Now showing items 1-14 of 14

    • Cloud Forecasting: Legal Visibility Issues in Saturated Environments 

      Brown, Adam J.; Glisson, William Bradley; Andel, Todd R.; Choo, Kim-Kwang Raymond (Computer Law & Security Review, 2018)
      The advent of cloud computing has brought the computing power of corporate data pro- cessing and storage centers to lightweight devices. Software-as-a-service cloud subscribers enjoy the convenience of personal devices ...
    • Data Collection Scheduling in Directional Wireless Sensor Networks 

      Simsek, Ecem; 0000-0001-9992-7524 (2019-04-17)
      This thesis studies Minimum Latency Collection Scheduling (MLCS) problem in Wireless Sensor Networks (WSNs) whose objective is to obtain collision-free data collection schedules with minimum latencies. Unlike most existing ...
    • Detect forgery video by performing transfer learning on Deep Neural Network 

      Zhang, Zhaohe; 0000-0002-6542-0319 (2019-04-17)
      Nowadays, the authenticity of digital image and videos becomes hard while the forgery techniques are more advanced. Given the recent progress on Generative Neural Network (GNN) development that may generate realistic images ...
    • DETECTION OF RED-COCKADED WOODPECKER HABITATS USING YOLO ALGORITHMS 

      de Lemmus, Emerson (2022-08-01)
      Habitat and population monitoring are crucial for the preservation of endangered species. However, gathering habitat data may be a hazardous and laborious task. As a result, wildlife ecologists increasingly turn to remote ...
    • HEAT-MAP BASED EMOTION AND FACE RECOGNITION FROM THERMAL IMAGES 

      Ilikci, Burak (2019-04-17)
      Nowadays, emotion recognition has become a feasible problem with implementation of Convolutional Neural Networks in Computer Vision domain. However, credibility of emotion recognition from daily images or videos is not ...
    • Identifying stealth malware using CPU power consumption and learning algorithms 

      Lucket, Patrick; McDonald, J. Todd; Glisson, William Bradley; Benton, Ryan; Dawson, Joel; Doyle, Blair A. (Journal of Computer Security, 2018)
      With the increased assimilation of technology into all aspects of everyday life, rootkits pose a credible threat to individuals, corporations, and governments. Using various techniques, rootkits can infect systems and ...
    • Investigation of IndexedDB Persistent Storage for Digital Forensics 

      Paligu, Furkan; 0000-0002-4284-4477 (2022-08-01)
      The dependency on electronic services is increasing at a rapid rate in every aspect of our daily lives. While the Covid-19 virus remolded how we conduct business through remote collaboration applications, social media is ...
    • NNMF IN GOOGLE TENSORFLOW AND APACHE SPARK: A COMPARISON STUDY 

      Li, Qizhao; 0000-0003-4124-3503 (2019-07-12)
      Data mining is no longer a new term as it has been already pervasive in all aspects of our lives. New computing platforms for specific usages are proposed continuously. Therefore, the awareness of the characteristics and ...
    • NVMe-Assist: A Novel Theoretical Framework for Digital Forensics A Case Study on NVMe Storage Devices and Related Artifacts on Windows 10 

      Neyaz, Ashar (2022-08-01)
      With ever-advancing changes in technology come implications for the digital forensics community. In this document, we use the term digital forensics to denote the scientific investigatory procedure for digital crimes and ...
    • PHONETIC MATCHING TOOLKIT WITH STATE-OF-THE-ART META-SOUNDEX ALGORITHM (ENGLISH AND SPANISH) 

      Koneru, Keerthi; 0000-0002-0112-6858 (2016-10-27)
      Researchers confront major problems while searching for various kinds of data in large imprecise databases, as they are not spelled correctly or in the way they were expected to be spelled. As a result, they cannot find ...
    • QUALITATIVE CLEANING METHODS ON DISTRIBUTED IOT DATASETS 

      Ogungbemile, George (2019-04-08)
      Data analysis encompasses a set of individual steps that allows a typically large data set to be remodeled such that actionable information can be extracted from the data set, which can then be used to support decision-making. ...
    • SELECTED FORENSIC DATA ACQUISITION FROM ANDROID DEVICES 

      Rathi, Khushboo; 0000-0002-3493-4448 (2018-11-12)
      In recent times, amount of data stored in the smartphones have increased phenomenally. A smartphone is as powerful as a laptop or a desktop where people store their person data or do daily activities, as a result it can ...
    • SENTIMENT AND BEHAVIORAL ANALYSIS IN EDISCOVERY 

      Krishnan, Sundar; 0000-0003-4360-1300 (2022-08-01)
      A suspect or person-of-interest during legal case review or forensic evidence review can exhibit signs of their individual personality through the digital evidence collected for the case. Such personality traits of interest ...
    • SPHERICAL AND STOCHASTIC CO-CLUSTERING ALGORITHMS 

      Sariboz, Emrah; 0000-0002-5250-9779 (2019-04-17)
      Clustering, without a doubt, is a dominating area in data mining and machine learning field. Due to the wide range of the necessity to clustering algorithms, it has many applications in real-life problems, ranging from ...