Open Access. Powered by Scholars. Published by Universities.®
Social and Behavioral Sciences Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Singapore Management University (65)
- Embry-Riddle Aeronautical University (53)
- Clark University (12)
- University for Business and Technology in Kosovo (12)
- Selected Works (11)
-
- The University of Maine (11)
- University of New Haven (10)
- Nova Southeastern University (8)
- Walden University (8)
- City University of New York (CUNY) (7)
- Wright State University (7)
- Edith Cowan University (6)
- Purdue University (5)
- Old Dominion University (4)
- Technological University Dublin (4)
- University of Nebraska - Lincoln (4)
- University of Nebraska at Omaha (4)
- University of South Florida (3)
- University of Texas Rio Grande Valley (3)
- Western University (3)
- Boise State University (2)
- Eastern Michigan University (2)
- Kennesaw State University (2)
- Montclair State University (2)
- Olivet Nazarene University (2)
- Union College (2)
- University at Albany, State University of New York (2)
- University of Pittsburgh School of Law (2)
- University of Wisconsin Milwaukee (2)
- Ursinus College (2)
- Keyword
-
- Twitter (12)
- Digital forensics (10)
- Security (10)
- Computer science (7)
- Information technology (7)
-
- MPA (6)
- Privacy (6)
- Computer forensics (5)
- Libraries (5)
- MSIT (5)
- Singapore (5)
- Social media (5)
- Usability (5)
- Cyber forensics (4)
- Data mining (4)
- Discovery (4)
- GIS (4)
- Higher education (4)
- Information systems (4)
- Interface Design (4)
- Machine learning (4)
- SaaS (4)
- Search (4)
- Singapore Management University (4)
- Survey (4)
- Algorithm (3)
- Applied sciences (3)
- Classification (3)
- Cloud Systems (3)
- Cyberbullying (3)
- Publication
-
- Research Collection School Of Computing and Information Systems (57)
- Journal of Digital Forensics, Security and Law (31)
- Annual ADFSL Conference on Digital Forensics, Security and Law (21)
- UBT International Conference (12)
- School of Professional Studies (11)
-
- Electrical & Computer Engineering and Computer Science Faculty Publications (10)
- Journal of Spatial Information Science (10)
- CCE Theses and Dissertations (8)
- Walden Dissertations and Doctoral Studies (8)
- Kno.e.sis Publications (7)
- Australian Information Security Management Conference (4)
- Asian Management Insights (3)
- Computer Science Theses & Dissertations (3)
- Publications and Research (3)
- SMU Press Releases (3)
- Theses and Dissertations (3)
- Australian Digital Forensics Conference (2)
- Book Chapters (2)
- Computer Science Summer Fellows (2)
- Conference papers (2)
- Dissertations, Theses, and Capstone Projects (2)
- Electronic Thesis and Dissertation Repository (2)
- Hillary Corbett (2)
- Honors Theses (2)
- Information Systems Faculty Publications and Presentations (2)
- Information Technology Master Theses (2)
- KSU Proceedings on Cybersecurity Education, Research and Practice (2)
- Legacy Theses & Dissertations (2009 - 2024) (2)
- Master's Theses and Doctoral Dissertations (2)
- Open Access Theses (2)
- Publication Type
- File Type
Articles 1 - 30 of 294
Full-Text Articles in Social and Behavioral Sciences
Bloom Filters Optimized Wu-Manber For Intrusion Detection, Monther Aldwairi, Koloud Al-Khamaiseh, Fatima Alharbi, Babar Shah
Bloom Filters Optimized Wu-Manber For Intrusion Detection, Monther Aldwairi, Koloud Al-Khamaiseh, Fatima Alharbi, Babar Shah
Journal of Digital Forensics, Security and Law
With increasing number and severity of attacks, monitoring ingress and egress network traffic is becoming essential everyday task. Intrusion detection systems are the main tools for capturing and searching network traffic for potential harm. Signature-based intrusion detection systems are the most widely used, and they simply use a pattern matching algorithms to locate attack signatures in intercepted network traffic. Pattern matching algorithms are very expensive in terms of running time and memory usage, leaving intrusion detection systems unable to detect attacks in real-time. We propose a Bloom filters optimized Wu-Manber pattern matching algorithm to speed up intrusion detection. The Bloom …
