Open Access. Powered by Scholars. Published by Universities.®

Social and Behavioral Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics

Conference

2009

Institution
Keyword
Publication
File Type

Articles 1 - 21 of 21

Full-Text Articles in Social and Behavioral Sciences

Data Mining: Assessment Of Features Quality Of Class Discrimination Using Arif Index And Its Application To Physiological Datasets, Dr. Muhammad Arif, A. Fida Aug 2009

Data Mining: Assessment Of Features Quality Of Class Discrimination Using Arif Index And Its Application To Physiological Datasets, Dr. Muhammad Arif, A. Fida

International Conference on Information and Communication Technologies

Quality of features determines the maximum achievable accuracy by any arbitrary classifier in pattern classification problem. In this paper, we have proposed an index that can assess the quality of features in discrimination of patterns in different classes. This index is in-sensitive to the complexity of boundary separating different classes if there is no overlap among features of different classes. Proposed index is model free and requires no clustering algorithm to discover the clustering structure present in the feature space. It is only based on the information of local neighborhood of feature vectors in the feature space. This index can …


Nshe's Nevada Renewable Energy Consortium, Steve Wells Aug 2009

Nshe's Nevada Renewable Energy Consortium, Steve Wells

UNLV Renewable Energy Symposium

The 3rd Annual Renewable Energy Symposium took place on the UNLV campus August 11 & 12. The event focused on renewable energy production in Nevada, the US Southwest, and renewable research projects nationwide. The event was a great success with over 200 individuals in attendance


Education And Energy Innovation: Nshe’S Central Role In Transforming Nevada’S Economy, James Croce Aug 2009

Education And Energy Innovation: Nshe’S Central Role In Transforming Nevada’S Economy, James Croce

UNLV Renewable Energy Symposium

The 3rd Annual Renewable Energy Symposium took place on the UNLV campus August 11 & 12. The event focused on renewable energy production in Nevada, the US Southwest, and renewable research projects nationwide. The event was a great success with over 200 individuals in attendance.


Nevada’S Changing Renewable Energy Landscape, Kathleen Drakulich Aug 2009

Nevada’S Changing Renewable Energy Landscape, Kathleen Drakulich

UNLV Renewable Energy Symposium

The 3rd Annual Renewable Energy Symposium took place on the UNLV campus August 11 & 12. The event focused on renewable energy production in Nevada, the US Southwest, and renewable research projects nationwide. The event was a great success with over 200 individuals in attendance.


Clean-Energy Policy Community Town Hall: Part A, Al Gore, Harry Reid, T. Boone Pickens, Cathy Zoi Aug 2009

Clean-Energy Policy Community Town Hall: Part A, Al Gore, Harry Reid, T. Boone Pickens, Cathy Zoi

National Clean Energy Summit

Moderator: John D. Podesta, President & CEO, Center for American Progress Action Fund


Special Remarks By President Bill Clinton, Bill Clinton Aug 2009

Special Remarks By President Bill Clinton, Bill Clinton

National Clean Energy Summit

Special remarks by President Bill Clinton


Roundtable: Building The Clean-Energy Economy: Part B, Neal Smatresk, Harry Reid, Al Gore, John D. Podesta Aug 2009

Roundtable: Building The Clean-Energy Economy: Part B, Neal Smatresk, Harry Reid, Al Gore, John D. Podesta

National Clean Energy Summit

Moderator: Tim Wirth, Former Colorado Senator, United Nations Foundation


2009 National Clean Energy Summit Event Video Highlights And Press Tour Photos Aug 2009

2009 National Clean Energy Summit Event Video Highlights And Press Tour Photos

National Clean Energy Summit

Video highlights & press tour photos


Cybercrime And The 2012 London Olympics, Denis Edgar-Nevill May 2009

Cybercrime And The 2012 London Olympics, Denis Edgar-Nevill

Annual ADFSL Conference on Digital Forensics, Security and Law

The London 2012 Olympics is just three years away and the clock is ticking to put in place plans get it right. The potential for cybercrime to cause harm during this event is very great; harm to national reputation, harm to the reputation to the Olympic movement, and harm to individuals competing, watching or officiating. This paper considers the need to address these risks by taking a look at what has happened in the past at sporting events and the rising wave of electronic security threats and fraud facilitated by computers at recent Olympics. The problems for law enforcement are …


Methodology For Investigating Individuals Online Social Networking Persona, Jonathan T. Rajewski May 2009

Methodology For Investigating Individuals Online Social Networking Persona, Jonathan T. Rajewski

Annual ADFSL Conference on Digital Forensics, Security and Law

When investigators from either the private or public sector review digital data surrounding a case for evidentiary value, they typically conduct a systematic categorization process to identify the relevant digital devices. Armed with the proper methodology to accomplish this task, investigators can quickly recognize the appropriate digital devices for forensic processing and review. This paper purposes a methodology for investigating an individual’s online social networking persona.

