Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Conference

Discipline
Institution
Keyword
Publication Year
Publication
File Type

Articles 13651 - 13680 of 16657

Full-Text Articles in Physical Sciences and Mathematics

Tracking Criminals On Facebook: A Case Study From A Digital Forensics Reu Program, Daniel Weiss, Gary Warner May 2015

Tracking Criminals On Facebook: A Case Study From A Digital Forensics Reu Program, Daniel Weiss, Gary Warner

Annual ADFSL Conference on Digital Forensics, Security and Law

The 2014 Digital Forensics Research Experience for Undergraduates (REU) Program at the University of Alabama at Birmingham (UAB) focused its summer efforts on tracking criminal forums and Facebook groups. The UAB-REU Facebook team was provided with a list of about 60 known criminal groups on Facebook, with a goal to track illegal information posted in these groups and ultimately store the information in a searchable database for use by digital forensic analysts. Over the course of about eight weeks, the UAB-REU Facebook team created a database with over 400 Facebook groups conducting criminal activity along with over 100,000 unique users …


Eastern Washington Wildfires: Tracking Land Recovery In The Colockum Tarps Wildfire Area, Michael Balda, Allison Shinn May 2015

Eastern Washington Wildfires: Tracking Land Recovery In The Colockum Tarps Wildfire Area, Michael Balda, Allison Shinn

Symposium Of University Research and Creative Expression (SOURCE)

Eastern Washington State has seen an increase in wildfire activity because of policies of fire suppression and changing climate. The Colockum Tarps wildfire started on July 27, 2013, in Malaga, Washington, due to a water pump malfunction. After ignition, the fire quickly moved south-southwest and burned a total area of 80,408 acres of grasslands and forest. We combined fieldwork and geospatial analysis of aerial photography and satellite imagery to examine vegetative recovery within the fire area. Using ArcGIS and PCI Geomatica, we analyzed 2013 National Agricultural Imaging Program (NAIP) images and a wildfire perimeter shapefile from the Bureau of Land …


Towards A Digital Forensics Competency-Based Program: Making Assessment Count, Rose Shumba May 2015

Towards A Digital Forensics Competency-Based Program: Making Assessment Count, Rose Shumba

Annual ADFSL Conference on Digital Forensics, Security and Law

This paper describes an approach that UMUC has initiated to revise its graduate programs to a Competency-Based Education (CBE) curriculum. The approach, which is Learning Demonstration (LD) centric, includes the identification of learning goals and competences, identification and description of the LDs, mapping of the LDs to the competences, scripting the LDs, placing the LDs into the respective courses, validating the developed materials, and the development of the open learning resources. Programs in the Cybersecurity and Information Assurance Department, including the Digital Forensics and Cyber Investigations program, are being revised. An LD centric approach to curriculum development helps align programs …


Phishing Intelligence Using The Simple Set Comparison Tool, Jason Britt, Alan Sprague, Gary Warner May 2015

Phishing Intelligence Using The Simple Set Comparison Tool, Jason Britt, Alan Sprague, Gary Warner

Annual ADFSL Conference on Digital Forensics, Security and Law

Phishing websites, phish, attempt to deceive users into exposing their passwords, user IDs, and other sensitive information by imitating legitimate websites, such as banks, product vendors, and service providers. Phishing investigators need fast automated tools to analyze the volume of phishing attacks seen today. In this paper, we present the Simple Set Comparison tool. The Simple Set Comparison tool is a fast automated tool that groups phish by imitated brand allowing phishing investigators to quickly identify and focus on phish targeting a particular brand. The Simple Set Comparison tool is evaluated against a traditional clustering algorithm over a month's worth …


Measured Laser Frequencies From The Optically Pumped Methanol Isotopologue 13cd3od, Benjamin Freeman May 2015

Measured Laser Frequencies From The Optically Pumped Methanol Isotopologue 13cd3od, Benjamin Freeman

Symposium Of University Research and Creative Expression (SOURCE)

