scholarly journals A Comparative UAV Forensic Analysis: Static and Live Digital Evidence Traceability Challenges

Drones ◽  
2021 ◽  
Vol 5 (2) ◽  
pp. 42
Author(s):  
Fahad E. Salamh ◽  
Umit Karabiyik ◽  
Marcus K. Rogers ◽  
Eric T. Matson

The raising accessibility of Unmanned Aerial Vehicles (UAVs), colloquially known as drones, is rapidly increasing. Recent studies have discussed challenges that may come in tow with the growing use of this technology. These studies note that in-depth examination is required, especially when addressing challenges that carry a high volume of software data between sensors, actuators, and control commands. This work underlines static and live digital evidence traceability challenges to further enhance the UAV incident response plan. To study the live UAV forensic traceability issues, we apply the `purple-teaming’ exercise on small UAVs while conducting UAV forensic examination to determine technical challenges related to data integrity and repeatability. In addition, this research highlights current static technical challenges that could pose more challenges in justifying the discovered digital evidence. Additionally, this study discusses potential drone anti-forensic techniques and their association with the type of use, environment, attack vector, and level of expertise. To this end, we propose the UAV Kill Chain and categorize the impact and complexity of all highlighted challenges based on the conducted examination and the presented scientific contribution in this work. To the best of our knowledge, there has not been any contribution that incorporates `Purple-Teaming’ tactics to evaluate UAV-related research in cybersecurity and digital forensics. This work also proposes a categorization model that classifies the discovered UAV static and live digital evidence challenges based on their complexity and impact levels

2018 ◽  
Vol 14 (1) ◽  
pp. e42-e50 ◽  
Author(s):  
Andrew P. Loehrer ◽  
David C. Chang ◽  
Zirui Song ◽  
George J. Chang

Purpose: Underinsured patients are less likely to receive complex cancer operations at hospitals with high surgical volumes (high-volume hospitals, or HVHs), which contributes to disparities in care. To date, the impact of insurance coverage expansion on site of complex cancer surgery remains unknown. Methods: Using the 2006 Massachusetts coverage expansion as a natural experiment, we searched the Hospital Cost and Utilization Project state inpatient databases for Massachusetts and control states (New York, New Jersey, and Florida) between 2001 and 2011 to evaluate changes in the utilization of HVHs for resections of bladder, esophageal, stomach, pancreatic, rectal, or lung cancer after the expansion of insurance coverage. We studied nonelderly, adult patients with private insurance and those with government-subsidized or self-pay (GSSP) coverage with a difference-in-differences framework. Results: We studied 11,687 patients in Massachusetts and 56,300 patients in control states. Compared with control states, the 2006 Massachusetts insurance expansion was associated with a 14% increased rate of surgical intervention for GSSP patients (incident rate ratio, 1.14; P = .015), but there was no significant change in the probability of GSSP patients undergoing surgery at an HVH (1.0 percentage-point increase; P = .710). The reform was associated with no change in the uninsured payer-mix at HVHs (0.6 percentage-point increase; P = .244) and with a 5.1 percentage-point decrease for the uninsured payer mix at low-volume hospitals ( P < .001). Conclusion: The 2006 Massachusetts insurance expansion, a model for the Affordable Care Act, was associated with increased rates of complex cancer operations and increased insurance coverage but with no change in utilization of HVH for complex cancer operations.


Respuestas ◽  
2020 ◽  
Vol 25 (1) ◽  
pp. 108-126
Author(s):  
Mayerly Ivonne Sáenz-Suárez ◽  
Luisa Fernanda Uribe-Forero ◽  
Octavio Andrés González-Estrada

This paper presents a descriptive study and scientometrics analysis to evaluate the incidence of the classification model of scientific journals Publindex in the behavior of Colombian journals in the area of Engineering and Technology. Qualitative and quantitative criteria were compiled, the production and contents of the journals were studied, and the national journals of the Engineering and Technology area were compared with the international journals of the same area. As a result, it is concluded that the implementation of the new categorization model served as a stimulus to boost the impact and improve the management of Colombian scientific journals in the study area. However, there is evidence of the need to implement models of editorial management and editorial policies (publication languages, periodicity, type of peer review, number of articles published, etc.) of international journals, and to rethink the classification model of scientific journals in Colombia incorporating guidelines that allow an objective evaluation based on the standardization and control of citation patterns.


