9,185 research outputs found
Pemanfaatan Raspberry Pi Untuk Hacking Dan Forensic
Cybercrime because of the people who are not responsible, with the aim of damaging, modifying, and eliminating one's data, one of them with hacking techniques to be able to infiltrate into the data storage makes it easy to commit a crime. Treatment can be performed on cybercrime using forensic science as a problem solver. Cybercrime has digital evidence as traces of a criminal case, with digital evidence forensic science analysis to find out what activities performed on a criminal case. This study analyzed digital evidence on the network by utilizing Raspberry pi as a medium for hacking the network and to obtain digital evidence on the network . The method used to perform analysis of digital evidence is NIST (National Institute of Standards and Technology). Keywords – Cybercrime, Digital evidence, Forensic Science, Hacking, NIST (National Institute of Standards and Technology), Raspberry P
Analisis Digital Forensik Rekaman Kamera CCTV Menggunakan Metode NIST (National Institute of Standards Technology)
Conventional crimes recorded on CCTV (Closed Circuit Television) cameras are increasing, every criminal who is proven to have committed a certain crime will be punished in accordance with statutory regulations. The problem is how a case recorded on a CCTV camera can be used as digital evidence. Digital evidence is closely related to ensuring data security, privacy and integrity while following the stages of the digital forensic identification process. The identification stage using the NIST (National Institute of Standard Technolog) method is used for investigations in finding information related to metadata on CCTV camera footage so that it can provide structured information, describe and process information obtained from digital forensic investigation sources that can be implemented into the Chain of Custody document which aims to be used as legal digital evidence in courtKejahatan konvensional yang terekam kamera CCTV (Closed Circuit Televison) semakin meningkat, setiap pelaku kejahatan yang terbukti melakukan tindak pidana tertentu akan dihukum sesuai dengan peraturan perundang-undangan. Permasalahannya, adalah bagaimana sebuah kasus yang terekam pada kamera CCTV dapat dijadikan sebagai alat bukti digital. Bukti digital berkaitan erat dalam memastikan keamanan, privasi dan integritas data saat mengikuti tahapan proses identifikasi digital forensik. Tahap identifikasi menggunakan metode NIST (National Institute of Standarts Technolog) digunakan untuk investigasi dalam mencari informasi terkait metadata pada rekaman kamera CCTV agar dapat memberikan informasi terstruktur, menggambarkan serta mengolah sebuah informasi yang didapat dari sumber investigasi digital forensik dapat di implementasikan kedalam dokumen Chain of Custody yang bertujuan untuk dapat digunakan sebagai alat bukti digital yang sah dalam pengadila
Microcontroller-based random number generator implementation by using discrete chaotic maps
In recent decades, chaos theory has been used in different engineering applications of different disciplines. Discrete chaotic maps can be used in encryption applications for digital applications. In this study, firstly, Lozi, Tinkerbell and Barnsley Fern discrete chaotic maps are implemented based on microcontroller. Then, microcontroller based random number generator is implemented by using the three different two-dimensional discrete chaotic maps. The designed random number generator outputs are applied to NIST (National Institute of Standards and Technology) 800-22 and FIPS (Federal Information Processing Standard) tests for randomness validity. The random numbers are successful in all tests
How good are MatLab, Octave and Scilab for Computational Modelling?
In this article we test the accuracy of three platforms used in computational
modelling: MatLab, Octave and Scilab, running on i386 architecture and three
operating systems (Windows, Ubuntu and Mac OS). We submitted them to numerical
tests using standard data sets and using the functions provided by each
platform. A Monte Carlo study was conducted in some of the datasets in order to
verify the stability of the results with respect to small departures from the
original input. We propose a set of operations which include the computation of
matrix determinants and eigenvalues, whose results are known. We also used data
provided by NIST (National Institute of Standards and Technology), a protocol
which includes the computation of basic univariate statistics (mean, standard
deviation and first-lag correlation), linear regression and extremes of
probability distributions. The assessment was made comparing the results
computed by the platforms with certified values, that is, known results,
computing the number of correct significant digits.Comment: Accepted for publication in the Computational and Applied Mathematics
journa
Evolución de un diseño funcional en un esquema FBS a través de las terminologías del NIST y B-Cube
Ponencia presentada en el XIII Congreso Internacional de Ingeniería de Proyectos celebrado en Badajoz , 8-10 de julio de 2009The FBS (Function, Behaviour, Structure) framework is broadly used by designers as
methodology for design analysis process, since it allows to represent a design evolution from
a protocols study. This framework allows carrying out computational modelling, this is,
computer applications able to search and combine solution design procedures for a problem
represented by functions. The possibilities of these systems have been increased with the
use of function classifications, this is, the use of taxonomies and ontologies.