The far-infrared region of the electromagnetic spectrum, informally defined as the wavelength region between 0.025 mm and 2.00 mm, is an area that has been investigated using laser radiation for more than 50 years. Research with far infrared lasers has a range of applications including terahertz imaging, a form of noninvasive imaging. Creating a catalog of far-infrared laser emissions is also beneficial for their use in high-resolution spectroscopic investigations of stable molecules and short-lived free radicals. The purpose of this research was to measure the frequencies of known far-infrared laser emissions generated by 13CD3OD, an isotopic form of methanol. This …


Investigating The Correlation Between Inclination Of Coronal Loops And Solar Flare Activity, John-Paul Mann May 2015

Investigating The Correlation Between Inclination Of Coronal Loops And Solar Flare Activity, John-Paul Mann

Symposium Of University Research and Creative Expression (SOURCE)

The purpose of this research is to investigate changes in the coronal loop structures during the life cycle of a solar flare. Coronal loops are intricate and complicated magnetic features on the solar surface that are the source of large solar flares. Understanding the dynamics of these coronal loops provides better models for predicting solar flare activity. By obtaining the magnetogram, or magnetic field strength, along with the inclination of these coronal loops, the full structure of the coronal loop can be obtained. Therefore, we studied how the coronal loops inclination angle, as it emerges from the photosphere, changes in …


Predicting Solar Sigmoid Lifetimes Based On Shearing In The Photosphere, Austen Stone May 2015

Predicting Solar Sigmoid Lifetimes Based On Shearing In The Photosphere, Austen Stone

Symposium Of University Research and Creative Expression (SOURCE)

This project’s purpose was to study how the speed at which the plasma in the photosphere of the sun affects the lifetime and shape of a solar sigmoid. Solar sigmoids are S-shaped, twisted magnetic structures that are due to the shifting magnetic field lines emerging from the surface of the sun. The photosphere is the visible layer of the sun’s surface and is made up of cells of plasma that are highly conductive and influenced by the magnetic field of the sun. Sigmoids form when shearing (a lateral shift between two objects in directions opposite each other) occurs in the …


Insect Communities: Ellensburg Upstream Versus Downstream Sites, Michael Balda May 2015

Insect Communities: Ellensburg Upstream Versus Downstream Sites, Michael Balda

Symposium Of University Research and Creative Expression (SOURCE)

Urban stream syndrome occurs when an urban area affects a stream system. Stream burial is common in urban systems, and burial blocks incoming light, potentially affecting available food resources and, in turn, affecting the insect communities. I tested for changes to the stream ecosystem as a result of urbanization by measuring insect community parameters upstream and downstream of buried sites in the three creeks in Ellensburg, Washington, that are affected by urban stream syndrome. I measured chlorophyll on rocks, total suspended sediments (TSS), fine benthic organic matter (FBOM), ammonium, and phosphorus to relate to insect communities characteristics. I hypothesized that …


Identifying Common Characteristics Of Malicious Insiders, Nan Liang, David Biros May 2015

Identifying Common Characteristics Of Malicious Insiders, Nan Liang, David Biros

Annual ADFSL Conference on Digital Forensics, Security and Law

Malicious insiders account for large proportion of security breaches or other kinds of loss for organizations and have drawn attention of both academics and practitioners. Although methods and mechanism have been developed to monitor potential insider via electronic data monitoring, few studies focus on predicting potential malicious insiders. Based on the theory of planned behavior, certain cues should be observed or expressed when an individual performs as a malicious insider. Using text mining to analyze various media content of existing insider cases, we strive to develop a method to identify crucial and common indicators that an individual might be a …


Continuous Monitoring System Based On Systems' Environment, Eli Weintraub, Yuval Cohen May 2015

Continuous Monitoring System Based On Systems' Environment, Eli Weintraub, Yuval Cohen

Annual ADFSL Conference on Digital Forensics, Security and Law

We present a new framework (and its mechanisms) of a Continuous Monitoring System (CMS) having new improved capabilities, and discuss its requirements and implications. The CMS is based on the real-time actual configuration of the system and the environment rather than a theoretic or assumed configuration. Moreover, the CMS predicts organizational damages taking into account chains of impacts among systems' components generated by messaging among software components. In addition, the CMS takes into account all organizational effects of an attack. Its risk measurement takes into account the consequences of a threat, as defines in risk analysis standards. Loss prediction is …


