conference News Archive

Summary: Games have been used as a learning tool for centuries. Through game-based learning, students actively learn and practice the right way to do things. A project team at Marshall University created a web-based application to visually represent networking and cybersecurity concepts by using “gamification” techniques such as linear levels and visualization. The goal of

Summary: Feedback is an essential part of education to help students understand and learn from their mistakes. However, while students learn new content, there is mostly no live person to provide feedback, especially in a virtual environment. Therefore, there are many software for automated code reviews to provide feedback to programming language learners. However, there

Summary: Millions of users use the Internet for entertainment, education, shopping and many other purposes. For instance; one billion hours of YouTube videos are watched every day. One of the key features of such platforms such as the entertainment and shopping platforms is the recommendation system based on past activities of users and the contents

Summary: Digital forensic investigation requires the investigator to examine the forensic image of the seized storage media or device. The investigator gets full access to all the data contained in the forensic image including the suspect’s private or sensitive data that may be entirely unrelated to the given case. The unrestricted access to the forensic

Summary: The search providers track the user’s browsing behavior to construct his or her activity profile. The tracking helps the search engines to fine-tune the results and presenting user-specific advertising. When a search input matches with some commercial product or service offering, ads based on the previously saved interests, likes, and dislikes are displayed. The

Summary: As a popular routing protocol in wireless sensor networks (WSNs), greedy routing has received great attention. The previous works characterize its data deliverability in WSNs by the probability of all nodes successfully sending their data to the base station. Their analysis, however, neither provides the information of the quantitative relation between successful data delivery

Summary: Digital forensic investigators can take advantage of tools and techniques that have the capability of finding similar files out of thousands of files up for investigation in a particular case. Finding similar files could significantly reduce the volume of data that needs to be investigated. Sdhash is a well-known fuzzy hashing scheme used for

Summary: Apple iOS is one of the most popular smartphone operating systems, but it restricts the installation of apps that are not from the Apple App Store. As a result, users often jailbreak their iPhones to defeat this restriction. Jailbroken iPhones are making their way into enterprises that have a Bring Your Own Device (BYOD)

Summary: Microsoft Windows 8 introduced lightweight sandboxed applications called “apps” that provide a full range of functionality on top of touch enabled displays. Apps offer a wide range of functionality, including media editing, file sharing, Internet surfing, cloud service usage, online social media activities and audio/video streaming for the Windows 8 and 8.1 operating systems.

Summary: Present-day smartphones act as mobile offices, entertainment hubs, and social tools, all packed into one compact device. A smartphone’s processing and data storage capability are comparable to a typical personal computer or laptop of the last decade. Important information commonly found in most smart phones include call logs, contacts lists, text messages, emails, photos,