Journal of Cybersecurity Education, Research and Practice (JCERP).


Planning And Implementing A Successful Nsa-Nsf Gencyber Summer Cyber Academy, Bryson R. Payne, Tamirat Abegaz, Keith Antonia Dec 2016

Planning And Implementing A Successful Nsa-Nsf Gencyber Summer Cyber Academy, Bryson R. Payne, Tamirat Abegaz, Keith Antonia

Journal of Cybersecurity Education, Research and Practice

The GenCyber program is jointly sponsored by the National Security Agency (NSA) and the National Science Foundation (NSF) to help faculty and cybersecurity experts provide summer cybersecurity camp experiences for K-12 students and teachers. The main objective of the program is to attract, educate, and motivate a new generation of young men and women to help address the nationwide shortage of trained cybersecurity professionals. The curriculum is flexible and centers on ten cybersecurity first principles. Currently, GenCyber provides cyber camp options for three types of audiences: students, teachers, and a combination of both teachers and students. In 2016, over 120 …


Towards An In-Depth Understanding Of Deep Packet Inspection Using A Suite Of Industrial Control Systems Protocol Packets, Guillermo A. Francia Iii, Xavier P. Francia, Anthony M. Pruitt Dec 2016

Towards An In-Depth Understanding Of Deep Packet Inspection Using A Suite Of Industrial Control Systems Protocol Packets, Guillermo A. Francia Iii, Xavier P. Francia, Anthony M. Pruitt

Journal of Cybersecurity Education, Research and Practice

Industrial control systems (ICS) are increasingly at risk and vulnerable to internal and external threats. These systems are integral part of our nation’s critical infrastructures. Consequently, a successful cyberattack on one of these could present disastrous consequences to human life and property as well. It is imperative that cybersecurity professionals gain a good understanding of these systems particularly in the area of communication protocols. Traditional Transmission Control Protocol (TCP) and User Datagram Protocol (UDP) are made to encapsulate some of these ICS protocols which may enable malicious payload to get through the network firewall and thus, gain entry into the …


Threats To Information Protection - Industry And Academic Perspectives: An Annotated Bibliography, Michael E. Whitman, Herbert J. Mattord Dec 2016

Threats To Information Protection - Industry And Academic Perspectives: An Annotated Bibliography, Michael E. Whitman, Herbert J. Mattord

Journal of Cybersecurity Education, Research and Practice

Threats to information assets have always been a concern to those responsible for making information useful and defending its value. The concepts of threat, threat agent, threat events and threat sources have evolved in recent years have very precise definitions. A summary of threat classification models used in academic research is provided along with a summary of recent industry threat assessment reports. Finally, the results from a recent study, 2015 SEC/CISE Threats to Information Protection Report Including a Current Snapshot of the State of the Industry, are given.


Mapping Neighborhood Scale Survey Responses With Uncertainty Metrics, Charles R. Ehlschlaeger, Yizhao Gao, James D. Westervelt, Robert C. Lozar, Marina V. Drigo, Jeffrey A. Burkhalter, Carey L. Baxter, Matthew D. Hiett, Natalie R. Myers, Ellen R. Hartman Dec 2016

Mapping Neighborhood Scale Survey Responses With Uncertainty Metrics, Charles R. Ehlschlaeger, Yizhao Gao, James D. Westervelt, Robert C. Lozar, Marina V. Drigo, Jeffrey A. Burkhalter, Carey L. Baxter, Matthew D. Hiett, Natalie R. Myers, Ellen R. Hartman

Journal of Spatial Information Science

This paper presents a methodology of mapping population-centric social, infrastructural, and environmental metrics at neighborhood scale. This methodology extends traditional survey analysis methods to create cartographic products useful in agent-based modeling and geographic information analysis. It utilizes and synthesizes survey microdata, sub-upazila attributes, land use information, and ground truth locations of attributes to create neighborhood scale multi-attribute maps. Monte Carlo methods are employed to combine any number of survey responses to stochastically weight survey cases and to simulate survey cases' locations in a study area. Through such Monte Carlo methods, known errors from each of the input sources can be …


Provenance And Credibility In Spatial And Platial Data, Grant Mckenzie, Martin Raubal, Krzysztof Janowicz, Andrew Flanagin Dec 2016

Provenance And Credibility In Spatial And Platial Data, Grant Mckenzie, Martin Raubal, Krzysztof Janowicz, Andrew Flanagin

Journal of Spatial Information Science

No abstract provided.