Html5 Zero Configuration Covert Channels: Security Risks And Challenges, Jason Farina, Mark Scanlon, Stephen Kohlmann, Nhien-An Le-Khac, Tahar Kechadi May 2015

Html5 Zero Configuration Covert Channels: Security Risks And Challenges, Jason Farina, Mark Scanlon, Stephen Kohlmann, Nhien-An Le-Khac, Tahar Kechadi

Annual ADFSL Conference on Digital Forensics, Security and Law

In recent months there has been an increase in the popularity and public awareness of secure, cloudless file transfer systems. The aim of these services is to facilitate the secure transfer of files in a peer-to-peer (P2P) fashion over the Internet without the need for centralized authentication or storage. These services can take the form of client installed applications or entirely web browser based interfaces. Due to the P2P nature, there is generally no limit to the file sizes involved or to the volume of data transmitted - and where these limitations do exist they will be purely reliant on …


Measuring Hacking Ability Using A Conceptual Expertise Task, Justin S. Giboney, Jeffrey G. Proudfoot, Sanjay Goel, Joseph S. Valacich May 2015

Measuring Hacking Ability Using A Conceptual Expertise Task, Justin S. Giboney, Jeffrey G. Proudfoot, Sanjay Goel, Joseph S. Valacich

Annual ADFSL Conference on Digital Forensics, Security and Law

Hackers pose a continuous and unrelenting threat to organizations. Industry and academic researchers alike can benefit from a greater understanding of how hackers engage in criminal behavior. A limiting factor of hacker research is the inability to verify that self-proclaimed hackers participating in research actually possess their purported knowledge and skills. This paper presents current work in developing and validating a conceptual-expertise based tool that can be used to discriminate between novice and expert hackers. The implications of this work are promising since behavioral information systems researchers operating in the information security space will directly benefit from the validation of …


Invited Paper - A Profile Of Prolonged, Persistent Ssh Attack On A Kippo Based Honeynet, Craig Valli, Priya Rabadia, Andrew Woodard May 2015

Invited Paper - A Profile Of Prolonged, Persistent Ssh Attack On A Kippo Based Honeynet, Craig Valli, Priya Rabadia, Andrew Woodard

Annual ADFSL Conference on Digital Forensics, Security and Law

This paper is an investigation focusing on activities detected by SSH honeypots that utilised kippo honeypot software. The honeypots were located across a variety of geographical locations and operational platforms. The honeynet has suffered prolonged, persistent and attack from a /24 network which appears to be of Chinese geographical origin. In addition to these attacks, other attackers have been successful in compromising real hosts in a wide range of other countries that were subsequently involved in attacking the honeypot machines in the honeynet.

Keywords: Cyber Security, SSH, Secure Shell, Honeypots, Kippo


Inivited Paper - Potential Changes To Ediscovery Rules In Federal Court: A Discussion Of The Process, Substantive Changes And Their Applicability And Impact On Virginia Practice, Joseph J. Schwerha, Susan L. Mitchell, John W. Bagby May 2015

Inivited Paper - Potential Changes To Ediscovery Rules In Federal Court: A Discussion Of The Process, Substantive Changes And Their Applicability And Impact On Virginia Practice, Joseph J. Schwerha, Susan L. Mitchell, John W. Bagby

Annual ADFSL Conference on Digital Forensics, Security and Law

The Federal Rules of Civil Procedure (FRCP) are subject to a unique process also once used in revising the Federal Rules of Evidence (FRE). Today, this process is followed in revisions of the FRCP, the Federal Rules of Criminal Procedure and the Federal Bankruptcy Rules. This unique rulemaking process differs significantly from traditional notice and comment rulemaking required for a majority of federal regulatory agencies under the Administrative Procedure Act (APA).1 Most notably, rule-making for the federal courts’ procedural matters remain unaffected by the invalidation of legislative veto. It is still widely, but wrongly believed, that the legislative veto was …


On The Network Performance Of Digital Evidence Acquisition Of Small Scale Devices Over Public Networks, Irvin Homem, Spyridon Dosis May 2015