The Impact Of Md5 File Hash Collisions On Digital Forensic Imaging, Gary C. Kessler
The Impact Of Md5 File Hash Collisions On Digital Forensic Imaging, Gary C. Kessler
Journal of Digital Forensics, Security and Law
The Message Digest 5 (MD5) hash is commonly used as for integrity verification in the forensic imaging process. The ability to force MD5 hash collisions has been a reality for more than a decade, although there is a general consensus that hash collisions are of minimal impact to the practice of computer forensics. This paper describes an experiment to determine the results of imaging two disks that are identical except for one file, the two versions of which have different content but otherwise occupy the same byte positions on the disk, are the same size, and have the same hash …
Leveraging The Windows Amcache.Hve File In Forensic Investigations, Bhupendra Singh, Upasna Singh
Leveraging The Windows Amcache.Hve File In Forensic Investigations, Bhupendra Singh, Upasna Singh
Journal of Digital Forensics, Security and Law
The Amcache.hve is a registry hive file that is created by Microsoft® Windows® to store the information related to execution of programs. This paper highlights the evidential potential of Amcache.hve file and its application in the area of user activity analysis. The study uncovers numerous artifacts retained in Amcache.hve file when a user performs certain actions such as running host-based applications, installation of new applications, or running portable applications from external devices. The results of experiments demonstrate that Amcache.hve file stores intriguing artifacts related to applications such as timestamps of creation and last modification of any application; name, description, publisher …
The 2016 Analysis Of Information Remaining On Computer Hard Disks Offered For Sale On The Second Hand Market In The Uae, Thomas Martin, Andy Jones, Mohammed Alzaabi
The 2016 Analysis Of Information Remaining On Computer Hard Disks Offered For Sale On The Second Hand Market In The Uae, Thomas Martin, Andy Jones, Mohammed Alzaabi
Journal of Digital Forensics, Security and Law
This research describes our survey of data remaining on computer hard disks sold on the second hand market in the United Arab Emirates (UAE). This is a repetition of the first survey conducted in 2012 (Jones, Martin, & Alzaabi, 2012). Similar studies have been carried over the last ten years in the United Kingdom, Australia, USA, Germany and France: (Jones, Mee, Meyler, & Gooch, 2005), (Jones, Valli, Sutherland, & Thomas, 2006), (Jones, Valli, Dardick, & Sutherland, 2008), (Jones, Valli, Dardick, & Sutherland, 2009). This research was undertaken to gain insight into the volumes of data found on second-hand disks purchased …
A New Distributed Chinese Wall Security Policy Model, Saad Fehis, Omar Nouali, Mohand-Tahar Kechadi
A New Distributed Chinese Wall Security Policy Model, Saad Fehis, Omar Nouali, Mohand-Tahar Kechadi
Journal of Digital Forensics, Security and Law
The application of the Chinese wall security policy model (CWSPM) to control the information flows between two or more competing and/or conflicting companies in cloud computing (Multi-tenancy) or in the social network, is a very interesting solution. The main goal of the Chinese Wall Security Policy is to build a wall between the datasets of competing companies, and among the system subjects. This is done by the applying to the subjects mandatory rules, in order to control the information flow caused between them. This problem is one of the hottest topics in the area of cloud computing (as a distributed …
The Impact Of Sha-1 File Hash Collisions On Digital Forensic Imaging: A Follow-Up Experiment, Gary C. Kessler
The Impact Of Sha-1 File Hash Collisions On Digital Forensic Imaging: A Follow-Up Experiment, Gary C. Kessler
Journal of Digital Forensics, Security and Law
A previous paper described an experiment showing that Message Digest 5 (MD5) hash collisions of files have no impact on integrity verification in the forensic imaging process. This paper describes a similar experiment applied when two files have a Secure Hash Algorithm (SHA-1) collision.
