Publications News Archive

Summary: A recent trend in Internet usage has seen large amounts of multimedia data due to increasingly large numbers of mobile users. To facilitate higher bandwidth, modern mobile routers are capable of supporting simultaneous multi-band, leading to less interference, higher capacity and better reliability. However, there exists neither previous work that attempts to maximize utilization

Summary: Apple iOS is one of the most popular smartphone operating systems, but it restricts the installation of apps that are not from the Apple App Store. As a result, users often jailbreak their iPhones to defeat this restriction. Jailbroken iPhones are making their way into enterprises that have a Bring Your Own Device (BYOD)

Summary: Microsoft Windows 8 introduced lightweight sandboxed applications called “apps” that provide a full range of functionality on top of touch enabled displays. Apps offer a wide range of functionality, including media editing, file sharing, Internet surfing, cloud service usage, online social media activities and audio/video streaming for the Windows 8 and 8.1 operating systems.

Summary: The Basics of Digital Forensics provides a foundation for people new to the digital forensics field. This book offers guidance on how to conduct examinations by discussing what digital forensics is, the methodologies used, key tactical concepts, and the tools needed to perform examinations. Details on digital forensics for computers, networks, cell phones, GPS,

Summary: The best defense against the increasing threat of social engineering attacks is Security Awareness Training to warn your organization’s staff of the risk and educate them on how to protect your organization’s data. Social engineering is not a new tactic, but Building an Security Awareness Program is the first book that shows you how to build

Summary: The amount of data that must be processed in current digital forensic examinations continues to rise. Both the volume and diversity of data are obstacles to the timely completion of forensic investigations. Additionally, some law enforcement agencies do not have the resources to handle cases of even moderate size. To address these issues we

Summary: Present-day smartphones act as mobile offices, entertainment hubs, and social tools, all packed into one compact device. A smartphone’s processing and data storage capability are comparable to a typical personal computer or laptop of the last decade. Important information commonly found in most smart phones include call logs, contacts lists, text messages, emails, photos,

Summary: Counterfeit currency varies from a low-quality color scanner/printer-based notes to high-quality counterfeits whose production is sponsored by hostile states. Due to their harmful effect on the economy, detecting counterfeit currency notes is a task of national importance. However, automated approaches for counterfeit currency detection are practical only for low-quality counterfeits; manual examination is required

Summary: The shortage of women in science, technology, engineering, and mathematics (STEM) is well-documented. Many efforts address women’s low representation in fields such as computing target high school girls in an effort to solidify their commitment to these fields before they enter college and create computing “potential selves.” This paper describes one such effort in

Summary: The digital forensic process as traditionally laid out is very time intensive – it begins with the collection, duplication and authentication of every piece of digital media prior to examination. Digital triage, a process that takes place prior to this standard methodology, can be used to speed up the process and provide valuable intelligence