On The Network Performance Of Digital Evidence Acquisition Of Small Scale Devices Over Public Networks, Irvin Homem, Spyridon Dosis

Annual ADFSL Conference on Digital Forensics, Security and Law

While cybercrime proliferates – becoming more complex and surreptitious on the Internet – the tools and techniques used in performing digital investigations are still largely lagging behind, effectively slowing down law enforcement agencies at large. Real-time remote acquisition of digital evidence over the Internet is still an elusive ideal in the combat against cybercrime. In this paper we briefly describe the architecture of a comprehensive proactive digital investigation system that is termed as the Live Evidence Information Aggregator (LEIA). This system aims at collecting digital evidence from potentially any device in real time over the Internet. Particular focus is made …


A Review Of Recent Case Law Related To Digital Forensics: The Current Issues, Kelly A. Cole, Shruti Gupta, Dheeraj Gurugubelli, Marcus K. Rogers May 2015

A Review Of Recent Case Law Related To Digital Forensics: The Current Issues, Kelly A. Cole, Shruti Gupta, Dheeraj Gurugubelli, Marcus K. Rogers

Annual ADFSL Conference on Digital Forensics, Security and Law

Digital forensics is a new field without established models of investigation. This study uses thematic analysis to explore the different issues seen in the prosecution of digital forensic investigations. The study looks at 100 cases from different federal appellate courts to analyze the cause of the appeal. The issues are categorized into one of four categories, ‘search and seizure’, ‘data analysis’, ‘presentation’ and ‘legal issues’. The majority of the cases reviewed related to the search and seizure activity.

Keywords: Computer Investigation, Case Law, Digital Forensics, Legal Issues, and Courts


A New Cyber Forensic Philosophy For Digital Watermarks In The Context Of Copyright Laws, Vinod P. Bhattathiripad, Sneha Sudhakaran, Roshna K. Thalayaniyil May 2015

A New Cyber Forensic Philosophy For Digital Watermarks In The Context Of Copyright Laws, Vinod P. Bhattathiripad, Sneha Sudhakaran, Roshna K. Thalayaniyil

Annual ADFSL Conference on Digital Forensics, Security and Law

The objective of this paper is to propose a new cyber forensic philosophy for watermark in the context of copyright laws for the benefit of the forensic community and the judiciary worldwide. The paper first briefly introduces various types of watermarks, and then situates watermarks in the context of the ideaexpression dichotomy and the copyright laws. It then explains the forensic importance of watermarks and proposes a forensic philosophy for them in the context of copyright laws. Finally, the paper stresses the vital need to incorporate watermarks in the forensic tests to establish software copyright infringement and also urges the …


A Survey Of Software-Based String Matching Algorithms For Forensic Analysis, Yi-Ching Liao May 2015

A Survey Of Software-Based String Matching Algorithms For Forensic Analysis, Yi-Ching Liao

Annual ADFSL Conference on Digital Forensics, Security and Law

Employing a fast string matching algorithm is essential for minimizing the overhead of extracting structured files from a raw disk image. In this paper, we summarize the concept, implementation, and main features of ten software-based string matching algorithms, and evaluate their applicability for forensic analysis. We provide comparisons between the selected software-based string matching algorithms from the perspective of forensic analysis by conducting their performance evaluation for file carving. According to the experimental results, the Shift-Or algorithm (R. Baeza-Yates & Gonnet, 1992) and the Karp-Rabin algorithm (Karp & Rabin, 1987) have the minimized search time for identifying the locations of …


Investigating Forensics Values Of Windows Jump Lists Data, Ahmad Ghafarian May 2015

Investigating Forensics Values Of Windows Jump Lists Data, Ahmad Ghafarian

Annual ADFSL Conference on Digital Forensics, Security and Law

Starting with Windows 7, Microsoft introduced a new feature to the Windows Operating Systems called Jump Lists. Jump Lists stores information about user activities on the host machine. These activities may include links to the recently visited web pages, applications executed, or files processed. Computer forensics investigators may find traces of misuse in Jump Lists auto saved files. In this research, we investigate the forensics values of Jump Lists data. Specifically, we use several tools to view Jump Lists data on a virtual machine. We show that each tool reveal certain types of information about user’s activity on the host …


