Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Conference

Discipline
Institution
Keyword
Publication Year
Publication
File Type

Articles 15691 - 15720 of 16625

Full-Text Articles in Physical Sciences and Mathematics

Defending Against Insider Use Of Digital Steganography, James E. Wingate, Glenn D. Watt, Marc Kurtz, Chad W. Davis, Robert Lipscomb Apr 2007

Defending Against Insider Use Of Digital Steganography, James E. Wingate, Glenn D. Watt, Marc Kurtz, Chad W. Davis, Robert Lipscomb

Annual ADFSL Conference on Digital Forensics, Security and Law

The trusted insider is among the most harmful and difficult to detect threats to information security, according to the Federal Plan for Information Assurance and Cyber Security Research and Development released in April 2006. By default, employees become trusted insiders when granted the set of privileges needed to do their jobs, which typically includes access to the Internet. It is generally presumed the insiders are loyally working to achieve the organization’s goals and objectives and would not abuse the privileges given to them. However, some insiders will inevitably abuse some of their privileges. For example, a trusted insider might abuse …


Computer Geolocation Using Extracted Features, Chad M.S. Steel Apr 2007

Computer Geolocation Using Extracted Features, Chad M.S. Steel

Annual ADFSL Conference on Digital Forensics, Security and Law

This paper compares the extracted feature data from a sample set of hard drive images in an effort to relate the features to the physical location of the drive. A list of probable zip codes, phone numbers, place names, and IP addresses are extracted from raw drive images and compared to manually identified geolocation data. The results of the individual extractions are then analyzed to determine the feasibility in using automated extraction and analysis techniques for geolocating hard drives.

Keywords: hard disk forensics, geocoding, geolocation


Education For Cyber Crime Investigators, David Greer, Joe Mulenex, John Hale, Gavin W. Manes Apr 2007

Education For Cyber Crime Investigators, David Greer, Joe Mulenex, John Hale, Gavin W. Manes

Annual ADFSL Conference on Digital Forensics, Security and Law

Digital forensics and cyber crime investigations are continually growing, rapidly changing fields requiring law enforcement agencies to meet very rigorous training requirements. New opportunities for committing criminal activity against persons, organization or property are presented every day with the proliferation of personal digital devices, computers, the internet, computer networks, and automated data systems. Whether the crime involves attacks against computer systems, electronic information, or more traditional crimes such as murder, money laundering or fraud, electronic evidence is becoming more prevalent. It is no surprise that law enforcement and criminal justice officials are being overwhelmed by the volume of investigations and …


Investigating Information Structure Of Phishing Emails Based On Persuasive Communication Perspective, Ki Jung Lee, Il-Yeol Song Apr 2007

Investigating Information Structure Of Phishing Emails Based On Persuasive Communication Perspective, Ki Jung Lee, Il-Yeol Song

Annual ADFSL Conference on Digital Forensics, Security and Law

Current approaches of phishing filters depend on classifying messages based on textually discernable features such as IP-based URLs or domain names as those features that can be easily extracted from a given phishing message. However, in the same sense, those easily perceptible features can be easily manipulated by sophisticated phishers. Therefore, it is important that universal patterns of phishing messages should be identified for feature extraction to serve as a basis for text classification. In this paper, we demonstrate that user perception regarding phishing message can be identified in central and peripheral routes of information processing. We also present a …


Towards Redaction Of Digital Information From Electronic Devices, Gavin W. Manes, Lance Watson, David Greer, Alex Barclay, John Hale Apr 2007

Towards Redaction Of Digital Information From Electronic Devices, Gavin W. Manes, Lance Watson, David Greer, Alex Barclay, John Hale

Annual ADFSL Conference on Digital Forensics, Security and Law

In the discovery portion of court proceedings, it is necessary to produce information to opposing counsel. Traditionally, this information is in paper form with all privileged information removed. Increasingly, the information requested during discovery exists in digital form and savvy counsel is requesting direct access to the original digital source: a broad spectrum of additional digital information can be often be extracted using digital forensics. This paper describes the major problems which must be solved to redact digital information from electronic devices. The primary hurdle facing digital redaction is the lack of a rational process for systematically handling encoded, encrypted, …


The Gap Between Theory And Practice In Digital Forensics, Joseph C. Sremack Apr 2007

The Gap Between Theory And Practice In Digital Forensics, Joseph C. Sremack

Annual ADFSL Conference on Digital Forensics, Security and Law

Digital forensics is a young field that is being defined by the reactive nature of its development – in terms of both research and practice. As technology develops, digital forensics is forced to react and adapt. The rapid development of technology and the lack of an established theoretical foundation has led to a disconnect between the theory and practice of digital forensics. While the base theoretical issues are being worked on by researchers, practitioners are dealing with entirely new sets of issues. The complexity of investigations is increasing, and anti-forensics techniques are advancing as well. The disconnect will be resolved …


