skip to main content
US FlagAn official website of the United States government
dot gov icon
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
https lock icon
Secure .gov websites use HTTPS
A lock ( lock ) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.


Search for: All records

Award ID contains: 2234710

Note: When clicking on a Digital Object Identifier (DOI) number, you will be taken to an external site maintained by the publisher. Some full text articles may not yet be available without a charge during the embargo (administrative interval).
What is a DOI Number?

Some links on this page may take you to non-federal websites. Their policies may differ from this site.

  1. Free, publicly-accessible full text available August 6, 2026
  2. The increasing prevalence of Internet of Things (IoT) devices has introduced significant challenges in digital forensic investigations, requiring new strategies for effective evidence prioritization and analysis. Traditional forensic methods struggle with data heterogeneity, volatility, and legal constraints, making IoT evidence collection complex and time-sensitive. This paper presents a weighted prioritization model (WPM) that ranks IoT devices based on six forensic criteria, enabling investigators to focus on highpriority evidence first, reducing data loss and optimizing forensic workflows. Through case studies in arson, homicide, and missing person investigations, we demonstrate how WPM enhances investigative decisionmaking and resource allocation in real-world forensic scenarios. The proposed framework offers a structured, scalable, and adaptable approach to IoT forensic investigations, improving efficiency, reliability, and legal compliance in digital evidence collection. 
    more » « less
    Free, publicly-accessible full text available June 1, 2026
  3. Free, publicly-accessible full text available April 24, 2026
  4. In military operations, real-time monitoring of soldiers’ health is essential for ensuring mission success and safeguarding personnel, yet such systems face challenges related to accuracy, security, and resource efficiency. This research addresses the critical need for secure, real-time monitoring of soldier vitals in the field, where operational security and performance are paramount. The paper focuses on implementing a machine-learning-based system capable of predicting the health states of soldiers using vitals such as heart rate (HR), respiratory rate (RESP), pulse, and oxygen saturation SpO2. A comprehensive pipeline was developed, including data preprocessing, the addition of noise, and model evaluation, to identify the best-performing machine learning algorithm. The system was tested through simulations to ensure real-time inference on real-life data, with reliable and accurate predictions demonstrated in dynamic environments. The gradient boosting model was selected due to its high accuracy, robustness to noise, and ability to handle complex feature interactions efficiently. Additionally, a lightweight cryptographic security system with a 16-byte key was integrated to protect sensitive health and location data during transmission. The results validate the feasibility of deploying such a system in resource-constrained field conditions while maintaining data confidentiality and operational security. 
    more » « less
    Free, publicly-accessible full text available February 1, 2026
  5. The proliferation of software tools and automated techniques in digital forensics has brought about some controversies regarding bias and fairness. Different biases exist and have been proven in some civil and criminal cases. In our research, we analyze and discuss these biases present in software tools and automation systems used by law enforcement organizations and in court proceedings. Furthermore, we present real-life cases and scenarios where some of these biases have determined or influenced these cases. We were also able to provide recommendations for reducing bias in software tools, which we hope will be the foundation for a framework that reduces or eliminates bias from software tools used in digital forensics. In conclusion, we anticipate that this research can help increase validation in digital forensics software tools and ensure users' trust in the tools and automation techniques. 
    more » « less