Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

55,572 Full-Text Articles 72,682 Authors 23,183,657 Downloads 378 Institutions

All Articles in Computer Sciences

Faceted Search

55,572 full-text articles. Page 1585 of 2025.

Forensic Examination And Analysis Of The Prefetch Files On The Banking Trojan Malware Incidents, Andri P. Heriyanto 2014 Edith Cowan University

Forensic Examination And Analysis Of The Prefetch Files On The Banking Trojan Malware Incidents, Andri P. Heriyanto

Australian Digital Forensics Conference

Whenever a program runs within the operating system, there will be data or artefacts created on the system. This condition applies to the malicious software (malware). Although they intend to obscure their presence on the system with anti-forensic techniques, still they have to run on the victim’s system to acquire their objective. Modern malware creates a significant challenge to the digital forensic community since they are being designed to leave limited traces and misdirect the examiner. Therefore, every examiner should consider performing all the forensics approaches such as memory forensic, live-response and Windows file analysis in the related malware incidents …


A Forensically-Enabled Iaas Cloud Computing Architecture, Saad Alqahtany, Nathan Clarke, Steven Furnell, Christoph Reich 2014 Plymouth University

A Forensically-Enabled Iaas Cloud Computing Architecture, Saad Alqahtany, Nathan Clarke, Steven Furnell, Christoph Reich

Australian Digital Forensics Conference

Current cloud architectures do not support digital forensic investigators, nor comply with today’s digital forensics procedures largely due to the dynamic nature of the cloud. Whilst much research has focused upon identifying the problems that are introduced with a cloud-based system, to date there is a significant lack of research on adapting current digital forensic tools and techniques to a cloud environment. Data acquisition is the first and most important process within digital forensics – to ensure data integrity and admissibility. However, access to data and the control of resources in the cloud is still very much provider-dependent and complicated …


Up-Dating Investigation Models For Smart Phone Procedures, Brian Cusack, Raymond Lutui 2014 Auckland University of Technology

Up-Dating Investigation Models For Smart Phone Procedures, Brian Cusack, Raymond Lutui

Australian Digital Forensics Conference

The convergence of services in Smart Technologies such as iPhones, Androids and multiple tablet work surfaces challenges the scope of any forensic investigation to include cloud environments, devices and service media. The analysis of current investigation guidelines suggests that each element in an investigation requires an independent procedure to assure the preservation of evidence. However we dispute this view and review the possibility of consolidating current investigation guidelines into a unified best practice guideline. This exploratory research proposes to fill a gap in digital forensic investigation knowledge for smart technologies used in business environments and to propose a better way …


Rapid Forensic Crime Scene Analysis Using Inexpensive Sensors, Dan Blackman 2014 Edith Cowan University, Western Australia Police

Rapid Forensic Crime Scene Analysis Using Inexpensive Sensors, Dan Blackman

Australian Digital Forensics Conference

Network forensics and Network Intrusion Detection Systems (NIDS) have ultimately become so important to corporations that in many cases they have been relied upon to identify the actions of offenders and to provide sufficient details to prosecute them. Unfortunately, as data links on corporate networks have increased to saturation, more information is being missed and even though corporations have spent heavily acquiring loud, power hungry devices to monitor their networks. A more power efficient solution, which consumes less electricity, yet provides the same or better packet inspection is an obvious solution.. This paper discusses a possible solution using a cluster …


Listening To Botnet Communication Channels To Protect Information Systems, Brian Cusack, Sultan Almutairi 2014 Auckland University of Technology

Listening To Botnet Communication Channels To Protect Information Systems, Brian Cusack, Sultan Almutairi

Australian Digital Forensics Conference

Botnets are a weapon of choice for people who wish to exploit information systems for economic advantage. A large percentage of high value commercial targets such as banking transaction systems and human customers are web connected so that access is gained through Internet services. A Botnet is designed to maximise the possibility of an economic success through the low cost of attacks and the high number that may be attempted in any small time unit. In this paper we report exploratory research into the communications of Botnets. The research question was: How do Botnets talk with the command and control …


Securing Identity Information With Image Watermarks, Brian Cusack, Reza Khaleghparas 2014 Auckland University of Technology

Securing Identity Information With Image Watermarks, Brian Cusack, Reza Khaleghparas

Australian Information Security Management Conference

In this paper, we describe the requirements for embedding watermarks in images used for identity verification and demonstrate a proof of concept in security sciences. The watermarking application is designed for verifying the rightful ownership of a driving license or similar identity object. The tool we built and tested embeds and extracts watermarks that contain verification information of the rightful owner. We used the human finger print of the rightful owner as the watermark. Such information protection mechanisms add an extra layer of security to the information system and improve verification of identification attributes by providing strong security. The issues …


The Impact Of Social Constructivism On Erp Systems Security: A Critical Social Review, Kennedy Njenga 2014 University of Johannesburg

The Impact Of Social Constructivism On Erp Systems Security: A Critical Social Review, Kennedy Njenga