Teams Responsibilities For Digital Forensic Process, Salma Abdalla, Sherif Hazem, Sherif Hashem Apr 2007

Teams Responsibilities For Digital Forensic Process, Salma Abdalla, Sherif Hazem, Sherif Hashem

Annual ADFSL Conference on Digital Forensics, Security and Law

This paper presents a detailed digital forensics process model and the responsible teams to perform it. The discussed model presents three teams and a forensic leader who coordinate between the three teams; these teams are physical crime scene team, laboratory examination team and courtroom team. These teams are responsible of achieving the digital forensic model by applying five main phases which are preparation phase, physical forensics and investigation phase, digital forensics phase, reporting and presentation phase and closure phase.

Most of the existing models in this field are either theoretical that deals with data processing or based on a legal …


New Federal Rules And Digital Evidence, Gavin W. Manes, Elizabeth Downing, Lance Watson, Christopher Thrutchley Apr 2007

New Federal Rules And Digital Evidence, Gavin W. Manes, Elizabeth Downing, Lance Watson, Christopher Thrutchley

Annual ADFSL Conference on Digital Forensics, Security and Law

The newly revised Federal Rules of Civil Procedure and developments under the Federal Rules of Evidence have a significant impact on the use, collection, and treatment of digital evidence for legal proceedings. The Rules now formally grant electronic documents and digital evidence the same status as paper and other forms of tangible evidence. As a result, the availability and proper preservation of potentially relevant electronic evidence must be considered, at the very latest, in the preliminary stages of litigation and, at the earliest, as soon as litigation is reasonably anticipated. It is important for professionals to be familiar with the …


Monitoring And Surveillance In The Workplace: Lessons Learnt? – Investigating The International Legal Position, Verine Etsebeth Apr 2007

Monitoring And Surveillance In The Workplace: Lessons Learnt? – Investigating The International Legal Position, Verine Etsebeth

Annual ADFSL Conference on Digital Forensics, Security and Law

When considering the legal implications of monitoring and surveillance in the workplace, the question may be asked why companies deploy computer surveillance and monitoring in the first place. Several reasons may be put forward to justify why more than 80% of all major American firms monitor employee e-mails and Internet usage. However, what most companies forget is the fact that the absence or presence of monitoring and surveillance activities in a company holds serious legal consequences for companies. From the discussion in this paper it will become apparent that there is a vast difference in how most countries approach this …


An Exploratory Analysis Of Computer Mediated Communications On Cyberstalking Severity, Stephen D. Barnes, David P. Biros Apr 2007

An Exploratory Analysis Of Computer Mediated Communications On Cyberstalking Severity, Stephen D. Barnes, David P. Biros

Annual ADFSL Conference on Digital Forensics, Security and Law

The interaction between disjunctive interpersonal relationships, those where the parties to the relationship disagree on the goals of the relationship, and the use of computer mediated communications channels is a relatively unexplored domain. Bargh (2002) suggests that CMC channels can amplify the development of interpersonal relationships, and notes that the effect is not constant across communications activities. This proposal suggests a line of research that explores the interaction between computer mediated communications (CMC) and stalking, which is a common form of disjunctive relationships. Field data from cyberstalking cases will be used to look at the effects of CMC channels on …


The General Digital Forensics Model, Steven Rigby, Marcus K. Rogers Apr 2007

The General Digital Forensics Model, Steven Rigby, Marcus K. Rogers

Annual ADFSL Conference on Digital Forensics, Security and Law

The lack of a graphical representation of all of the principles, processes, and phases necessary to carry out an digital forensic investigation is a key inhibitor to effective education in this newly emerging field of study. Many digital forensic models have been suggested for this purpose but they lack explanatory power as they are merely a collection of lists or one-dimensional figures. This paper presents a new multi-dimensional model, the General Digital Forensics Model (GDFM), that shows the relationships and inter-connectedness of the principles and processes needed within the domain of digital forensics.

Keywords: process model, computer forensics, expert learning, …


Guideline Model For Digital Forensic Investigation, Salma Abdalla, Sherif Hazem, Sherif Hashem Apr 2007

Guideline Model For Digital Forensic Investigation, Salma Abdalla, Sherif Hazem, Sherif Hashem

Annual ADFSL Conference on Digital Forensics, Security and Law

This paper proposes a detailed guideline model for digital forensics; the proposed model consists of five main phases, Preparation phase, Physical Forensics and Investigation Phase, Digital Forensics Phase, Reporting and Presentation Phase, and Closure Phase.