Trajectory Data Mining: A Review Of Methods And Applications, Jean Damascène Mazimpaka, Sabine Timpf Dec 2016

Trajectory Data Mining: A Review Of Methods And Applications, Jean Damascène Mazimpaka, Sabine Timpf

Journal of Spatial Information Science

The increasing use of location-aware devices has led to an increasing availability of trajectory data. As a result, researchers devoted their efforts to developing analysis methods including different data mining methods for trajectories. However, the research in this direction has so far produced mostly isolated studies and we still lack an integrated view of problems in applications of trajectory mining that were solved, the methods used to solve them, and applications using the obtained solutions. In this paper, we first discuss generic methods of trajectory mining and the relationships between them. Then, we discuss and classify application problems that were …


Enhancing Building Footprints With Squaring Operations, Imran Lokhat, Guillaume Touya Dec 2016

Enhancing Building Footprints With Squaring Operations, Imran Lokhat, Guillaume Touya

Journal of Spatial Information Science

Whatever the data source, or the capture process, the creation of a building footprint in a geographical dataset is error prone. Building footprints are designed with square angles, but once in a geographical dataset, the angles may not be exactly square. The almost-square angles blur the legibility of the footprints when displayed on maps, but might also be propagated in further applications based on the footprints, e.g., 3D city model construction. This paper proposes two new methods to square such buildings: a simple one, and a more complex one based on nonlinear least squares. The latter squares right and flat …


Mixed Map Labeling, Maarten Löffler, Martin Nöllenburg, Frank Staals Dec 2016

Mixed Map Labeling, Maarten Löffler, Martin Nöllenburg, Frank Staals

Journal of Spatial Information Science

Point feature map labeling is a geometric visualization problem, in which a set of input points must be labeled with a set of disjoint rectangles (the bounding boxes of the label texts). It is predominantly motivated by label placement in maps but it also has other visualization applications. Typically, labeling models either use internal labels, which must touch their feature point, or external (boundary) labels, which are placed outside the input image and which are connected to their feature points by crossing-free leader lines. In this paper we study polynomial-time algorithms for maximizing the number of internal labels in a …


Editorial, Matt Duckham Dec 2016

Editorial, Matt Duckham

Journal of Spatial Information Science

No abstract provided.


Mixed-Initiative Personal Assistants, Joshua W. Buck, Saverio Perugini Dec 2016

Mixed-Initiative Personal Assistants, Joshua W. Buck, Saverio Perugini

Saverio Perugini

Specification and implementation of flexible human-computer dialogs is challenging because of the complexity involved in rendering the dialog responsive to a vast number of varied paths through which users might desire to complete the dialog. To address this problem, we developed a toolkit for modeling and implementing task-based, mixed-initiative dialogs based on metaphors from lambda calculus. Our toolkit can automatically operationalize a dialog that involves multiple prompts and/or sub-dialogs, given a high-level dialog specification of it. Our current research entails incorporating the use of natural language to make the flexibility in communicating user utterances commensurate with that in dialog completion …


Rationality, Parapsychology, And Artificial Intelligence In Military And Intelligence Research By The United States Government In The Cold War, Guy M. Lomeo Dec 2016

Rationality, Parapsychology, And Artificial Intelligence In Military And Intelligence Research By The United States Government In The Cold War, Guy M. Lomeo

Theses and Dissertations

A study analyzing the roles of rationality, parapsychology, and artificial intelligence in military and intelligence research by the United States Government in the Cold War. An examination of the methodology behind the decisions to pursue research in two fields that were initially considered irrational.