ABSTRACT
We describe a research program in cybercrime and computer forensics which relies heavily on research by undergraduates. The goals of this program are to complete projects as defined by clients, but also to allow students to experience the frustrations and enjoyment of solving real-world problems. Furthermore, this experiential approach builds a rich educational environment for students where they must "work for a boss" (faculty member) and with "coworkers" (other students) in a group effort. Overall, students have found the experiences to be beneficial, and we typically have more applicants for the positions than are possible to fill. We describe three of the actual projects used and illustrate our lessons learned.
- National Science Foundation, "Research Experiences for Undergraduates". Retrieved on 7 June 2011 from www.nsf.gov/pubs/2009/nsf09598/nsf09598.pdfGoogle Scholar
- National Science Foundation. "Human Resources". Retrieved on 7 June 2011 from www.nsf.gov/pubs/2008/nsf08011/nsf08011_5.pdfGoogle Scholar
- "Pennsylvania State System of Higher Education". Retrieved on 7 June 2011 from www.passhe.eduGoogle Scholar
- US National Security Agency. "National Centers for Academic Excellence in Information Assurance Education". Retrieved on 7 June 2011 from www.nsa.gov/ia/academic_outreach/nat_cae/Google Scholar
- Michael W. Berry and Murray Browne, "Email Surveillance Using Nonnegative Matrix Factorization," Computational & Mathematical Organization Theory, Volume 11, Issue 3 (October 2005). Google ScholarDigital Library
- The Porter Stemming Algorithm. Retrieved on 29 June 2011 from http://tartarus.org/~martin/PorterStemmer/.Google Scholar
- Alberto Pascual-Montano, J. M. Carazo, Kieko Kochi, Dietrich Lehmann, and Roberto D. Pascual-Marqui, "Nonsmooth Nonnegative Matrix Factorization (nsNMF)," IEEE Transactions on Pattern Analysis and Machine Intelligence, Vol. 28, No. 3, March 2006. Google ScholarDigital Library
- Daniel D. Lee and H. Sebastian Seung, "Learning the parts of objects by non-negative matrix factorization," Nature, Vol. 401, pp. 788--791, October 1999, Stefan Katzenbeisser and Fabien A. P. Petitcolas. Information Hiding Techniques for Steganography and Digital Watermarking. Artech House. Norwood, MA. 2000.Google Scholar
- Apache Subversion. Retrieved on 29 June 2011 from http://subversion.apache.org/.Google Scholar
- TortoiseSVN. Retrieved on 29 June 2011 from http://tortoisesvn.tigris.org/.Google Scholar
- Stefan Katzenbeisser and Fabien A. P. Petitcolas. Information Hiding Techniques for Steganography and Digital Watermarking. Artech House. Norwood, MA. 2000. Google ScholarDigital Library
- David Kahn. The Code Breakers. Scribner. New York, NY. 1967.Google Scholar
- Bin Li, et al. "A Survey on Image Steganography and Steganalysis." Journal of Information Hiding and Multimedia Signal Processing. Volume. 2, Number. 2. Ubiquitous International. April, 2011.Google Scholar
- Changyong Xu and Xijian Ping. "A Steganographic Algorithm in Uncompressed Video Sequence Based on Difference between Adjacent Frames." In Proceedings of the Fourth International Conference on Image and Graphics (ICIG '07). IEEE Computer Society, Washington, DC. 2007. Google ScholarDigital Library
- K. Kancherla and S. Mukkamala. "Video Steganalysis Using Motion Estimation." In Proceedings of the 2009 international joint conference on Neural Networks (IJCNN'09). IEEE Press. Piscataway. 2009. Google ScholarDigital Library
- "FFmpeg." Retrieved on 24 June 2011 from http://www.ffmpeg.org/Google Scholar
- Brandeis University. "The Benefits of Experiential Learning." Retrieved on 29 June 2011 from http://www.brandeis.edu/experientiallearning/forfaculty/benefits.htmlGoogle Scholar
Index Terms
- Undergraduate research in computer forensics
Recommendations
Student and Faculty Perceptions of Undergraduate Research Experiences in Computing
Undergraduate research experiences are promoted and funded for their potential in increasing students’ likelihood of pursuing graduate degrees, increasing their confidence, and expanding their awareness of their discipline and career opportunities. ...
Developing a new digital forensics curriculum
We are developing a new undergraduate certificate program in digital forensics at the University of Illinois at Urbana-Champaign. To create a curriculum consistent with the fundamentally multidisciplinary nature of the field of digital forensics, we ...
An Undergraduate Computational Science Curriculum
ICCS '08: Proceedings of the 8th international conference on Computational Science, Part IIWofford College instituted one of the first undergraduate programs in computational science, the Emphasis in Computational Science (ECS). Besides programming, data structures, and calculus, ECS students take two computational science courses (Modeling ...
Comments