Keywords: Social Networking, Web 2.0, Internet Investigations, Online Social Networking Community


Bluetooth Hacking: A Case Study, Dennis Browning, Gary C. Kessler May 2009

Bluetooth Hacking: A Case Study, Dennis Browning, Gary C. Kessler

Annual ADFSL Conference on Digital Forensics, Security and Law

This paper describes a student project examining mechanisms with which to attack Bluetooth-enabled devices. The paper briefly describes the protocol architecture of Bluetooth and the Java interface that programmers can use to connect to Bluetooth communication services. Several types of attacks are described, along with a detailed example of two attack tools, Bloover II and BT Info.

Keywords: Bluetooth hacking, mobile phone hacking, wireless hacking


Concerning File Slack, Stephen P. Larson May 2009

Concerning File Slack, Stephen P. Larson

Annual ADFSL Conference on Digital Forensics, Security and Law

In this paper we discuss the phenomena known as file slack. File slack is created each time a file is created on a hard disk, and can contain private or confidential data. Unfortunately, the methods used by Microsoft Windows operating systems to organize and save files require file slack, and users have no control over what data is saved in file slack. This document will help create awareness about the security issue of file slack and discuss research results concerning file slack.

Keywords : Computer Forensics, File Slack, Ram Slack, Disk Slack


The Computer Fraud And Abuse Act And The Law Of Unintended Consequences, Milton Luoma, Vicki Luoma May 2009

The Computer Fraud And Abuse Act And The Law Of Unintended Consequences, Milton Luoma, Vicki Luoma

Annual ADFSL Conference on Digital Forensics, Security and Law

One of the most unanticipated results of the Computer Fraud and Abuse Act arose from the law of unintended consequences. The CFAA was originally enacted in 1984 to protect federal government computers from intrusions and damage caused by hackers, identity thieves, and other cyber criminals. The law was later amended to extend the scope of its application to financial institutions’, business’s and consumers’ computers. To aid in the pursuit of cyber criminals, one of the subsequent revisions to the law included provision “G” that gave the right to private parties to seek compensation for damages in a civil action for …


Why Are We Not Getting Better At Data Disposal?, Andy Jones May 2009

Why Are We Not Getting Better At Data Disposal?, Andy Jones

Annual ADFSL Conference on Digital Forensics, Security and Law

This paper describes two sets of research, the first of which has been carried out over a period of four years into the levels and types of information that can be found on computer hard disks that are offered for sale on the second hand market. The second research project examined a number of second-hand hand held devices including PDAs, mobile (cell) phones and RIM Blackberry devices. The primary purpose of this research was to gain an understanding of the reasons for the failure to effectively remove potentially sensitive information from the disks and handheld devices. Other objectives included determining …


Don’T Touch That! And Other E-Discovery Issues, Linda Volonino May 2009

Don’T Touch That! And Other E-Discovery Issues, Linda Volonino

Annual ADFSL Conference on Digital Forensics, Security and Law

The ability to preserve and access electronically stored information (ESI) took on greater urgency when amendments to the Federal Rules of Civil Procedure went into effect in December 2006. These amendments, referred to as the electronic discovery (e-discovery) amendments, focus on the discovery phase of civil litigation, audits, or investigations. Discovery is the investigative phase of a legal case when opponents learn what evidence is available and how accessible it is. When ESI is the subject of discovery, it is called e-discovery. Recognizing that most business and personal records and communications are electronic, Judge Shira A. Scheindlin stated, "We used …


Analysis Of The ‘Db’ Windows Registry Data Structure, Damir Kahvedžić, Tahar Kechadi May 2009

Analysis Of The ‘Db’ Windows Registry Data Structure, Damir Kahvedžić, Tahar Kechadi