Most of the existing models in this field do not cover all aspects of digital forensic investigations, as they focus mainly on the processing of digital evidence or on the legal points. Although they gave good information to base on it a guide, but they are not detailed enough to describe fully the investigative process in a way that can be used by investigators during …


The Evolution Of Internet Legal Regulation In Addressing Crime And Terrorism, Murdoch Watney Apr 2007

The Evolution Of Internet Legal Regulation In Addressing Crime And Terrorism, Murdoch Watney

Annual ADFSL Conference on Digital Forensics, Security and Law

Internet regulation has evolved from self-regulation to the criminalization of conduct to state control of information available, accessed and submitted. Criticism has been leveled at the different forms of state control and the methods employed to enforce state control. After the terrorist attack on the USA on 11 September 2001, governments justify Internet state control as a law enforcement and national security tool against the abuse and misuse of the Internet for the commission of serious crimes, such as phishing, child pornography; terrorism and copyright infringement. Some Internet users and civil rights groups perceive state control as an abomination which …


Poster Session, Kentucky Water Resources Research Institute, University Of Kentucky Mar 2007

Poster Session, Kentucky Water Resources Research Institute, University Of Kentucky

Kentucky Water Resources Annual Symposium

  • Identification of potential bacterial sources and levels, Red Duck Creek, Mayfield, Kentucky, Brooke Vorbeck, Travis Martin, and Mike Kemp, Dept of Industrial and Engineering Technology, Murray State University
  • Water-quality trend analysis for streams in Kentucky, A.S. Crain and G.R. Martin, USGS, Louisville
  • Preliminary Results of a Fecal Microbe Survey in a Eutrophic Lake, Wilgreen Lake, Madison County, Kentucky, W.S. Borowski and M.S. Albright, Depts of Earth Sciences and Geography, EKU
  • Preliminary Physical and Chemical Characteristics of an Eutrophic Lake, Wilgreen Lake, Madison County, Kentucky, E.C. Jolly and W.S. Borowski, Dept of Earth Sciences, EKU
  • Lethal and …


Session 2d: Superfund, Kentucky Water Resources Research Institute, University Of Kentucky Mar 2007

Session 2d: Superfund, Kentucky Water Resources Research Institute, University Of Kentucky

Kentucky Water Resources Annual Symposium

  • Challenges and Opportunities in Working Directly with Affected Superfund Communities in Kentucky, Lisa Gaetke, Nutrition and Food Science, UK
  • Selected Chloro-Organic Detoxifications by Poly-Chelate (polyacrylic acid) and Citrate-Based Fenton Reaction at Neutral pH Environment, YongChao Li, L. G. Bachas, and Dibakar Bhattacharyya, Depts of Chemical & Materials Engineering and Chemisty, UK
  • Reductive Degradation of Cholorinated Organics by Membrane-Supported Nonoparticles, Jian Xu and Dibakar Bhattacharyya, Dept of Chemical & Materials Engineering, UK


Session 2c: Education/Outreach, Kentucky Water Resources Research Institute, University Of Kentucky Mar 2007

Session 2c: Education/Outreach, Kentucky Water Resources Research Institute, University Of Kentucky

Kentucky Water Resources Annual Symposium

  • 5 Stars, 15 Students, and 5000 Trees, A.A. Gumbert and others, Extension Associate for Environmental and Natural Resource Issues, UK
  • The Water Pioneers Water Quality Initiative, Stephanie Jenkins, Doug McLaren, Blake Newton, Amanda Abnee, UK
  • Local and State Partnership for MS4 Success in Kentucky – Coordinated Communication, Education and Outreach, C.D. McCormick and Shelby Jett, FMSM Engineers, Louisville and Kentucky Transportation Cabinet
  • Illicit Discharge Detection and Elimination: A Challenge for Kentucky’s Stormwater Program Cities, B. Tonning, R. Walker, and J. Arnold, Tetra Tech, Lexington


Session 2b: Goundwater, Kentucky Water Resources Research Institute, University Of Kentucky Mar 2007

Session 2b: Goundwater, Kentucky Water Resources Research Institute, University Of Kentucky

Kentucky Water Resources Annual Symposium

  • Kentucky Groundwater-Quality Mapping Service, R.S. Fisher and Bart Davidson, KGS
  • Kentucky Groundwater-Quality Data Search Engine, Bart Davidson and R.S. Fisher, KGS
  • Water Quality in the Karst Terrane of the Sinking Creek Basin, Kentucky 2004-06, Angela S. Crain, USGS, Louisville
  • Salt Movement Through the Vadose Zone of a Karst Soil – First Experiences with a Transfer Function Approach, Ole Wendroth and others, Dept Plant and Soil Sciences, UK