2019 ◽  
pp. 73-81
Author(s):  
A. Symonov ◽  
O. Klevtsov ◽  
S. Trubchaninov ◽  
O. Lazurenko

The approaches to the development and management of computer security justification documents on computer security policy, program and plan, computer incident response plan, reports related to computer security are considered in the paper. Requirements for computer security policy, program and plan are presented, and the analysis of different approaches adopted and reflected in the documents of the International Atomic Energy Agency, U.S. Nuclear Regulatory Commission and International Electrotechnical Commission is carried out. It is noted that the approaches used by these organizations to the development and management of computer security justification documents are quite similar. The paper provides suggestions for the development of requirements for computer security justification documents on the instrumentation and control systems at Ukrainian NPPs. The analysis of different international approaches to the development, implementation, and management of the computer security policy, program and plan has allowed developing requirements for the above-mentioned documents, which will be reflected in the new regulation taking into account the current situation at Ukrainian NPPs. Besides, it is planned to include separate requirements for computer security documentation of the developers of instrumentation and control systems regarding computer incident response plan and reporting documents on computer security in this regulation. The paper presents recommendations for the content, implementation and management of computer security justification documents.


2020 ◽  
Vol 2020 ◽  
pp. 1-10
Author(s):  
Yugang Liu ◽  
Hongbo Yi ◽  
Jiali Li ◽  
Bin Chen ◽  
Hongtai Yang

High volume of traffic is loaded on urban highway during peak hours as well as the ramp connecting main road and auxiliary road of highway. Once the demand exceeds the capacity of the ramp, congestion may happen on both main road and the auxiliary road. To deal with this problem, an new urban highway ramp, switchable ramp (SR) that can switch between on and off condition, is proposed in this paper. A macroscopic time-space discrete model is built in this paper to model this process by dividing the studied time period into short time periods and the studied road segment into small sections. The impact of the type of ramp on upstream and downstream traffic flow is analyzed. A segment of urban highway in Chengdu, China, is used as a case study. The traffic flow data in peak hours is collected and used. Mathematical analysis proves that the SR system proposed in this paper can reduce the total travel time (TTT) in the studied area. Results show that the SR system is more useful when the traffic volume is high.


2011 ◽  
Vol 70 (1) ◽  
pp. 5-11 ◽  
Author(s):  
Beat Meier ◽  
Anja König ◽  
Samuel Parak ◽  
Katharina Henke

This study investigates the impact of thought suppression over a 1-week interval. In two experiments with 80 university students each, we used the think/no-think paradigm in which participants initially learn a list of word pairs (cue-target associations). Then they were presented with some of the cue words again and should either respond with the target word or avoid thinking about it. In the final test phase, their memory for the initially learned cue-target pairs was tested. In Experiment 1, type of memory test was manipulated (i.e., direct vs. indirect). In Experiment 2, type of no-think instructions was manipulated (i.e., suppress vs. substitute). Overall, our results showed poorer memory for no-think and control items compared to think items across all experiments and conditions. Critically, however, more no-think than control items were remembered after the 1-week interval in the direct, but not in the indirect test (Experiment 1) and with thought suppression, but not thought substitution instructions (Experiment 2). We suggest that during thought suppression a brief reactivation of the learned association may lead to reconsolidation of the memory trace and hence to better retrieval of suppressed than control items in the long term.


Crisis ◽  
2010 ◽  
Vol 31 (5) ◽  
pp. 238-246 ◽  
Author(s):  
Paul W. C. Wong ◽  
Wincy S. C. Chan ◽  
Philip S. L. Beh ◽  
Fiona W. S. Yau ◽  
Paul S. F. Yip ◽  
...  