An Empirical Comparison Of Widely Adopted Hash Functions In Digital Forensics: Does The Programming Language And Operating System Make A Difference?, Satyendra Gurjar, Ibrahim Baggili, Frank Breitinger, Alice Fischer May 2015

An Empirical Comparison Of Widely Adopted Hash Functions In Digital Forensics: Does The Programming Language And Operating System Make A Difference?, Satyendra Gurjar, Ibrahim Baggili, Frank Breitinger, Alice Fischer

Annual ADFSL Conference on Digital Forensics, Security and Law

Hash functions are widespread in computer sciences and have a wide range of applications such as ensuring integrity in cryptographic protocols, structuring database entries (hash tables) or identifying known files in forensic investigations. Besides their cryptographic requirements, a fundamental property of hash functions is efficient and easy computation which is especially important in digital forensics due to the large amount of data that needs to be processed when working on cases. In this paper, we correlate the runtime efficiency of common hashing algorithms (MD5, SHA-family) and their implementation. Our empirical comparison focuses on C-OpenSSL, Python, Ruby, Java on Windows and …


Two Challenges Of Stealthy Hypervisors Detection: Time Cheating And Data Fluctuations, Igor Korkin May 2015

Two Challenges Of Stealthy Hypervisors Detection: Time Cheating And Data Fluctuations, Igor Korkin

Annual ADFSL Conference on Digital Forensics, Security and Law

Hardware virtualization technologies play a significant role in cyber security. On the one hand these technologies enhance security levels, by designing a trusted operating system. On the other hand these technologies can be taken up into modern malware which is rather hard to detect. None of the existing methods is able to efficiently detect a hypervisor in the face of countermeasures such as time cheating, temporary self-uninstalling, memory hiding etc. New hypervisor detection methods which will be described in this paper can detect a hypervisor under these countermeasures and even count several nested ones. These novel approaches rely on the …


Image Segmentation Using Fuzzy-Spatial Taxon Cut, Lauren Barghout May 2015

Image Segmentation Using Fuzzy-Spatial Taxon Cut, Lauren Barghout

MODVIS Workshop

Images convey multiple meanings that depend on the context in which the viewer perceptually organizes the scene. This presents a problem for automated image segmentation, because it adds uncertainty to the process of selecting which objects to include or not include within a segment. I’ll discuss the implementation of a fuzzy-logic-natural-vision-processing engine that solves this problem by assuming the scene architecture prior to processing. The scene architecture, a standardized natural-scene-perception-taxonomy comprised of a hierarchy of nested spatial-taxons. Spatial-taxons are regions (pixel-sets) that are figure-like, in that they are perceived as having a contour, are either `thing-like', or a `group of …


The Geomorphic Signature Of Fold Growth Along Cleman Mountain, Wa, Tabor Reedy May 2015

The Geomorphic Signature Of Fold Growth Along Cleman Mountain, Wa, Tabor Reedy

Scholars Week

No abstract provided.


One Hundred Years Of Vegetation Succession In The Easton Glacial Foreland, Mount Baker, Washington, Usa, Katherine Rosa May 2015

One Hundred Years Of Vegetation Succession In The Easton Glacial Foreland, Mount Baker, Washington, Usa, Katherine Rosa

Scholars Week

Glacial forelands provide excellent landscapes for studying vegetation succession. A glacial foreland is the distinct area of newly exposed land in front of a glacier terminus that was previously ice covered. With increasing distance from the glacier terminus, surface age of exposure increases, allowing for a spatial representation of temporal change of vegetation and soils (chronosequence). It is within this chronosequence relationship that succession can be studied in a glacial foreland. Patterns of vegetation succession vary among studied forelands around the world; however, there have been few studies documenting vegetation in the glacial forelands in the Cascade Mountain Range of …


Inquiry-Based Content Immersion: Increasing Science Content Knowledge And Appreciation In Pre-Service Elementary Teachers, Scheree Dowdy May 2015

Inquiry-Based Content Immersion: Increasing Science Content Knowledge And Appreciation In Pre-Service Elementary Teachers, Scheree Dowdy

Scholars Week

No abstract provided.