The present work shows a design evolution from some given requirements, using
taxonomies provided by the functional basis of NIST (National Institute of Standards and
Technology) and B-Cube model. With this example it is expected to empirically demonstrate
how this model will work into a KBS (Knowledge Based System), and how it can provide
alternative valid solutions for the initial problem, supported by the necessary databases.El marco FBS (Function, Behaviour, Structure) es ampliamente utilizado por los diseñadores
como metodología para el proceso de análisis de diseños, puesto que permite representar la
evolución de un diseño a partir de un estudio de protocolos. Este marco permite llevar a
cabo el modelado computacional, es decir, aplicaciones informáticas capaces de encontrar y
combinar procedimientos de diseños de soluciones para un problema representado por
funciones. Las posibilidades de dichos sistemas se han visto incrementadas gracias a las
clasificaciones de las funciones, es decir, al uso de taxonomías y ontologías.
El presente trabajo presenta la evolución de un diseño a partir de unos requerimientos
dados, a través de las taxonomías propuestas por las functional basis del NIST (National
Institute of Standards and Technology) y por el modelo B-Cube. Con este ejemplo se
pretende demostrar empíricamente cómo funcionaría dicho modelo en un KBS (sistema
basado en el conocimiento), y cómo, apoyado por las bases de datos necesarias, es capaz
de proporcionar soluciones alternativas viables para el enunciado dado
Electromagnetic Wave Scattering by Small Impedance Particles of an Arbitrary Shape
Scattering of electromagnetic (EM) waves by one and many small ()
impedance particles of an arbitrary shape, embedded in a homogeneous
medium, is studied. Analytic formula for the field, scattered by one particle,
is derived. The scattered field is of the order , where
is a number. This field is much larger than in the
Rayleigh-type scattering. An equation is derived for the effective EM field
scattered by many small impedance particles distributed in a bounded domain.
Novel physical effects in this domain are described and discussed
ANALISIS MANAJEMEN RISIKO KEAMANAN JARINGAN MENGGUNAKAN FRAMEWORK NIST
Keamanan suatu jaringan komputer sangat penting bagi suatu jaringan komputer, karena jika terjadi sesuatu maka dapat dimanfaatkan serangan atau penyusupan ke dalam jaringan komputer tersebut. Oleh karena itu, perlu adanya jaminan keamanan jaringan, suatu jaringan (sistem) agar tercipta layanan yang memberikan kenyamanan dan kepercayaan kepada pengguna layanan tersebut, terutama pada saat LAN terhubung ke Internet akan menjadi semakin penting.. Pentingnya penelitian ini adalah untuk mengurangi ancaman yang berdampak negatif pada sistem keamanan informasi, sehingga mengurangi dampak kegagalan sistem informasi dan meminimalkan risiko yang mungkin timbul. Selain itu, analisis sistem keamanan jaringan dilakukan dengan menggunakan Framework NIST (National Institute of Standards Technology), kerangka kerja yang dirancang untuk perhitungan kualitatif berdasarkan analisis sistem keamanan. Analsis risiko keamanan jaringan salah satu perusahaan perbankan berhasil dilakukan dengan menggunakan framework NIST SP800-30 dan ditemukan bahwa sistem keamanan jaringan yang telah berjalan selama ini terdapat seperti backdoor yang memiliki tingkat risiko rendah, packet snifing, spoofing dan rookit sedang, dan Ddos memiliki tingkat risiko yang tinggi
An overview on the evaluated video retrieval tasks at TRECVID 2022
The TREC Video Retrieval Evaluation (TRECVID) is a TREC-style video analysis
and retrieval evaluation with the goal of promoting progress in research and
development of content-based exploitation and retrieval of information from
digital video via open, tasks-based evaluation supported by metrology. Over the
last twenty-one years this effort has yielded a better understanding of how
systems can effectively accomplish such processing and how one can reliably
benchmark their performance. TRECVID has been funded by NIST (National
Institute of Standards and Technology) and other US government agencies. In
addition, many organizations and individuals worldwide contribute significant
time and effort. TRECVID 2022 planned for the following six tasks: Ad-hoc video
search, Video to text captioning, Disaster scene description and indexing,
Activity in extended videos, deep video understanding, and movie summarization.
In total, 35 teams from various research organizations worldwide signed up to
join the evaluation campaign this year. This paper introduces the tasks,
datasets used, evaluation frameworks and metrics, as well as a high-level
results overview.Comment: arXiv admin note: substantial text overlap with arXiv:2104.13473,
arXiv:2009.0998
- …