Most Recent Additions*
A New Distributed Chinese Wall Security Policy Model
Saad Fehis, Omar Nouali, and Mohand-Tahar Kechadi
A Survey of Social Network Forensics
Umit Karabiyik, Muhammed Abdullah Canbaz, Ahmet Aksoy, Tayfun Tuna, Esra Akbas, Bilal Gonen, and Ramazan S. Aygun
Leveraging the Windows Amcache.hve File in Forensic Investigations
Bhupendra Singh and Upasna Singh
The 2016 Analysis of Information Remaining on Computer Hard Disks Offered for Sale on the Second Hand Market in the UAE
Thomas Martin, Andy Jones, and Mohammed Alzaabi
Bloom Filters Optimized Wu-Manber for Intrusion Detection
Monther Aldwairia, Koloud Al-Khamaiseh, Fatima Alharbi, and Babar Shah
On the Interaction between Gravity Waves and Atmospheric Thermal Tides
Ryan Matthew Agner
Developing Deliberate Practices for PS150 and ES204
Yan Tang Ph.D. and Bereket Berhane Ph.D.
HS280 Professional Skills in Homeland Security: Incorporating Research Skills
Elisabeth H. Murray Ph.D.
Utilizing the Power of Games in Enhancing Student Learning
Farshid Azadian Ph.D.
Differential Spectral Imaging of the CN Violet Band in Laser-Induced Plasmas on TNT Simulant Molecules
J. Merten, M. Jones, S. Hoke, and Susan D. Allen
Standoff Methods for the Detection of Threat Agents: A Review of Several Promising Laser-Based Techniques
J. Bruce Johnson, Susan D. Allen, Jonathan Merten, Lewis Johnson, Daniel Pinkham, and Scott W. Reeve
*Updated as of 05/23/17.