Session 2a: Surface Water, Kentucky Water Resources Research Institute, University Of Kentucky Mar 2007

Session 2a: Surface Water, Kentucky Water Resources Research Institute, University Of Kentucky

Kentucky Water Resources Annual Symposium

  • Development and Application of a New Sediment Fingerprinting Methodology for the Commonwealth of Kentucky, Charles Davis and Jimmy Fox, Dept of Civil Engineering, UK
  • Accounting for Construction Stormwater in TMDL Development for Sediment Impaired Streams in Rapidly Growing Residential Areas, Jon Ludwig and John Bekman, Tetra Tech, and David Montali, WVDEP
  • Responses of Riparian Plant Diversity to Gradients in Flood Frequency and Severity, Patrick Lawless and Jimmy Fox, Depts of Geography and Civil Engineering, UK


Session 1d: Biology, Kentucky Water Resources Research Institute, University Of Kentucky Mar 2007

Session 1d: Biology, Kentucky Water Resources Research Institute, University Of Kentucky

Kentucky Water Resources Annual Symposium

  • Long-Term Assessments and Seasonal Variations of Polychlorinated Biphenyls (PCBs) in Water, Sediments, Floodplain Soils, and Sentinel Fish Species from Big and Little Bayou Creeks, McCracken County, Kentucky, D.J. Price, Dept of Biology, UK
  • Characterization of total dissolved solids (TDS) toxicity to Ceriodaphnia dubia associated with effluent discharges from a meat packaging industry, Agus Sofyan and David Price, Dept of Biology, UK
  • Wilson Creek Restoration and the Response in Food Web Function and Fish Community Structure, Wesley Daniel and Jeff Jack, Dept of Biology and Center for Environmental Science, U of L


Session 1c: Epscor Projects, Kentucky Water Resources Research Institute, University Of Kentucky Mar 2007

Session 1c: Epscor Projects, Kentucky Water Resources Research Institute, University Of Kentucky

Kentucky Water Resources Annual Symposium

  • Colloidal Arsenic in Poultry-Litter Amended Soils, Lisa Y. Blue and others, Dept of Chemistry, UK
  • Environmental Monitoring and Assessment of Arsenic Metal in Groundwater Samples from Ballard, Carlisle, and Graves Counties, Kentucky, H.B. Fannin and others, Dept of Chemistry, Murray State University
  • Environmental Monitoring and Assessment of the Groundwater Quality in Calloway County, Kentucky, Dan Kotter and others, KGS, Henderson, KY
  • Land-Use Effects on Water Quality Within Lower Howard Creek Watershed, Southwestern Clark County, Kentucky, S.D. Daugherty and J.S. Dinger, Dept Earth & Environmental Sciences and KGS, UK


Session 1b: Student Research Projects, Kentucky Water Resources Research Institute, University Of Kentucky Mar 2007

Session 1b: Student Research Projects, Kentucky Water Resources Research Institute, University Of Kentucky

Kentucky Water Resources Annual Symposium

  • Experimental Study of the Impact of Upland Sediment Supply upon Cohesive Streambank Erosion Part I: Fluid Turbulence, Brian Belcher and Jimmy Fox, Dept of Civil Engineering, UK
  • Toward Using a Three-Dimensional Numerical Model for Simulating Hydrodynamics Near a Dam for Constructing the Rating Curve, Z.S. Shao and S.A. Yost, Dept of Civil Engineering, UK
  • Property Taxation and Forest Fragmentation in Kentucky Watersheds, Scott Brodbeck and Tamara Cushing, Dept of Forestry, UK
  • Solute and Particle Tracer Movement Under Various Flow Conditions in a Karst Groundwater Basin, Inner Bluegrass Region, Kentucky, J.W. Ward and others, Dept Earth and …


Session 1a: Microbial Source Tracking, Kentucky Water Resources Research Institute, University Of Kentucky Mar 2007

Session 1a: Microbial Source Tracking, Kentucky Water Resources Research Institute, University Of Kentucky

Kentucky Water Resources Annual Symposium

  • Detecting Multiple Source Origins from Fecal Bacteria Antibiotic Resistance Patterns, Sloane Ritchey and M.S. Coyne, Environmental Research Institute, EKU and Dept of Plant and Soil Sciences, UK
  • Microbial Source Tracking; Limits and Application, Steve Evans, Third Rock Consultants, Lexington
  • Triplett Creek Focus Study, Brian Reeder and April Haight, Institute for Regional Analysis and Public Policy, Morehead State University


Proceedings Of 2007 Kentucky Water Resources Annual Symposium, Kentucky Water Resources Research Institute, University Of Kentucky Mar 2007

Proceedings Of 2007 Kentucky Water Resources Annual Symposium, Kentucky Water Resources Research Institute, University Of Kentucky

Kentucky Water Resources Annual Symposium

This conference was planned and conducted as part of the state water resources research annual program with the support and collaboration of the Department of the Interior, U.S. Geological Survey and the University of Kentucky Research Foundation, under Grant Agreement Number 06HQGR0087.

