Open Access. Powered by Scholars. Published by Universities.®
Social and Behavioral Sciences Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- California State University, Monterey Bay (535)
- Selected Works (171)
- University of Pennsylvania Carey Law School (85)
- Embry-Riddle Aeronautical University (54)
- University of Colorado Law School (53)
-
- Singapore Management University (52)
- Duke Law (43)
- US Army War College (39)
- University of Nebraska - Lincoln (39)
- Maurer School of Law: Indiana University (37)
- University of Tennessee, Knoxville (32)
- City University of New York (CUNY) (30)
- Brigham Young University (25)
- St. John's University School of Law (22)
- University of California, Irvine School of Law (22)
- Brigham Young University Law School (18)
- University at Buffalo School of Law (18)
- University of Georgia School of Law (18)
- William & Mary Law School (16)
- SIT Graduate Institute/SIT Study Abroad (15)
- University of Massachusetts Boston (15)
- University of Pittsburgh School of Law (13)
- St. John's University (12)
- Walden University (12)
- University of New Hampshire (11)
- Virginia Commonwealth University (11)
- San Jose State University (10)
- Cleveland State University (9)
- Georgetown University Law Center (9)
- Penn State Law (9)
- Keyword
-
- Agriculture (428)
- Surveys (237)
- Land grants (236)
- Land patents (236)
- Cultural resources (234)
-
- Historical resources (234)
- Land tenure (234)
- Natural resources (234)
- Early California maps (233)
- Diseños (193)
- Expediente (193)
- California ranchos (189)
- Plats (189)
- Livestock (188)
- Land use (169)
- Crop acres (164)
- Crop yield (164)
- Dairying (164)
- Gross farm return (164)
- Irrigated land (164)
- Poultry (164)
- California State lands (44)
- Groundwater (32)
- Crops (28)
- Law (28)
- Education (27)
- California agriculture (25)
- Family (23)
- Taxation (23)
- Viticulture (23)
- Publication
-
- Individual Ranchos in Monterey and SLO Counties (105)
- San Luis Obispo Crop Reports (84)
- Monterey County Crop Reports (82)
- All Faculty Scholarship (72)
- Monterey County (57)
-
- Faculty Scholarship (53)
- Research Collection Yong Pung How School Of Law (50)
- Surveyor General Reports (46)
- Neil E. Harl (45)
- The US Army War College Quarterly: Parameters (38)
- International Journal of Nuclear Security (32)
- Journal of Digital Forensics, Security and Law (31)
- Copyright, Fair Use, Scholarly Communication, etc. (28)
- US Government Legislation and Statutes (26)
- Coping with Water Scarcity in River Basins Worldwide: Lessons Learned from Shared Experiences (Martz Summer Conference, June 9-10) (25)
- TSOS Interview Gallery (25)
- California Board of Equalization Reports (23)
- The Catholic Lawyer (22)
- Annual ADFSL Conference on Digital Forensics, Security and Law (21)
- Monterey County Water Resources Agency Water Reports (20)
- Indiana Journal of Global Legal Studies (17)
- San Benito County (17)
- Georgia Journal of International & Comparative Law (15)
- Independent Study Project (ISP) Collection (14)
- San Luis Obispo County (14)
- Subfederal Government Responses (14)
- Indigenous Water Justice Symposium (June 6) (13)
- Articles (12)
- Journal of Vincentian Social Action (12)
- Miscellaneous Documents and Reports (12)
- Publication Type
Articles 1 - 30 of 1753
Full-Text Articles in Social and Behavioral Sciences
Bloom Filters Optimized Wu-Manber For Intrusion Detection, Monther Aldwairi, Koloud Al-Khamaiseh, Fatima Alharbi, Babar Shah
Bloom Filters Optimized Wu-Manber For Intrusion Detection, Monther Aldwairi, Koloud Al-Khamaiseh, Fatima Alharbi, Babar Shah
Journal of Digital Forensics, Security and Law
With increasing number and severity of attacks, monitoring ingress and egress network traffic is becoming essential everyday task. Intrusion detection systems are the main tools for capturing and searching network traffic for potential harm. Signature-based intrusion detection systems are the most widely used, and they simply use a pattern matching algorithms to locate attack signatures in intercepted network traffic. Pattern matching algorithms are very expensive in terms of running time and memory usage, leaving intrusion detection systems unable to detect attacks in real-time. We propose a Bloom filters optimized Wu-Manber pattern matching algorithm to speed up intrusion detection. The Bloom …
The Impact Of Md5 File Hash Collisions On Digital Forensic Imaging, Gary C. Kessler
The Impact Of Md5 File Hash Collisions On Digital Forensic Imaging, Gary C. Kessler
Journal of Digital Forensics, Security and Law
The Message Digest 5 (MD5) hash is commonly used as for integrity verification in the forensic imaging process. The ability to force MD5 hash collisions has been a reality for more than a decade, although there is a general consensus that hash collisions are of minimal impact to the practice of computer forensics. This paper describes an experiment to determine the results of imaging two disks that are identical except for one file, the two versions of which have different content but otherwise occupy the same byte positions on the disk, are the same size, and have the same hash …
Leveraging The Windows Amcache.Hve File In Forensic Investigations, Bhupendra Singh, Upasna Singh
