Search For:

Displaying 1-11 out of 11 total
Node-Based Probing and Monitoring to Investigate Use of Peer-to-Peer Technologies for Distribution of Contraband Material
Found in: Systematic Approaches to Digital Forensic Engineering, IEEE International Workshop on
By Olfa Nasraoui, Deborah W. Keeling, Adel Elmaghraby, George Higgins, Michael Losavio
Issue Date:May 2008
pp. 135-140
We consider the requirements for node-based probing and monitoring for network forensic investigation of the use of peer-to-peer technologies for distribution of contraband material. The architecture of peer-to-peer (P2P) data exchanges must be examined fo...
 
Does Profiling Make Us More Secure?
Found in: IEEE Security & Privacy Magazine
By Shari Lawrence Pfleeger,Marc Rogers,Masooda Bashir,Kelly Caine,Deanna Caputo,Michael Losavio,Sal Stolfo
Issue Date:July 2012
pp. 10-15
“Profiling” means making predictions about likely user behavior based on collected characteristics and activities. Shari Lawrence Pfleeger and Marc Rogers brought together a group of researchers from a variety of disciplines to discus...
 
Digital System, Evidence & Forensics Issues in Correctional Environments
Found in: Systematic Approaches to Digital Forensic Engineering, IEEE International Workshop on
By Natalie Armstrong, Michael Losavio, Deborah Keeling
Issue Date:May 2010
pp. 141-149
The correctional environment is one of the most controlled in the United States. Despite the regimentedsystem that epitomizes correctional facilities, digital systems have entered that environment as contraband anddata backchannels subject to compromise th...
 
Digital Device & Forensics Concerns in Jails, Prisons and Supervisory Environments
Found in: Systematic Approaches to Digital Forensic Engineering, IEEE International Workshop on
By Natalie Armstrong, Michael Losavio, Deborah Keeling
Issue Date:May 2009
pp. 34-35
We examine concerns relating to digital devices and forensics in jails, prison and supervisedrelease environments. Despite being one of the most controlled physical environments ingovernment, digital devices continue to breach institutional security and in...
 
A Distributed Triage Model for Digital Forensic Services to State and Local Law Enforcement
Found in: Systematic Approaches to Digital Forensic Engineering, IEEE International Workshop on
By Michael Losavio, Deborah Keeling, Adel Elmaghraby
Issue Date:May 2009
pp. 36-37
We propose a distributed triage model for digital forensic services to state local law enforcement. This would permit efficient use of forensic resources by using local law enforcement for basic digital forensic analysis and assigning more complex matters ...
 
Panel: Technical, Social and Legal Frameworks for Digital Forensics and CyberInfrastructure Security
Found in: Systematic Approaches to Digital Forensic Engineering, IEEE International Workshop on
By Jean West, Ulf Lindqvist Peter J. Vasquez, Michael Losavio, Sean Peisert
Issue Date:May 2009
pp. 97-98
A systematic approach to digital forensic engineering acknowledges the close, intertwine relationship between digital forensics and information security. Just as their technical structures are interrelated, so, too, are issues relating to legal and social ...
 
Implications of Attorney Experiences with Digital Forensics and Electronic Evidence in the United States
Found in: Systematic Approaches to Digital Forensic Engineering, IEEE International Workshop on
By Michael Losavio, Deborah W. Keeling, Adel Elmaghraby, George Higgins, John Shutt
Issue Date:May 2008
pp. 79-90
The experiences of lawyers with electronic evidence and digital forensics are examined. The assessment indicates disparate experiences based on case type as to 1) the use of different types of electronic evidence, 2) disputes over that use and 3) utilizati...
 
Network Forensics: Network Data and State Seizures in the United States
Found in: Systematic Approaches to Digital Forensic Engineering, IEEE International Workshop on
By Michael Losavio, Deborah W. Keeling, Adel Elmaghraby, George Higgins, John Shutt
Issue Date:May 2008
pp. 143
Network systems capture data about electronic activity in new, sometimes unprecedented forms. These new forms offer new, powerful tactical tools for investigations of electronic malfeasance under traditional leg al regulation of state power, particular tha...
 
Challenge--Construction of an Adequate Digital Forensics Testbed
Found in: Systematic Approaches to Digital Forensic Engineering, IEEE International Workshop on
By Adel Elmaghraby, James Graham, Jana Godwin, Michael Losavio, Deborah Wilson
Issue Date:April 2007
pp. 147-149
The Challenge - What is an adequate laboratory specification for emulating network attacks and experimenting with network forensics, other digital forensics techniques and social behavioral traits? Could published specifications for different scales of res...
 
Panel: Lawyers, Judges and Digital Forensics: Evaluating Situational Awareness and Evidentiary Skills with Electronic Evidence, from Cybercrime to Civil Lawsuits.
Found in: Systematic Approaches to Digital Forensic Engineering, IEEE International Workshop on
By Michael Losavio
Issue Date:April 2007
pp. 101
This panel of attorneys, and others, will discuss situational awareness and skills of lawyers, judges and computing professionals relating to evidence law and rules of procedure for using electronic evidence and digital forensics. The panel may address the...
   
Positing social and justice models for cyber security
Found in: Proceedings of the Sixth Annual Workshop on Cyber Security and Information Intelligence Research (CSIIRW '10)
By Deborah Keeling, J. Eagle Shutt, Michael Losavio
Issue Date:April 2010
pp. 1-4
Cyber security should consider criminal justice and social education models to secure the highly distributed elements of the information network, extend the effective administration of justice to cybercrime and embed security awareness and competence in en...
     
 1