A Survey Of Social Network Forensics, Umit Karabiyik, Muhammed Abdullah Canbaz, Ahmet Aksoy, Tayfun Tuna, Esra Akbas, Bilal Gonen, Ramazan S. Aygun
A Survey Of Social Network Forensics, Umit Karabiyik, Muhammed Abdullah Canbaz, Ahmet Aksoy, Tayfun Tuna, Esra Akbas, Bilal Gonen, Ramazan S. Aygun
Journal of Digital Forensics, Security and Law
Social networks in any form, specifically online social networks (OSNs), are becoming a part of our everyday life in this new millennium especially with the advanced and simple communication technologies through easily accessible devices such as smartphones and tablets. The data generated through the use of these technologies need to be analyzed for forensic purposes when criminal and terrorist activities are involved. In order to deal with the forensic implications of social networks, current research on both digital forensics and social networks need to be incorporated and understood. This will help digital forensics investigators to predict, detect and even prevent …
Table Of Contents
Journal of Digital Forensics, Security and Law
No abstract provided.
Mapping Neighborhood Scale Survey Responses With Uncertainty Metrics, Charles R. Ehlschlaeger, Yizhao Gao, James D. Westervelt, Robert C. Lozar, Marina V. Drigo, Jeffrey A. Burkhalter, Carey L. Baxter, Matthew D. Hiett, Natalie R. Myers, Ellen R. Hartman
Mapping Neighborhood Scale Survey Responses With Uncertainty Metrics, Charles R. Ehlschlaeger, Yizhao Gao, James D. Westervelt, Robert C. Lozar, Marina V. Drigo, Jeffrey A. Burkhalter, Carey L. Baxter, Matthew D. Hiett, Natalie R. Myers, Ellen R. Hartman
Journal of Spatial Information Science
This paper presents a methodology of mapping population-centric social, infrastructural, and environmental metrics at neighborhood scale. This methodology extends traditional survey analysis methods to create cartographic products useful in agent-based modeling and geographic information analysis. It utilizes and synthesizes survey microdata, sub-upazila attributes, land use information, and ground truth locations of attributes to create neighborhood scale multi-attribute maps. Monte Carlo methods are employed to combine any number of survey responses to stochastically weight survey cases and to simulate survey cases' locations in a study area. Through such Monte Carlo methods, known errors from each of the input sources can be …
Provenance And Credibility In Spatial And Platial Data, Grant Mckenzie, Martin Raubal, Krzysztof Janowicz, Andrew Flanagin
Provenance And Credibility In Spatial And Platial Data, Grant Mckenzie, Martin Raubal, Krzysztof Janowicz, Andrew Flanagin
Journal of Spatial Information Science
No abstract provided.
Trajectory Data Mining: A Review Of Methods And Applications, Jean Damascène Mazimpaka, Sabine Timpf
Trajectory Data Mining: A Review Of Methods And Applications, Jean Damascène Mazimpaka, Sabine Timpf
Journal of Spatial Information Science
The increasing use of location-aware devices has led to an increasing availability of trajectory data. As a result, researchers devoted their efforts to developing analysis methods including different data mining methods for trajectories. However, the research in this direction has so far produced mostly isolated studies and we still lack an integrated view of problems in applications of trajectory mining that were solved, the methods used to solve them, and applications using the obtained solutions. In this paper, we first discuss generic methods of trajectory mining and the relationships between them. Then, we discuss and classify application problems that were …
Enhancing Building Footprints With Squaring Operations, Imran Lokhat, Guillaume Touya
Enhancing Building Footprints With Squaring Operations, Imran Lokhat, Guillaume Touya
Journal of Spatial Information Science
Whatever the data source, or the capture process, the creation of a building footprint in a geographical dataset is error prone. Building footprints are designed with square angles, but once in a geographical dataset, the angles may not be exactly square. The almost-square angles blur the legibility of the footprints when displayed on maps, but might also be propagated in further applications based on the footprints, e.g., 3D city model construction. This paper proposes two new methods to square such buildings: a simple one, and a more complex one based on nonlinear least squares. The latter squares right and flat …
Mixed Map Labeling, Maarten Löffler, Martin Nöllenburg, Frank Staals
Mixed Map Labeling, Maarten Löffler, Martin Nöllenburg, Frank Staals
Journal of Spatial Information Science
Point feature map labeling is a geometric visualization problem, in which a set of input points must be labeled with a set of disjoint rectangles (the bounding boxes of the label texts). It is predominantly motivated by label placement in maps but it also has other visualization applications. Typically, labeling models either use internal labels, which must touch their feature point, or external (boundary) labels, which are placed outside the input image and which are connected to their feature points by crossing-free leader lines. In this paper we study polynomial-time algorithms for maximizing the number of internal labels in a …
Editorial, Matt Duckham
Rationality, Parapsychology, And Artificial Intelligence In Military And Intelligence Research By The United States Government In The Cold War, Guy M. Lomeo
Theses and Dissertations
A study analyzing the roles of rationality, parapsychology, and artificial intelligence in military and intelligence research by the United States Government in the Cold War. An examination of the methodology behind the decisions to pursue research in two fields that were initially considered irrational.