Leveraging The Windows Amcache.Hve File In Forensic Investigations, Bhupendra Singh, Upasna Singh
Journal of Digital Forensics, Security and Law
The Amcache.hve is a registry hive file that is created by Microsoft® Windows® to store the information related to execution of programs. This paper highlights the evidential potential of Amcache.hve file and its application in the area of user activity analysis. The study uncovers numerous artifacts retained in Amcache.hve file when a user performs certain actions such as running host-based applications, installation of new applications, or running portable applications from external devices. The results of experiments demonstrate that Amcache.hve file stores intriguing artifacts related to applications such as timestamps of creation and last modification of any application; name, description, publisher …
The 2016 Analysis Of Information Remaining On Computer Hard Disks Offered For Sale On The Second Hand Market In The Uae, Thomas Martin, Andy Jones, Mohammed Alzaabi
The 2016 Analysis Of Information Remaining On Computer Hard Disks Offered For Sale On The Second Hand Market In The Uae, Thomas Martin, Andy Jones, Mohammed Alzaabi
Journal of Digital Forensics, Security and Law
This research describes our survey of data remaining on computer hard disks sold on the second hand market in the United Arab Emirates (UAE). This is a repetition of the first survey conducted in 2012 (Jones, Martin, & Alzaabi, 2012). Similar studies have been carried over the last ten years in the United Kingdom, Australia, USA, Germany and France: (Jones, Mee, Meyler, & Gooch, 2005), (Jones, Valli, Sutherland, & Thomas, 2006), (Jones, Valli, Dardick, & Sutherland, 2008), (Jones, Valli, Dardick, & Sutherland, 2009). This research was undertaken to gain insight into the volumes of data found on second-hand disks purchased …
A New Distributed Chinese Wall Security Policy Model, Saad Fehis, Omar Nouali, Mohand-Tahar Kechadi
A New Distributed Chinese Wall Security Policy Model, Saad Fehis, Omar Nouali, Mohand-Tahar Kechadi
Journal of Digital Forensics, Security and Law
The application of the Chinese wall security policy model (CWSPM) to control the information flows between two or more competing and/or conflicting companies in cloud computing (Multi-tenancy) or in the social network, is a very interesting solution. The main goal of the Chinese Wall Security Policy is to build a wall between the datasets of competing companies, and among the system subjects. This is done by the applying to the subjects mandatory rules, in order to control the information flow caused between them. This problem is one of the hottest topics in the area of cloud computing (as a distributed …
The Impact Of Sha-1 File Hash Collisions On Digital Forensic Imaging: A Follow-Up Experiment, Gary C. Kessler
The Impact Of Sha-1 File Hash Collisions On Digital Forensic Imaging: A Follow-Up Experiment, Gary C. Kessler
Journal of Digital Forensics, Security and Law
A previous paper described an experiment showing that Message Digest 5 (MD5) hash collisions of files have no impact on integrity verification in the forensic imaging process. This paper describes a similar experiment applied when two files have a Secure Hash Algorithm (SHA-1) collision.
A Survey Of Social Network Forensics, Umit Karabiyik, Muhammed Abdullah Canbaz, Ahmet Aksoy, Tayfun Tuna, Esra Akbas, Bilal Gonen, Ramazan S. Aygun
A Survey Of Social Network Forensics, Umit Karabiyik, Muhammed Abdullah Canbaz, Ahmet Aksoy, Tayfun Tuna, Esra Akbas, Bilal Gonen, Ramazan S. Aygun
Journal of Digital Forensics, Security and Law
Social networks in any form, specifically online social networks (OSNs), are becoming a part of our everyday life in this new millennium especially with the advanced and simple communication technologies through easily accessible devices such as smartphones and tablets. The data generated through the use of these technologies need to be analyzed for forensic purposes when criminal and terrorist activities are involved. In order to deal with the forensic implications of social networks, current research on both digital forensics and social networks need to be incorporated and understood. This will help digital forensics investigators to predict, detect and even prevent …
Nuclear Power: Black Sky Liability Or Black Sky Asset?, Sherrell R. Greene
Nuclear Power: Black Sky Liability Or Black Sky Asset?, Sherrell R. Greene
International Journal of Nuclear Security
Ready access to abundant electricity is a key enabler of modern life. During the past decade the vulnerability of Critical Infrastructure sectors in the U.S. to a variety of natural hazards and man-made threats has become increasingly apparent. The electrical infrastructure (the “Grid”) is the foundation for all other critical civil infrastructures upon which our society depends. Therefore, protection of the Grid is an energy security, homeland security, and national security issue of highest importance. Geomagnetic disturbances (GMD) induced by solar coronal mass ejections (CMEs), electromagnetic pulse (EMP) attacks, and cyber attacks are three events having the potential to plunge …
Student Competition Cover
International Journal of Nuclear Security
No abstract provided.