Australian Information Security Management Conference

Little is understood about the effects of social constructivism that shapes conflicting concerns regarding Enterprise Resource Planning (ERP) security and usability during implementation. This work looks at social constructivism as produced and reproduced by stakeholders in the ERP systems implementation phase. Social constructivism is characterised by the embedded trade-off for usability, espoused by end-user and security, espoused by developers. Social constructivism was conceptualised qualitatively from a selected case study. Critical Social Theory (CST) was used as the theoretical lens. Stakeholders concerned with ERP security aspects in the implementation phase were interviewed and data transcribed and interpreted. Hermeneutical interpretation was applied …


Persistent Issues In Encryption Software: A Heuristic And Cognitive Walkthrough, Jad El-Abed, Patryk Szewczyk 2014 Edith Cowan University

Persistent Issues In Encryption Software: A Heuristic And Cognitive Walkthrough, Jad El-Abed, Patryk Szewczyk

Australian Information Security Management Conference

The support information accompanying security software can be difficult to understand by end-users, who have little knowledge in cyber security. One mechanism for ensuring the integrity and confidentiality of information is encryption software. Unfortunately, software usability issues can hinder an end-user’s capability to properly utilise the security features effectively. To date there has been little research in investigating the usability of encryption software and proposing solutions for improving them. This research paper analysed the usability of encryption software targeting end-users. The research identified several issues that could impede the ability of a novice end-user to adequately utilise the encryption software. …


15th Australian Information Warfare Conference, 2014, Edith Cowan University - Conference Details, Security Research Institute, Edith Cowan University 2014 Edith Cowan University

15th Australian Information Warfare Conference, 2014, Edith Cowan University - Conference Details, Security Research Institute, Edith Cowan University

Australian Information Warfare and Security Conference

No abstract provided.


Graph-Ene, James E. Torres 2014 Rhode Island College

Graph-Ene, James E. Torres

Honors Projects

GRAPH-ENE is a rich internet application for building and manipulating undirected, simple graphs. It is intended for use as a classroom teaching aid, plus as a tool for students to interactively manipulate graphs for assignments. Being web based, it is portable—it can run anywhere a browser is available. Since it is interactive, it provides problem-solving capabilities that are not available using pencil and paper.


Do Groups Matter? An Agent-Based Modeling Approach To Pedestrian Egress, Andrew Collins, Terra Elzie, Erika Frydenlund, R. Michael Robinson 2014 Old Dominion University

Do Groups Matter? An Agent-Based Modeling Approach To Pedestrian Egress, Andrew Collins, Terra Elzie, Erika Frydenlund, R. Michael Robinson

VMASC Publications

Festivals in city parks attended by individuals and families are a universal feature of urban life. These venues often have the common attributes of vendors and other obstacles that restrict pedestrian movement through certain areas, as well as fixed number of exits. In this study, the authors build an agent-based model (ABM) that incorporates group cohesion forces into this type of pedestrian egress scenario. The scenario considered was an evacuation of 500 people through a single exit. This allowed an investigation into the use of two different simulated pedestrian's heading updating rules.


Proceedings Of The 1st Annual Cuny Games Festival, Robert O. Duncan, Joe Bisz, Francesco Crocco, Carlos Hernandez, Kathleen Offenholley, Leah Potter, Maura A. Smale, CUNY Games Network 2014 CUNY York College

Proceedings Of The 1st Annual Cuny Games Festival, Robert O. Duncan, Joe Bisz, Francesco Crocco, Carlos Hernandez, Kathleen Offenholley, Leah Potter, Maura A. Smale, Cuny Games Network

Publications and Research

Proceedings of the CUNY Games Conference, held from January 17-18, 2014, at the CUNY Graduate Center and Borough of Manhattan Community College.

Topics in Game Design - Teaching with Virtual and Augmented Realities - Writing with Games - Breaking the Magic Circle: Games & Real Life - Interactive Game Design (What's Your Game Plan? - Designing Ethical Games - Games and Gender - Gaming English Language and Literature - Game, Narrative, Literacy - Teaching with Games - Games, Storytelling, and Narrative - Games and STEM - Learning by Design - Students as Game Designers - Experiencing Reality in Popular Games …


Information In Biological Systems And The Fluctuation Theorem, Yaşar Demirel 2014 University of Nebraska-Lincoln

Information In Biological Systems And The Fluctuation Theorem, Yaşar Demirel

Department of Chemical and Biomolecular Engineering: Faculty Publications

Some critical trends in information theory, its role in living systems and utilization in fluctuation theory are discussed. The mutual information of thermodynamic coupling is incorporated into the generalized fluctuation theorem by using information theory and nonequilibrium thermodynamics. Thermodynamically coupled dissipative structures in living systems are capable of degrading more energy, and processing complex information through developmental and environmental constraints. The generalized fluctuation theorem can quantify the hysteresis observed in the amount of the irreversible work in nonequilibrium regimes in the presence of information and thermodynamic coupling.


