11,598 research outputs found

    Tiv-Model : an empirically validated design methodology for complex space systems

    Get PDF
    In response to emergent space systems engineering industry challenges, this thesis explored work on the following; 1. The development of engineering design methodologies, following a design process and proposing a baseline of requirements for new methodologies called the “Methodology Requirements Document”. 2. A new design engineering methodology called the “Tiv-Model”, which combines novel academic research into a space systems engineering life cycle model that addresses the emergent challenges. 3. A procedure for verifying and validating design models, based on an existing technique called the “Validation Square”, incorporated to boost the waning confidence industry drivers have of academic models. Through literature research, the Methodology Requirements Document is formed, and the TivModel is created with the aim of optimising the development of space systems. Its novel aspects include a model-based verification technique (called multi-perspective modelling), a focus on teachability for novice engineers and incorporation of other new academic findings, to utilise useful research. The verification and validation of the Tiv-Model is used as an example to create a procedure for academics to validate their own models. A combination of comparative benchmark studies and a focus group was used to continuously improve the model and drive it through the design process. The Tiv-Model rated better in student projects than its benchmark (V-Model) in 13 out of 24 survey categories in a t-test study, and underwent changes requested by industry veterans to finalise the model.In response to emergent space systems engineering industry challenges, this thesis explored work on the following; 1. The development of engineering design methodologies, following a design process and proposing a baseline of requirements for new methodologies called the “Methodology Requirements Document”. 2. A new design engineering methodology called the “Tiv-Model”, which combines novel academic research into a space systems engineering life cycle model that addresses the emergent challenges. 3. A procedure for verifying and validating design models, based on an existing technique called the “Validation Square”, incorporated to boost the waning confidence industry drivers have of academic models. Through literature research, the Methodology Requirements Document is formed, and the TivModel is created with the aim of optimising the development of space systems. Its novel aspects include a model-based verification technique (called multi-perspective modelling), a focus on teachability for novice engineers and incorporation of other new academic findings, to utilise useful research. The verification and validation of the Tiv-Model is used as an example to create a procedure for academics to validate their own models. A combination of comparative benchmark studies and a focus group was used to continuously improve the model and drive it through the design process. The Tiv-Model rated better in student projects than its benchmark (V-Model) in 13 out of 24 survey categories in a t-test study, and underwent changes requested by industry veterans to finalise the model

    Idiographic Digital Profiling: Behavioral Analysis Based On Digital Forensics

    Get PDF
    Idiographic digital profiling (IDP) is the application of behavioral analysis to the field of digital forensics. Previous work in this field takes a nomothetic approach to behavioral analysis by attempting to understand the aggregate behaviors of cybercriminals. This work is the first to take an idiographic approach by examining a particular subject\u27s digital footprints for immediate use in an ongoing investigation. IDP provides a framework for investigators to analyze digital behavioral evidence for the purposes of case planning, subject identification, lead generation, obtaining and executing warrants, and prosecuting offenders

    ALT-C 2010 - Conference Introduction and Abstracts

    Get PDF

    Delivering the recommendations of the Fraud Review 2006 and the paradox of police leadership

    Get PDF
    The purpose of this context statement is to investigate those factors which either contributed towards or impeded delivery of key recommendations from the Fraud Review, Attorney General (2006). These public works comprise three independent but intrinsically linked projects; the National Fraud Reporting Centre (NFRC), National Fraud Intelligence Bureau (NFIB) and the Economic Crime Academy (ECA). Critical analysis shows how the success of each project influenced and contributed directly to the next project. Examination is made of how, without vision and the continuity of leadership, these public works would either not exist today or would have failed to be as successful as they are. Reflection upon this, together with analyses of individual and organisational leadership styles, stimulated two unavoidable and fundamental questions to be raised: What does the Police Service now stand for? Is the current model of police leadership fit for purpose? Critical analysis of the role of police leadership in the delivery of these public works led to a further, specific question: Is the police response to fraud appropriate? This is because police responses to fraud often appear to be in conflict with Peelian Principles, ACPO (2012) and are more biased towards serving the criminal justice system rather than delivering social justice through interventions that are morally and ethically grounded. On commencement of this context statement the intention was for it to be read by like-minded leaders and visionaries, those who do not fit the norm or stereotype of a typical police manager; as the context statement evolved so too has the intended readership. Throughout reflective assessment and consideration of police leadership and today’s performance culture, it became increasingly apparent that this subject should be core reading for police leaders of the future. However, on completion of the context statement, it is apparent that readership audience should extend beyond the Police Service and the policy makers within government and the Ministry of Justice. The real audience should be the public we serve, those with whose consent we police. Therefore, it seems logical that public should be the ultimate critical assessors of this contribution, together with the effectiveness and appropriateness of the current and ongoing culture of police leadership and the response to fraud

    A structured approach to malware detection and analysis in digital forensics investigation

    Get PDF
    A thesis submitted to the University of Bedfordshire in partial fulfilment of the requirement for the degree of PhDWithin the World Wide Web (WWW), malware is considered one of the most serious threats to system security with complex system issues caused by malware and spam. Networks and systems can be accessed and compromised by various types of malware, such as viruses, worms, Trojans, botnet and rootkits, which compromise systems through coordinated attacks. Malware often uses anti-forensic techniques to avoid detection and investigation. Moreover, the results of investigating such attacks are often ineffective and can create barriers for obtaining clear evidence due to the lack of sufficient tools and the immaturity of forensics methodology. This research addressed various complexities faced by investigators in the detection and analysis of malware. In this thesis, the author identified the need for a new approach towards malware detection that focuses on a robust framework, and proposed a solution based on an extensive literature review and market research analysis. The literature review focussed on the different trials and techniques in malware detection to identify the parameters for developing a solution design, while market research was carried out to understand the precise nature of the current problem. The author termed the new approaches and development of the new framework the triple-tier centralised online real-time environment (tri-CORE) malware analysis (TCMA). The tiers come from three distinctive phases of detection and analysis where the entire research pattern is divided into three different domains. The tiers are the malware acquisition function, detection and analysis, and the database operational function. This framework design will contribute to the field of computer forensics by making the investigative process more effective and efficient. By integrating a hybrid method for malware detection, associated limitations with both static and dynamic methods are eliminated. This aids forensics experts with carrying out quick, investigatory processes to detect the behaviour of the malware and its related elements. The proposed framework will help to ensure system confidentiality, integrity, availability and accountability. The current research also focussed on a prototype (artefact) that was developed in favour of a different approach in digital forensics and malware detection methods. As such, a new Toolkit was designed and implemented, which is based on a simple architectural structure and built from open source software that can help investigators develop the skills to critically respond to current cyber incidents and analyses

    The future of Cybersecurity in Italy: Strategic focus area

    Get PDF
    This volume has been created as a continuation of the previous one, with the aim of outlining a set of focus areas and actions that the Italian Nation research community considers essential. The book touches many aspects of cyber security, ranging from the definition of the infrastructure and controls needed to organize cyberdefence to the actions and technologies to be developed to be better protected, from the identification of the main technologies to be defended to the proposal of a set of horizontal actions for training, awareness raising, and risk management
    • …
    corecore