Learn More
Keywords: Digital forensics Memory analysis Operating system fingerprinting Approximate matching sdhash a b s t r a c t The correct identification of operating system kernel versions is the first critical step in deep memory analysiseit enables the precise parsing of the kernel data structures and the correct interpretation of the observed system state.(More)
—We present the site-specific signal strength measurement results for path loss, shadowing, and fading in 2.4GHz band under typical harsh environment (high temperature 40-50 C and humidity 80-90%). We use spectrum analyzer Rohde & Schwarz FSH8 and InSSIDer (free software for WLANs). Measurements are taken in indoor and outdoor environments at various(More)
PURPOSE To measure respiration-induced abdominal organ motion using four-dimensional computed tomography (4D CT) scanning and to examine the organ paths. METHODS AND MATERIALS During 4D CT scanning, consecutive CT images are acquired of the patient at each couch position. Simultaneously, the patient's respiratory pattern is recorded using an external(More)
Classic teaching states that treatment of limited-stage small cell lung cancer (L-SCLC) requires large treatment fields covering the entire mediastinum. However, a trend in modern thoracic radiotherapy is toward more conformal fields, employing positron emission tomography/computed tomography (PET/CT) scans to determine the gross tumor volume (GTV). This(More)
Given the recent emergence of the smart grid and smart grid related technologies, their security is a prime concern. Intrusion detection provides a second line of defence. However, conventional intrusion detection systems (IDSs) are unable to adequately address the unique requirements of the smart grid. This paper presents a gap analysis of contemporary(More)
This paper presents an energy efficient selection of cooperative nodes with respect to their geographical location and the number of nodes participating in cooperative communications in wireless sensor networks. The cooperative communication in wireless sensor networks (WSN) gives us leverage to get the inherent advantages of its random node's locations and(More)
Digital forensic examiners often need to identify the type of a file or file fragment based on the content of the file. Content-based file type identification schemes typically use a byte frequency distribution with statistical machine learning to classify file types. Most algorithms analyze the entire file content to obtain the byte frequency distribution,(More)
This paper presents an energy efficient cluster ID based routing scheme with maximum residual node energy as one of routing metrics. The uneven load in network is minimized by cluster size adaptation technique. Our new routing protocol CIDRSN (Cluster ID based Routing in Sensor Networks) takes the cluster ID as next hop address instead of cluster-head ID)(More)
When security incidents occur, several challenges exist for conducting an effective forensic investigation of SCADA systems, which run 24/7 to control and monitor industrial and infrastructure processes. The Web extra at http://youtu.be/L0EFnr-famg is an audio interview with Irfan Ahmed about SCADA (supervisory control and data acquisition) systems.