Three Essays On Social/Political Structures And Icts Use, Seungeui Ryu 2014 University of Texas at El Paso

Three Essays On Social/Political Structures And Icts Use, Seungeui Ryu

Open Access Theses & Dissertations

My research identifies how social structures affect the use of the Internet and/or a mobile chat application and how the Internet impacts the political structure of a nation. In my first essay of the 3-essay Dissertation, I am designing three models based on social structure theory that are used to study the Internet and a popular mobile chat application's use by managers in South Korea, with the help of a survey instrument. In my first essay, the contribution is on i) testing a model of manager's personal behavior on Information and Communication Technology (ICT) use at the individual level involving …


Using User Saliency For Effective Oled Display Power Management, Kiat Wee TAN 2014 Singapore Management University

Using User Saliency For Effective Oled Display Power Management, Kiat Wee Tan

Dissertations and Theses Collection (Open Access)

The display component on mobile device has always been a main power drain compared to networking and processing components. Even with advancement in display technology such as Organic Light Emitting Diodes (OLED) displays to help reduce this cost, the increasing display size and new mobile usage paradigm (App stores and Social networking), the display still remains as the largest power drain component. In this thesis, we describe an approach to reduce power consumption on OLED display by dimming areas of the screen that the user might not be interested in. We determine these uninteresting areas by reviewing large number applications …


To Outsource Web Development Or Not: A Small Automotive Company Considers Search Engine Marketing, Martine Robinson Beachboard, John C. Beachboard 2014 Idaho State University

To Outsource Web Development Or Not: A Small Automotive Company Considers Search Engine Marketing, Martine Robinson Beachboard, John C. Beachboard

All Works

No abstract provided.


Windows Surface Rt Tablet Forensics, Asif Iqbal, Hanan Al Obaidli, Andrew Marrington, Andy Jones 2014 Zayed University

Windows Surface Rt Tablet Forensics, Asif Iqbal, Hanan Al Obaidli, Andrew Marrington, Andy Jones

All Works

Small scale digital device forensics is particularly critical as a result of the mobility of these devices, leading to closer proximity to crimes as they occur when compared to computers. The Windows Surface tablet is one such device, combining tablet mobility with familiar Microsoft Windows productivity tools. This research considers the acquisition and forensic analysis of the Windows Surface RT tablet. We discuss the artifacts of both the Windows RT operating system and third-party applications. The contribution of this research is to provide a road map for the digital forensic examination of Windows Surface RT tablets.


Hidden Markov Model With Information Criteria Clustering And Extreme Learning Machine Regression For Wind Forecasting, Dao Lam, Shuhui Li, Donald C. Wunsch 2014 Missouri University of Science and Technology

Hidden Markov Model With Information Criteria Clustering And Extreme Learning Machine Regression For Wind Forecasting, Dao Lam, Shuhui Li, Donald C. Wunsch

Electrical and Computer Engineering Faculty Research & Creative Works

This paper proposes a procedural pipeline for wind forecasting based on clustering and regression. First, the data are clustered into groups sharing similar dynamic properties. Then, data in the same cluster are used to train the neural network that predicts wind speed. For clustering, a hidden Markov model (HMM) and the modified Bayesian information criteria (BIC) are incorporated in a new method of clustering time series data. to forecast wind, a new method for wind time series data forecasting is developed based on the extreme learning machine (ELM). the clustering results improve the accuracy of the proposed method of wind …


Preliminary Forensic Analysis Of The Xbox One, Jason Moore, Ibrahim Baggili, Andrew Marrington, Armindo Rodrigues 2014 University of New Haven

Preliminary Forensic Analysis Of The Xbox One, Jason Moore, Ibrahim Baggili, Andrew Marrington, Armindo Rodrigues

All Works

Video game consoles can no longer be viewed as just gaming consoles but rather as full multimedia machines, capable of desktop computer-like performance. The past has shown that game consoles have been used in criminal activities such as extortion, identity theft, and child pornography, but with their ever-increasing capabilities, the likelihood of the expansion of criminal activities conducted on or over the consoles increases. This research aimed to take the initial step of understanding the Xbox One, the most powerful Microsoft console to date. We report the outcome of conducting a forensic examination of the Xbox One, and we provide …


Performance Modeling And Optimization Techniques For Heterogeneous Computing, Supada Laosooksathit 2014 Louisiana Tech University

Performance Modeling And Optimization Techniques For Heterogeneous Computing, Supada Laosooksathit

Doctoral Dissertations

Since Graphics Processing Units (CPUs) have increasingly gained popularity amoung non-graphic and computational applications, known as General-Purpose computation on GPU (GPGPU), CPUs have been deployed in many clusters, including the world's fastest supercomputer. However, to make the most efficiency from a GPU system, one should consider both performance and reliability of the system.

This dissertation makes four major contributions. First, the two-level checkpoint/restart protocol that aims to reduce the checkpoint and recovery costs with a latency hiding strategy in a system between a CPU (Central Processing Unit) and a GPU is proposed. The experimental results and analysis reveals some benefits, …


Digital Commons powered by bepress