Annual ADFSL Conference on Digital Forensics, Security and Law

The Windows Registry stores a wide variety of data representing a host of different user properties, settings and program information. The data structures used by the registry are designed to be adaptable to store these differences in a simple format. In this paper we will highlight the existence of a rare data structure that is used to store a large amount of data within the registry hives. We analyse the manner in which this data structure stores its data and the implications that it may have on evidence retrieval and digital investigation. In particular, we reveal that the three of …


Correlating Orphaned Windows Registry Data Structures, Damir Kahvedžić, Tahar Kechadi May 2009

Correlating Orphaned Windows Registry Data Structures, Damir Kahvedžić, Tahar Kechadi

Annual ADFSL Conference on Digital Forensics, Security and Law

Recently, it has been shown that deleted entries of the Microsoft Windows registry (keys) may still reside in the system files once the entries have been deleted from the active database. Investigating the complete keys in context may be extremely important from both a Forensic Investigation point of view and a legal point of view where a lack of context can bring doubt to an argument. In this paper we formalise the registry behaviour and show how a retrieved value may not maintain a relation to the part of the registry it belonged to and hence lose that context. We …


Graduate Accounting Students' Perception Of It Forensics: A Multi-Dimensional Analysis, Grover S. Kearns May 2009

Graduate Accounting Students' Perception Of It Forensics: A Multi-Dimensional Analysis, Grover S. Kearns

Annual ADFSL Conference on Digital Forensics, Security and Law

Forensics and information technology (IT) have become increasingly important to accountants and auditors. Undergraduate accounting students are introduced to general IT topics but discussion of forensic knowledge is limited. A few schools have introduced an undergraduate major in forensic accounting. Some graduate schools offer accounting students an emphasis in forensic or fraud accounting that includes instruction in forensics and information technology. When students do not view the IT topics as being equally important to their careers as traditional accounting topics, these attitudes may reduce the quality of the course. In an effort to assess student attitudes, a survey of 46 …


Visualization Of Honeypot Data Using Graphviz And Afterglow, Craig Valli May 2009

Visualization Of Honeypot Data Using Graphviz And Afterglow, Craig Valli

Annual ADFSL Conference on Digital Forensics, Security and Law

This research in progress paper explores the use of Graphviz and Afterglow for the analysis of data emanating from a honeypot system. Honeypot systems gather a wide range of data that is often difficult to readily search for patterns and trends using conventional log file analysis techniques. The data from the honeypots has been statically extracted and processed through Afterglow scripts to produce inputs suitable for use by the DOT graph based tools contained within Graphviz. This paper explores some of the benefits and drawbacks of currently using this type of approach.

Keywords: honeypot, network forensics, visualization, Graphviz, Afterglow


Communication Across Random Landings, Kerron Joseph, Jay Walbran Mar 2009

Communication Across Random Landings, Kerron Joseph, Jay Walbran

Undergraduate Research Conference

The idea to do this project began with a simple question: Suppose that people carrying communication radios parachute out of a plane, if each device has a certain range, what is the probability that once everyone lands they will be able to communicate. To study this problem I assumed that the spot where each individual lands is normally distributed.

We discuss the different ways the communication radios can work. In particular we examine the situation where all the radios have to be within a certain radius r to operate correctly and the situation where the radios work on a relay …


Morning Concurrent Track 2: Creation And Correction Of Myths About Global Warming, Matthew S. Lachniet, Gale Sinatra, Carolanne Kardash, Gita Taasoobshirazi, Doug Lombardi, E. Michael Nussbaum Mar 2009

Morning Concurrent Track 2: Creation And Correction Of Myths About Global Warming, Matthew S. Lachniet, Gale Sinatra, Carolanne Kardash, Gita Taasoobshirazi, Doug Lombardi, E. Michael Nussbaum

Education for a Global Future: 21st Century Challenges in Sustainability & Climate Change Education

MORNING CONCURRENT TRACK 2: CREATION AND CORRECTION OF MYTHS ABOUT GLOBAL WARMING Moderator Robert Futrell Student Union Room 211 Matthew Lachniet – Global Warming Misconceptions and Myths: Barriers and Opportunities for Communicating Climate Change Science to a Non-scientific Audience Abstract: Opinions on an anthropogenic influence in global warming abound. Within the non-scientific public, the strength of one’s opinion commonly seems to be in inverse proportion to their knowledge of climate science. One reason for this disconnect between reality and opinion is the persistence of many climate change myths in popular knowledge of global warming. These myths are regularly propagated in …