News Archives

Popularity-Aware Multi-Failure Resilient and Cost-Effective Replication for High Data Durability in Cloud Storage
September 30, 2018 · Publications
Summary: Large-scale data stores are an increasingly important component of cloud datacenter services. However, cloud storage system usually experiences data loss, hindering data durability. Three-way random replication is commonly used to lead better data durability in cloud storage systems. However, three-way random replication cannot effectively handle correlated machine failures to prevent data loss. Although Copyset
Social Engineering in Non-Linear Warfare
July 17, 2018 · Publications
Summary: This paper explores the use of hacking, leaking, and trolling by Russia to influence the 2016 United States Presidential Elections. These tactics have been called “the weapons of the geek” by some researchers. By using proxy hackers and Russian malware to break into the email of the Democratic National Committee and then giving that
Predictive self-learning content recommendation system for multimedia contents
May 24, 2018 · Publications
Summary: Millions of users use the Internet for entertainment, education, shopping and many other purposes. For instance; one billion hours of YouTube videos are watched every day. One of the key features of such platforms such as the entertainment and shopping platforms is the recommendation system based on past activities of users and the contents
Digital Forensics Trial Graphics
March 9, 2017 · Publications
Summary: Digital Forensics Trial Graphics: Teaching the Jury Through Effective Use of Visuals helps digital forensic practitioners explain complex technical material to laypeople (i.e., juries, judges, etc.). The book includes professional quality illustrations of technology that help anyone understand the complex concepts behind the science. Users will find invaluable information on theory and best practices along
Mobile Device Forensics: Threats, Challenges, and Future Trends
December 1, 2016 · Publications
Summary: Recent implementations of cutting-edge features in smart mobile devices have consumers turning to such technology in increasing numbers as their primary source of communication and information sue to their high degree of portability, privacy, and functionality. As such, emerging technologies have driven substantial progress and unparalleled growth in the field of mobile device forensics,
A Survey of Mobile Crowdsensing Techniques: A Critical Component for the Internet of Things
September 15, 2016 · Publications
Summary: Mobile crowdsensing serves as a critical building block for the emerging Internet of Things (IoT) applications. However, the sensing devices continuously generate a large amount of data, which consumes much resources (e.g., bandwidth, energy and storage), and may sacrifice the quality-of-service (QoS) of applications. Prior work has demonstrated that there is significant redundancy in
The Basics of Cyber Safety
August 20, 2016 · Publications
Summary: The Basics of Cyber Safety: Computer and Mobile Device Safety Made Easy presents modern tactics on how to secure computer and mobile devices, including what behaviors are safe while surfing, searching, and interacting with others in the virtual world. The book’s author, Professor John Sammons, who teaches information security at Marshall University, introduces readers to
Scheduling internet of things applications in cloud computing
June 9, 2016 · Publications
Summary: Internet of Things (IoT) is one of the greatest technology revolutions in the history. Due to IoT potential, daily objects will be consciously worked in harmony with optimized performances. However, today, technology is not ready to fully bring its power to our daily life because of huge data analysis requirements in instant time. On
Perceptions of Data Privacy during Digital Forensic Investigations in India
January 6, 2016 · Publications
Summary: Digital forensic investigation requires the investigator to examine the forensic image of the seized storage media or device. The investigator gets full access to all the data contained in the forensic image including the suspect’s private or sensitive data that may be entirely unrelated to the given case. The unrestricted access to the forensic
Forensic Analysis of Mobile Ads to Identify Users
January 6, 2016 · Publications
Summary: The search providers track the user’s browsing behavior to construct his or her activity profile. The tracking helps the search engines to fine-tune the results and presenting user-specific advertising. When a search input matches with some commercial product or service offering, ads based on the previously saved interests, likes, and dislikes are displayed. The