Learn More
OBJECTIVE This pilot study evaluated hypotheses concerning the relationship between cerebral hypoperfusion and residual deficits in the functioning of frontal brain systems in abstinent long-term alcoholics. METHOD The participants (N = 22) were 10 healthy, abstinent alcoholics (9 men) and 12 age-equivalent nonalcoholic controls (10 men). Cerebral blood(More)
Keywords: Digital forensics Memory analysis Operating system fingerprinting Approximate matching sdhash a b s t r a c t The correct identification of operating system kernel versions is the first critical step in deep memory analysiseit enables the precise parsing of the kernel data structures and the correct interpretation of the observed system state.(More)
—We present the site-specific signal strength measurement results for path loss, shadowing, and fading in 2.4GHz band under typical harsh environment (high temperature 40-50 C and humidity 80-90%). We use spectrum analyzer Rohde & Schwarz FSH8 and InSSIDer (free software for WLANs). Measurements are taken in indoor and outdoor environments at various(More)
Given the recent emergence of the smart grid and smart grid related technologies, their security is a prime concern. Intrusion detection provides a second line of defence. However, conventional intrusion detection systems (IDSs) are unable to adequately address the unique requirements of the smart grid. This paper presents a gap analysis of contemporary(More)
Digital forensic examiners often need to identify the type of a file or file fragment based on the content of the file. Content-based file type identification schemes typically use a byte frequency distribution with statistical machine learning to classify file types. Most algorithms analyze the entire file content to obtain the byte frequency distribution,(More)
When security incidents occur, several challenges exist for conducting an effective forensic investigation of SCADA systems, which run 24/7 to control and monitor industrial and infrastructure processes. The Web extra at http://youtu.be/L0EFnr-famg is an audio interview with Irfan Ahmed about SCADA (supervisory control and data acquisition) systems.
This paper presents an energy efficient cluster ID based routing scheme with maximum residual node energy as one of routing metrics. The uneven load in network is minimized by cluster size adaptation technique. Our new routing protocol CIDRSN (Cluster ID based Routing in Sensor Networks) takes the cluster ID as next hop address instead of cluster-head ID)(More)
This paper presents an energy efficient selection of cooperative nodes with respect to their geographical location and the number of nodes participating in cooperative communications in wireless sensor networks. The cooperative communication in wireless sensor networks (WSN) gives us leverage to get the inherent advantages of its random node's locations and(More)
Identifying the file type (TXT, EXE, JPEG, etc.) is important for computer security applications such as computer forensics, steganalysis, and antivirus programs. The common approach for this is to use file extensions , magic numbers, or other header information. However, these are susceptible to tampering or corruption ; for instance, the file extension(More)