Change At The Core: An Initial Implementation Of Active Learning Strategies In Large, Lecture Science Courses, Travis Salmi May 2015

Change At The Core: An Initial Implementation Of Active Learning Strategies In Large, Lecture Science Courses, Travis Salmi

Scholars Week

Change at the Core (C-Core) is a faculty professional development program designed to investigate and employ the benefits of student focused learning in introductory science courses. It is a multidisciplinary effort among science educators at three higher education institutions to understand different possible learning strategy implementations. We are using case studies to investigate these implementations, the challenges involved, and the student responses to these approaches. Previous research has shown that students respond with greater learning outcomes towards alternatives to lectures. Data are being collected through classroom observations, student surveys, and faculty interviews. So far, we have observed a range of …


Phytoplankton Ecology: Algal Assemblages In Correlation With Water Quality In High Elevation Lakes, North Cascades, Wa, Anna Nakae May 2015

Phytoplankton Ecology: Algal Assemblages In Correlation With Water Quality In High Elevation Lakes, North Cascades, Wa, Anna Nakae

Scholars Week

High- elevation lakes are unique ecosystems that are exposed to extreme environmental conditions and, as a result, are relatively simple systems in which changes can be detected. Phytoplankton communities within these systems are of interest because can be greatly influenced by the chemical components of the surrounding environment. This relationship allows phytoplankton assemblages to act as bioindicators that can give a greater insight into the water characteristics of lakes and vice versa. For this research, seven lakes were studied: Terminal, Upper Bagley, Lower Bagley, Heather Meadows Pond, Sunrise , Picture and Highwood. All seven are located in the headwaters watershed …


Video Event Understanding With Pattern Theory, Fillipe Souza, Sudeep Sarkar, Anuj Srivastava, Jingyong Su May 2015

Video Event Understanding With Pattern Theory, Fillipe Souza, Sudeep Sarkar, Anuj Srivastava, Jingyong Su

MODVIS Workshop

We propose a combinatorial approach built on Grenander’s pattern theory to generate semantic interpretations of video events of human activities. The basic units of representations, termed generators, are linked with each other using pairwise connections, termed bonds, that satisfy predefined relations. Different generators are specified for different levels, from (image) features at the bottom level to (human) actions at the highest, providing a rich representation of items in a scene. The resulting configurations of connected generators provide scene interpretations; the inference goal is to parse given video data and generate high-probability configurations. The probabilistic structures are imposed using energies that …


Metacognition: Using Confidence Ratings For Type 2 And Type 1 Roc Curves, S A. Klein May 2015

Metacognition: Using Confidence Ratings For Type 2 And Type 1 Roc Curves, S A. Klein

MODVIS Workshop

In the past five years there has been a surge of renewed interest in metacognition ("thinking about thinking"). The typical experiment involves a binary judgment followed by a multilevel confidence rating. It is a confusing topic because the rating could be made either on one's confidence in the binary response (standard rating Type 1 ROC) or on one's confidence sorted by whether the response was correct (Type 2 ROC). Both are metacognition. After a few remarks on challenging aspects of the Type 2 approach, I will present some interesting results for Type 1 ROC for both memory and vision research. …


Two Correspondence Problems Easier Than One, Aaron Michaux, Zygmunt Pizlo May 2015

Two Correspondence Problems Easier Than One, Aaron Michaux, Zygmunt Pizlo

MODVIS Workshop

Computer vision research rarely makes use of symmetry in stereo reconstruction despite its established importance in perceptual psychology. Such stereo reconstructions produce visually satisfying figures with precisely located points and lines, even when input images have low or moderate resolution. However, because few invariants exist, there are no known general approaches to solving symmetry correspondence on real images. The problem is significantly easier when combined with the binocular correspondence problem, because each correspondence problem provides strong non-overlapping constraints on the solution space. We demonstrate a system that leverages these constraints to produce accurate stereo models from pairs of binocular images …