Improving Nuclear Safety, Security, And Nonproliferation In Northeast Asia Through Multinational Approach, Viet Phuong Nguyen
Improving Nuclear Safety, Security, And Nonproliferation In Northeast Asia Through Multinational Approach, Viet Phuong Nguyen
International Journal of Nuclear Security
No abstract provided.
Prospects For Cooperation On Tackling Nuclear And Radiological Terrorism In South Asia: India–Pakistan Nuclear Detection Architecture, Muhammad Umer Khan
Prospects For Cooperation On Tackling Nuclear And Radiological Terrorism In South Asia: India–Pakistan Nuclear Detection Architecture, Muhammad Umer Khan
International Journal of Nuclear Security
No abstract provided.
Table Of Contents
Journal of Digital Forensics, Security and Law
No abstract provided.
Implementation Of The 1995 Middle East Resolution: A Vital Lifeline To The Extension And Success Of The Non-Proliferation Treaty, Haidy Y. Ghoname, Howard Lewis Hall
Implementation Of The 1995 Middle East Resolution: A Vital Lifeline To The Extension And Success Of The Non-Proliferation Treaty, Haidy Y. Ghoname, Howard Lewis Hall
International Journal of Nuclear Security
This study highlights the core non-proliferation dilemmas we face and suggests an effective mechanism for reviving the spirit and the hope of the Non-Proliferation Treaty. An indispensable key to the treaty calls for a rethinking of what we believe should be referred to as its four pillars: disarmament, non-proliferation, peaceful uses of nuclear energy, and implementation of the 1995 Middle East Resolution. We seek to contribute to the renaissance of the non-proliferation regime by addressing seven dilemmas that arise from the way various Non-Proliferation Treaty participants pursue the goals of the four pillars undergirding the treaty. This study highlights …
Evaluation Of Covert Plutonium Production From Unconventional Uranium Sources, Ondrej Chvala, Steven Skutnik, Tyrone Christopher Harris, Emily Anne Frame
Evaluation Of Covert Plutonium Production From Unconventional Uranium Sources, Ondrej Chvala, Steven Skutnik, Tyrone Christopher Harris, Emily Anne Frame
International Journal of Nuclear Security
The potential for a relatively non-advanced nation to covertly acquire a significant quantity of weapons-grade plutonium using a gas-cooled, natural uranium-fueled reactor based on relatively primitive early published designed is evaluated in this article. The economic and technical issues that would influence the design decisions of a covert 239Pu production program are considered.
Several unconventional uranium acquisition approaches were explored. Methods for extracting uranium from enrichment tails, seawater, and coal ash sources were considered. The evaluation indicated that uranium extraction from coal ash or insitu leaching from underground deposits could be performed in economical manner that might be difficult …
Janus Realized: The Use Of Social Media As A Means Of Transparency Nuclear Communication To The Public, Frances Bachstein
Janus Realized: The Use Of Social Media As A Means Of Transparency Nuclear Communication To The Public, Frances Bachstein
International Journal of Nuclear Security
No abstract provided.
Addressing The Tunnel Threat At Nuclear Facilities: A Case Study, Md. Mobasher Ahmed
Addressing The Tunnel Threat At Nuclear Facilities: A Case Study, Md. Mobasher Ahmed
International Journal of Nuclear Security
No abstract provided.
Mending Invisible Wounds: The Efficacy And Legality Of Mdma-Assisted Psychotherapy In United States' Veterans Suffering With Post-Traumatic Stress Disorder, Jonathan Perry
Journal of Law and Health
Though Veteran Affairs has provided crucial life sustaining—and often lifesaving—treatments to returning soldiers, the substantial and ever-increasing rates of veteran suicides, drug addictions, and criminal behavior indicate a need for broader options in treatment. One of the most profound discoveries uncovered through MDMA-assisted psychotherapy research is MDMA’s facilitation of the alleviation of addictive behavior in subjects, and, as a result, an alleviation of addictions in general. Addiction is one of the key symptoms of post-traumatic stress disorder (PTSD) and drug abuse plays a large role in the other afflictions suffered by veterans, namely criminal activity and a high rate of …
Developing Countries In An Age Of Transparency And Disclosure, Diane Ring
Developing Countries In An Age Of Transparency And Disclosure, Diane Ring
BYU Law Review
No abstract provided.
Letter From The Editor
International Journal of Nuclear Security
No abstract provided.
