4. ECIW 2005:
Glamorgan,
UK
4th European Conference on Information Warfare and Security, University of Glamorgan, UK, 11-12 July 2005.
Academic Conferences Limited, Reading, UK 2005 BibTeX
- Debi Ashenden:
Governance Principles for Sharing Information in the Network Enabled Capability (NEC) Environment.
1-8 BibTeX
- Nikolaos Avourdiadis, Andrew Blyth:
Data Unification and Data Fusion of Intrusion Detection Logs in a Network Centric Environment.
9-20 BibTeX
- Theodoros Balopoulos, Stelios Dritsas, Lazaros Gymnopoulos, Maria Karyda, Spyros Kokolakis, Stefanos Gritzalis:
Incorporating Security Requirements Into the Software Development Process.
21-28 BibTeX
- Richard Baskerville, Robert Sainsbury:
Securing Against the Possibility of an Improbable Event: Concepts for Managing Predictable Threats and Normal Compromises.
29-38 BibTeX
- Barry Blundell, Huang Xiao Dong, Jill Slay, Benjamin Turnbull, Tom Wilsdon:
Development of a "Zero-Skills" Forensic Laptop Registration and Identification Tool.
39-46 BibTeX
- William J. Buchanan, Jamie Graves, Lionel Saliou, H. Al Sebea, Nikos Migas:
Agent-based Forensic Investigations with an Integrated Framework.
47-52 BibTeX
- T. B. Busuttil, Matthew J. Warren:
An Approach for Critical Information Infrastructure Protection.
53-62 BibTeX
- Catharina Candolin:
Securing the Infrastructure in Information Operations.
63-72 BibTeX
- Geoffrey Darnton:
Content Analysis as a Tool of Information Warfare.
73-82 BibTeX
- Marios Panagiotis Efthymiopoulos:
Is NATO in Need of a Renewed Security Concept?
83-90 BibTeX
- Grigorios Fragkos, Andrew Blyth:
Architecture for Near Real-Time Threat Assessment Using IDS Data.
91-98 BibTeX
- Grigorios Fragkos, Konstantinos Xynos, Andrew Blyth:
The use of Computers Idle-Time and Parallel Processing Over a Network to Perform Password Threat Assessment.
99-106 BibTeX
- Lazaros Gymnopoulos, Stefanos Gritzalis:
Introducing Ontology-based Security Policy Management in the Grid.
107-116 BibTeX
- Richard Hoad, Andrew Blyth:
Electromagnetic (EM) Susceptibility of information Systems - The Need for Em Detection.
117-128 BibTeX
- Kay Hughes, Simon R. Wiseman:
Analysis of Information Security Risks: Policy for Protection Through to Implementation.
129-140 BibTeX
- Aki-Mauri Huhtinen:
Pre-emptive Military Action: The Fight for Recipients - War as a Part of Story Society Created by the Media.
141-150 BibTeX
- William Hutchinson:
The 'Will' and Information Operations.
151-156 BibTeX
- Lory Kimsoeun, Takakazu Kurokawa, Keisuke Iwai:
Finite Field Parallel Multiplier for FPGA.
157-164 BibTeX
- Pertti Kuokkanen:
Risk Consequence Analysis as a Part of Anticipatory Decision-Making Using a Bayesian Network.
165-174 BibTeX
- Rauno Kuusisto, Tuija Kuusisto, Leigh Armistead:
Common Operational Picture, Situation Awareness and Information Operations.
175-186 BibTeX
- Tuija Kuusisto, Rauno Kuusisto, Terhi Yliniemi:
Information Needs of Strategic Level Decision-Makers in Crisis Situations.
187-194 BibTeX
- Tara Leweling, Ron Walters:
The Evolution of US Military Conceptions of Information Warfare and Information Operations, 1979-2004: An Initial Report.
195-204 BibTeX
- David Llamas, Alan Miller, Colin Allison:
An Evaluation Framework for the Analysis of Covert Channels in the TCP/IP Protocol Suite.
205-214 BibTeX
- Eveline Lubbers:
The Threat Response Spy Files: A Case Study About an Arms Manufacturer, a Private Intelligence Company and Many Infiltrators.
215-224 BibTeX
- Vivienne Mee, Iain Sutherland:
Windows Event Logs and Their Forensic Usefulness.
225-238 BibTeX
- Evangelos Moustakas, Penny Duquenoy, C. Ranganathan:
Phish or Treat? Understanding the Tactics and Responses to Electronic Identity Theft on the Internet.
239-248 BibTeX
- Graeme Pye, Matthew J. Warren:
Australian Commercial - Critical Infrastructure Management Protection.
249-360 BibTeX
- Jari Rantapelkonen:
Targeting a Warlord - The Challenges of Information Operations in Afghanistan.
261-270 BibTeX
- Shukor A. Razak, Steven Furnell, Phillip J. Brooke:
A Two-Tier Intrusion Detection System for Mobile Ad Hoc Networks.
271-280 BibTeX
- Huw Read, Andrew Blyth:
Visualisation Techniques: Their Application Within Unified Intrusion Detection Systems Data.
281-292 BibTeX
- Robert Rowlingson:
Inside and out? The Information Security Threat From Insiders.
293-302 BibTeX
- Lionel Saliou, William J. Buchanan, Jamie Graves, Jose Munoz:
Novel Framework for Automated Security Abstraction, Modelling, Implementation and Verification.
303-312 BibTeX
- Ville Salmensuu, Joakim Koskela, Teemupekka Virtanen:
Security in Symbian Smartphones: Threats, Needed Functionalities and Existing Implementations.
313-324 BibTeX
- Corey D. Schou, Dan Kuehl, Leigh Armistead:
Information Operations Education: Lessons Learned from Information Assurance.
325-334 BibTeX
- Pekka Sillanpää, Mikko Voipio, Teemupekka Virtanen:
Technical Comparison of Domain Keys and Sender ID.
335-344 BibTeX
- Michael Stubbings:
The use of Balanced Scorecards for Information Security.
345-354 BibTeX
- Theodore Tryfonas, Vivienne Mee, Iain Sutherland, Paula Thomas:
Distribution of Offensive Material Over Computer Networks: A Research Agenda.
355-362 BibTeX
- Craig Valli:
Issues Relating to the Forensics Analysis of PDA and Telephony (PDAT) Enabled Devices.
363-368 BibTeX
- Stilianos Vidalis, Andrew Jones:
Analyzing Threat Agents and Their Attributes.
369-380 BibTeX
- Mikko Voipio:
Mail Stream Analysis Using Self-Organizing Map.
381-390 BibTeX
- Ken Webb:
Is There a Need for Enhancing National Security Against Terrorists Conducting Information Warfare? A Confident Performance for Australia Context.
391-400 BibTeX
- Patricia A. H. Williams:
Where are the Policies for PDA Usage in the Australian Healthcare Environment?
401-408 BibTeX
- Tom Wilsdon, Jill Slay:
Towards A Validation Framework for Forensic Computing Tools in Australia.
409-414 BibTeX
- Omar Zakaria:
Information Security Culture and Leadership.
415- BibTeX
Copyright © Sat May 16 23:08:09 2009
by Michael Ley (ley@uni-trier.de)