Military Cyber Professionals Have An Important Part To Play In The Obama-Trump Transition, Michael V. Hayden
Military Cyber Professionals Have An Important Part To Play In The Obama-Trump Transition, Michael V. Hayden
Military Cyber Affairs
Over the course of decades in service, I have experienced multiple presidential transitions. Each new Commander in Chief updates policies, personnel, and priorities…especially when the transition involves a new political party. In this respect, the current transition from the Obama to the Trump administration is no different. While this periodic exercise of our democracy may seem disruptive to some, it is a true opportunity for military cyber professionals to help shape our future national security posture.
Gender Bias In It Hiring Practices: An Ethical Analysis, Harmony L. Alford
Gender Bias In It Hiring Practices: An Ethical Analysis, Harmony L. Alford
Student Scholarship – Computer Science
With the current movement to increase the number of women in STEM-related careers, modified IT hiring practices may be considered debatably unethical. Studies cited in this work have asserted that female representation in STEM fields is integral not only to encouraging continued progression toward gender equality in the workplace but also to creating more inclusive products. In turn, some argue that when faced with reasonably comparable female and male candidates, a hiring manager should select the female candidate in order to increase the female representation in the company and provide a female perspective. However, it is simultaneously debatably unethical and …
Databrarianship: The Academic Data Librarian In Theory And Practice, Darren Sweeper
Databrarianship: The Academic Data Librarian In Theory And Practice, Darren Sweeper
Sprague Library Scholarship and Creative Works
No abstract provided.
Preliminary Investigation Of Walking Motion Using A Combination Of Image And Signal Processing, Bradley Schneider, Tanvi Banerjee
Preliminary Investigation Of Walking Motion Using A Combination Of Image And Signal Processing, Bradley Schneider, Tanvi Banerjee
Kno.e.sis Publications
We present the results of analyzing gait motion in first-person video taken from a commercially available wearable camera embedded in a pair of glasses. The video is analyzed with three different computer vision methods to extract motion vectors from different gait sequences from four individuals for comparison against a manually annotated ground truth dataset. Using a combination of signal processing and computer vision techniques, gait features are extracted to identify the walking pace of the individual wearing the camera as well as validated using the ground truth dataset. Our preliminary results indicate that the extraction of activity from the video …
The Transition Experiences Of International Graduate Students In Clark University School Of Professional Studies, Xuesong Huang, Mingyang Lian, Dang Trung, Jay Sheth, Yuwei Yang, Irina Klimenko
The Transition Experiences Of International Graduate Students In Clark University School Of Professional Studies, Xuesong Huang, Mingyang Lian, Dang Trung, Jay Sheth, Yuwei Yang, Irina Klimenko
School of Professional Studies
In the last decade, the School of Professional Studies at Clark University has witnessed a sharp increase in international students. More and more international students in the millennial generation have entered the School of Professional Studies pursuing one of the two-year graduate programs: Master of Science in Professional Studies, Master of Science in Public Administration, and Master of Science in Information Technology. In the past, working adult student dominant the program. These students already had a career outside the classrooms before them came to study. The millennial international students have generated new adjustment problems. Some of the transition issues of …
Computational Environment For Modeling And Analysing Network Traffic Behaviour Using The Divide And Recombine Framework, Ashrith Barthur
Computational Environment For Modeling And Analysing Network Traffic Behaviour Using The Divide And Recombine Framework, Ashrith Barthur
Open Access Dissertations
There are two essential goals of this research. The first goal is to design and construct a computational environment that is used for studying large and complex datasets in the cybersecurity domain. The second goal is to analyse the Spamhaus blacklist query dataset which includes uncovering the properties of blacklisted hosts and understanding the nature of blacklisted hosts over time.