Legal And Regulatory Framework Of Nuclear Security In Indonesia, Dahlia Cakrawati Sinaga
Legal And Regulatory Framework Of Nuclear Security In Indonesia, Dahlia Cakrawati Sinaga
International Journal of Nuclear Security
Nuclear security is one of the most important topics for regulatory purposes in Indonesia. Nuclear security measures exist to prevent, detect, and respond to unauthorized removal of radioactive material and the sabotage of nuclear and radiation facilities. Indonesia participates in bilateral and multilateral cooperation and international events such as the Nuclear Security Summit. Indonesia has also ratified several international instruments related to nuclear security. Based on commitment to international events and ratification, Indonesia has developed nuclear security infrastructures by strengthening legislation and regulation, enhancing building capacity, and strengthening equipment and facilities. Badan Pengawas Tenaga Nuklir (BAPETEN) is Indonesia’s nuclear energy …
Modified Fault Tree Method For Vulnerability Analysis Of Nuclear Medicine Facility Security System Case Study: Radiotherapy Facility, Sardjito General Hospital, Haryono Budi Santosa
Modified Fault Tree Method For Vulnerability Analysis Of Nuclear Medicine Facility Security System Case Study: Radiotherapy Facility, Sardjito General Hospital, Haryono Budi Santosa
International Journal of Nuclear Security
Assessing the vulnerability of physical protection systems (PPS) in nuclear medicine facilities is needed to prevent a security incident that could lead to the malicious use of nuclear material. Theft and sabotage of nuclear materials is becoming globally recognized. The current methods of assessing vulnerability tend to be oriented toward complex nuclear security; consequently, it is excessive to use such methods in simple facilities (i.e., radiotherapy facilities in hospitals).
The fault tree analysis is a method to assess vulnerability for a simple nuclear facility. The method’s primary events (i.e., basic events and undeveloped events) are able to accommodate fault causes …
Nuclear Security Culture And Batan’S Assessment: Batan’S Experience, Anhar R. Antariksawan
Nuclear Security Culture And Batan’S Assessment: Batan’S Experience, Anhar R. Antariksawan
International Journal of Nuclear Security
Organizations should increase safety to minimize the harmful effects of nuclear materials. Additionally, organizations should take measures to protect security culture within the organization itself. This paper covers the National Nuclear Energy Agency of Indonesia’s (BATAN’s) promotion of nuclear security culture and self- assessment projects, which is based on the International Atomic Energy Agency’s (IAEA) methodology.
Opportunities And Challenges In Developing Nuclear Security In Africa, James Larkin Mfr
Opportunities And Challenges In Developing Nuclear Security In Africa, James Larkin Mfr
International Journal of Nuclear Security
Those involved in nuclear security recognize that regions of significant instability in Africa have an impact on the safety and security of the continent's nuclear material and un-enriched uranium; however, some countries outside of continental Africa have taken counterproductive approaches to this issue. Despite challenges, the nuclear security community continues to develop and apply appropriate levels of nuclear security where needed. The community also takes every opportunity to make significant contributions to the global discourse on nuclear security culture.
From The Editor’S Desk
International Journal of Nuclear Security
No abstract provided.
Nuclear Security Risk Analysis: An Insider-Outsider Collusion Scenario, Mohammad A. Hawila, Sunil S. Chirayath
Nuclear Security Risk Analysis: An Insider-Outsider Collusion Scenario, Mohammad A. Hawila, Sunil S. Chirayath
International Journal of Nuclear Security
This study analyses the vulnerability of the physical protection system (PPS) deployed at a hypothetical facility. The PPS is designed to prevent and eliminate threats to nuclear materials and facilities. The analysis considers possible outsider and insider threats. A modified adversary sequence diagram (ASD) evaluates threat pathways to test an insider-outsider collusion case. The ASD also measures the probability of adversary interruption by demonstrating the methodology for a typical nuclear facility.
Economic Integration: Formation Of The Economic Organization Of West African States, A Customs Union And Free Trade Area For Regional Development, Andrew H. Ernst
Economic Integration: Formation Of The Economic Organization Of West African States, A Customs Union And Free Trade Area For Regional Development, Andrew H. Ernst
Georgia Journal of International & Comparative Law
No abstract provided.
Trade, Most-Favored-Nation Status: The 1975 Agreement With Romania On Trade Relations, Thad W. Simons Jr.
Trade, Most-Favored-Nation Status: The 1975 Agreement With Romania On Trade Relations, Thad W. Simons Jr.
Georgia Journal of International & Comparative Law
No abstract provided.
Deepwater Port Act Of 1974: Some International And Environmental Implications, James H. Gnann Jr.
Deepwater Port Act Of 1974: Some International And Environmental Implications, James H. Gnann Jr.
Georgia Journal of International & Comparative Law
No abstract provided.