The views and conclusions contained in this document and presented at the symposium are those of the abstract authors and presenters and should not be interpreted as necessarily representing the official policies, either expressed or implied, of the U.S. Government or other symposium organizers and sponsors.


How I Produced Nationally Award Winning Alfalfa Hay, Rick Alexander Feb 2007

How I Produced Nationally Award Winning Alfalfa Hay, Rick Alexander

Kentucky Alfalfa and Stored Forage Conference

No abstract provided.


Roundup Ready Alfalfa: Results After One Year On The Market, S. Ray Smith Feb 2007

Roundup Ready Alfalfa: Results After One Year On The Market, S. Ray Smith

Kentucky Alfalfa and Stored Forage Conference

Roundup Ready alfalfa has now been on the market for over a year with close to 30 varieties available or soon to be available across the U.S. This technology provides many new options for alfalfa producers in Kentucky. Several people have asked us which variety is highest yielding and unfortunately we have not been able to provide a good answer. The technology is so new (just approved fall 2005) that few of these varieties have been entered into University yield trials. Companies do have some private data, but they often don’t compare to the varieties you are familiar with. So …


Cowpea Aphids: Where Did They Come From, Will They Be Back?, Lee H. Townsend Feb 2007

Cowpea Aphids: Where Did They Come From, Will They Be Back?, Lee H. Townsend

Kentucky Alfalfa and Stored Forage Conference

Clearly, something was unusual back in March when large numbers of very dark aphids were found covering stems and tips in Logan, Marion, and Barren counties. They were the cowpea aphid or black legume aphid (Aphis craccivora), a sap-feeding insect known to occur in at least 28 states scattered over the US and into Canada. The cowpea aphid is the only black aphid found infesting alfalfa. Winged or wingless adults are usually shiny black, while the smaller nymphs are dull gray to black. Usually. they are lined along stems or clustered in the expanding leaf tips.


Hay Heating, Hay Sweat And Spontaneous Combustion, Tom Keene, Doug Overhults Feb 2007

Hay Heating, Hay Sweat And Spontaneous Combustion, Tom Keene, Doug Overhults

Kentucky Alfalfa and Stored Forage Conference

Making hay in central Kentucky can be one of the most trying on farm endeavors a producer can undertake. Our plentiful moisture, rolling topography, and climate make Kentucky ideal for producing high quality forage for either grazing or hay making. However, that same moisture either in the form of rain or high humidity can sometimes make it devilishly hard to make quality hay here in Kentucky.


Alfalfa For Summer Grazing, John Johns Feb 2007

Alfalfa For Summer Grazing, John Johns

Kentucky Alfalfa and Stored Forage Conference

Alfalfa can make an excellent grazing forage for cattle in the summer as well as at other times of year provided that good grazing management is utilized. Alfalfa can be grazed very close to the ground but should not be grazed continuously. Initial regrowth after grazing comes from nutrient reserves in the root; therefore, a sufficient rest period or regrowth period without grazing must be allowed for these nutrients to be replenished. In summer, this rest period is 30 to 35 days. In adequate rest for root nutrient replenishment is not allowed, the plant will be weakened and stand life …


Alfalfa Hay For Horses, Robert Coleman Feb 2007

Alfalfa Hay For Horses, Robert Coleman

Kentucky Alfalfa and Stored Forage Conference

Horses are designed to eat forage and quality forage is the basis for the feeding programs of all classes of horse. However, when one considers hay as that basic forage, what criteria are used to describe quality horse hay? In general terms, quality horse hay should supply needed nutrients, be palatable and should be free of anything harmful to the horse.


Requirements For Successful Alfalfa Establishment, Garry D. Lacefield Feb 2007

Requirements For Successful Alfalfa Establishment, Garry D. Lacefield

Kentucky Alfalfa and Stored Forage Conference

Establishing a good stand of alfalfa is expensive and time consuming, but the success rate is high if you give attention to the important factors. The following steps won’t insure success, but will increase greater likelihood.