The analytical environment enables deep analysis of very large and complex datasets by exploiting the divide and recombine framework. The capability to analyse data in depth enables one to go beyond just summary statistics in research. This deep analysis is …
Aiddata Gis International Fellowship: Ghana West-Africa, Jason N. Ready
Aiddata Gis International Fellowship: Ghana West-Africa, Jason N. Ready
International Development, Community and Environment (IDCE)
My internship, or fellowship as it was commonly referred to, was funded by a non-profit organization out of Williamsburg Virginia called AidData. This fellowship took place in in the country of Ghana, West-Africa beginning in May of 2016 and continued for 14 weeks with 40 hours each week. The objective of this internship was to provide in-depth training on the use of geographic Information Systems to Private and Public sectors within the country to allow for increased efficiency, and transparency through data visualization. In accordance with the requirement of Clark Universities GISDE master’s program this paper will delve into the …
Towards Multipurpose Readability Assessment, Ion Madrazo
Towards Multipurpose Readability Assessment, Ion Madrazo
Boise State University Theses and Dissertations
Readability refers to the ease with which a reader can understand a text. Automatic readability assessment has been widely studied over the past 50 years. However, most of the studies focus on the development of tools that apply either to a single language, domain, or document type. This supposes duplicate efforts for both developers, who need to integrate multiple tools in their systems, and final users, who have to deal with incompatibilities among the readability scales of different tools. In this manuscript, we present MultiRead, a multipurpose readability assessment tool capable of predicting the reading difficulty of texts of varied …
Efficient Online Summarization Of Large-Scale Dynamic Networks, Qiang Qu, Siyuan Liu, Feida Zhu, Christian S. Jensen
Efficient Online Summarization Of Large-Scale Dynamic Networks, Qiang Qu, Siyuan Liu, Feida Zhu, Christian S. Jensen
Research Collection School Of Computing and Information Systems
Information diffusion in social networks is often characterized by huge participating communities and viral cascades of high dynamicity. To observe, summarize, and understand the evolution of dynamic diffusion processes in an informative and insightful way is a challenge of high practical value. However, few existing studies aim to summarize networks for interesting dynamic patterns. Dynamic networks raise new challenges not found in static settings, including time sensitivity, online interestingness evaluation, and summary traceability, which render existing techniques inadequate. We propose dynamic network summarization to summarize dynamic networks with millions of nodes by only capturing the few most interesting nodes or …
Indoor Scene Localization To Fight Sex Trafficking In Hotels, Abigail Stylianou
Indoor Scene Localization To Fight Sex Trafficking In Hotels, Abigail Stylianou
McKelvey School of Engineering Theses & Dissertations
Images are key to fighting sex trafficking. They are: (a) used to advertise for sex services,(b) shared among criminal networks, and (c) connect a person in an image to the place where the image was taken. This work explores the ability to link images to indoor places in order to support the investigation and prosecution of sex trafficking. We propose and develop a framework that includes a database of open-source information available on the Internet, a crowd-sourcing approach to gathering additional images, and explore a variety of matching approaches based both on hand-tuned features such as SIFT and learned features …
Traffic Simulation Model For Port Planning And Congestion Prevention, Baoxiang Li, Kar Way Tan, Trong Khiem Tran
Traffic Simulation Model For Port Planning And Congestion Prevention, Baoxiang Li, Kar Way Tan, Trong Khiem Tran
Research Collection School Of Computing and Information Systems
Effective management of land-side transportation provides the competitive advantage to port terminal operators in improving services and efficient use of limited space in an urban port. We present a hybrid simulation model that combines traffic-flow modeling and discrete-event simulation for land-side port planning and evaluation of traffic conditions for a number of what-if scenarios. We design our model based on a real-world case of a bulk cargo port. The problem is interesting due to complexity of heterogeneous closed-looped internal vehicles and external vehicles traveling in spaces with very limited traffic regulation (no traffic lights, no traffic wardens) and the traffic …