Background: Ethical issues have been raised about using the psychological autopsy approach in the study of suicide. The impact on informants of control cases who participated in case-control psychological autopsy studies has not been investigated. Aims: (1) To investigate whether informants of suicide cases recruited by two approaches (coroners’ court and public mortuaries) respond differently to the initial contact by the research team. (2) To explore the reactions, reasons for participation, and comments of both the informants of suicide and control cases to psychological autopsy interviews. (3) To investigate the impact of the interviews on informants of suicide cases about a month after the interviews. Methods: A self-report questionnaire was used for the informants of both suicide and control cases. Telephone follow-up interviews were conducted with the informants of suicide cases. Results: The majority of the informants of suicide cases, regardless of the initial route of contact, as well as the control cases were positive about being approached to take part in the study. A minority of informants of suicide and control cases found the experience of talking about their family member to be more upsetting than expected. The telephone follow-up interviews showed that none of the informants of suicide cases reported being distressed by the psychological autopsy interviews. Limitations: The acceptance rate for our original psychological autopsy study was modest. Conclusions: The findings of this study are useful for future participants and researchers in measuring the potential benefits and risks of participating in similar sensitive research. Psychological autopsy interviews may be utilized as an active engagement approach to reach out to the people bereaved by suicide, especially in places where the postvention work is underdeveloped.


2008 ◽  
Author(s):  
Daniel P. Jenkins ◽  
Neville A. Stanton ◽  
Paul M. Salmon ◽  
Guy H. Walker

2018 ◽  
Vol 5 (2) ◽  
pp. 73-83
Author(s):  
Hussein Abed Ghannam

WhatsApp is a giant mobile instant message IM application with over 1billion users. The huge usage of IM like WhatsApp through giant smart phone “Android” makes the digital forensic researchers to study deeply. The artefacts left behind in the smartphone play very important role in any electronic crime, or any terror attack. “WhatsApp” as a biggest IM in the globe is considered to be very important resource for information gathering about any digital crime. Recently, end-to-end encryption and many other important features were added and no device forensic analysis or network forensic analysis studies have been performed to the time of writing this paper. This paper explains how can we able to extract the Crypt Key of “WhatsApp” to decrypt the databases and extract precious artefacts resides in the android system without rooting the device. Artefacts that extracted from the last version of WhatsApp have been analysed and correlate to give new valuable evidentiary traces that help in investigating. Many hardware and software tools for mobile and forensics are used to collect as much digital evidence as possible from persistent storage on android device. Some of these tools are commercial like UFED Cellebrite and Andriller, and other are open source tools such as autopsy, adb, WhatCrypt. All of these tools that forensically sound accompanied this research to discover a lot of artefacts resides in android internal storage in WhatsApp application.


2014 ◽  
Vol 1 (3) ◽  
pp. 3-7
Author(s):  
O. Zhukorskyy ◽  
O. Hulay

Aim. To estimate the impact of in vivo secretions of water plantain (Alisma plantago-aquatica) on the popula- tions of pathogenic bacteria Erysipelothrix rhusiopathiae. Methods. The plants were isolated from their natural conditions, the roots were washed from the substrate residues and cultivated in laboratory conditions for 10 days to heal the damage. Then the water was changed; seven days later the selected samples were sterilized using fi lters with 0.2 μm pore diameter. The dilution of water plantain root diffusates in the experimental samples was 1:10–1:10,000. The initial density of E. rhusiopathiae bacteria populations was the same for both experimental and control samples. The estimation of the results was conducted 48 hours later. Results. When the dilution of root diffusates was 1:10, the density of erysipelothrixes in the experimental samples was 11.26 times higher than that of the control, on average, the dilution of 1:100 − 6.16 times higher, 1:1000 – 3.22 times higher, 1:10,000 – 1.81 times higher, respectively. Conclusions. The plants of A. plantago-aquatica species are capable of affecting the populations of E. rhusiopathiae pathogenic bacteria via the secretion of biologically active substances into the environment. The consequences of this interaction are positive for the abovementioned bacteria, which is demon- strated by the increase in the density of their populations in the experiment compared to the control. The intensity of the stimulating effect on the populations of E. rhusiopathiae in the root diffusates of A. plantago-aquatica is re- ciprocally dependent on the degree of their dilution. The investigated impact of water plantain on erysipelothrixes should be related to the topical type of biocenotic connections, the formation of which between the test species in the ecosystems might promote maintaining the potential of natural focus of rabies. Keywords: Alisma plantago-aquatica, in vivo secretions, Erysipelothrix rhusiopathiae, population density, topical type of connections.


Sign in / Sign up

Export Citation Format

Share Document