‘Tweetboard’ – A Case Study Of Developing A Micro-Blogging Platform For Higher Education, Shao Cheh Joyce Hsu, Gan, Benjamin, Jin Lee, Shu Hui Sheryl Lim, Xie Yan Jeremy Lim, Thomas Menkhoff, Si Xian Sherman Tan, Charles Jason Woodard, Qiu Cheng Yap
‘Tweetboard’ – A Case Study Of Developing A Micro-Blogging Platform For Higher Education, Shao Cheh Joyce Hsu, Gan, Benjamin, Jin Lee, Shu Hui Sheryl Lim, Xie Yan Jeremy Lim, Thomas Menkhoff, Si Xian Sherman Tan, Charles Jason Woodard, Qiu Cheng Yap
Research Collection School Of Computing and Information Systems
This paper reports experiences made at an Asian university in developing a social media platform based on Twitter in the context of a final year capstone project where information systems management students get an opportunity to solve ‘a real-world problem for a real client’. In this case study, the challenge was provided by a faculty member’s request for an interactive social media application which engages less outspoken students in class via a social medium they are familiar with: Twitter. We reconstruct the project’s evolution; describe the main features of the application called ‘TweetBoard’ and share lessons learned in developing a …
Hashtag Recommendation With Topical Attention-Based Lstm, Yang Li, Ting Liu, Jing Jiang, Liang Zhang
Hashtag Recommendation With Topical Attention-Based Lstm, Yang Li, Ting Liu, Jing Jiang, Liang Zhang
Research Collection School Of Computing and Information Systems
Microblogging services allow users to create hashtags to categorize their posts. In recent years,the task of recommending hashtags for microblogs has been given increasing attention. However,most of existing methods depend on hand-crafted features. Motivated by the successful use oflong short-term memory (LSTM) for many natural language processing tasks, in this paper, weadopt LSTM to learn the representation of a microblog post. Observing that hashtags indicatethe primary topics of microblog posts, we propose a novel attention-based LSTM model whichincorporates topic modeling into the LSTM architecture through an attention mechanism. Weevaluate our model using a large real-world dataset. Experimental results show that …
From Footprint To Evidence: An Exploratory Study Of Mining Social Data For Credit Scoring, Guangming Guo, Feida Zhu, Enhong Chen, Qi Liu, Le Wu, Chu Guan
From Footprint To Evidence: An Exploratory Study Of Mining Social Data For Credit Scoring, Guangming Guo, Feida Zhu, Enhong Chen, Qi Liu, Le Wu, Chu Guan
Research Collection School Of Computing and Information Systems
With the booming popularity of online social networks like Twitter and Weibo, online user footprints are accumulating rapidly on the social web. Simultaneously, the question of how to leverage the large-scale user-generated social media data for personal credit scoring comes into the sight of both researchers and practitioners. It has also become a topic of great importance and growing interest in the P2P lending industry. However, compared with traditional financial data, heterogeneous social data presents both opportunities and challenges for personal credit scoring. In this article, we seek a deep understanding of how to learn users’ credit labels from social …
Domain Identification For Intention Posts On Online Social Media, Thai Le Luong, Quoc Tuan Truong, Hai-Trieu Dang, Xuan Hieu Phan
Domain Identification For Intention Posts On Online Social Media, Thai Le Luong, Quoc Tuan Truong, Hai-Trieu Dang, Xuan Hieu Phan
Research Collection School Of Computing and Information Systems
Today, more and more Internet users are willing to share their feeling, activities, and even their intention about what they plan to do on online social media. We can easily see posts like "I plan to buy an apartment this year", or "We are looking for a tour for 3 people to Nha Trang" on online forums or social networks. Recognizing those user intents on online social media is really useful for targeted advertising. However fully understanding user intents is a complicated and challenging process which includes three major stages: user intent filtering, intent domain identification, and intent parsing and …