default search action
4. ECIW 2005: Glamorgan, UK
- 4th European Conference on Information Warfare and Security, University of Glamorgan, UK, 11-12 July 2005. Academic Conferences Limited, Reading, UK 2005
- Debi Ashenden:
Governance Principles for Sharing Information in the Network Enabled Capability (NEC) Environment. ECIW 2005: 1-8 - Nikolaos Avourdiadis, Andrew Blyth:
Data Unification and Data Fusion of Intrusion Detection Logs in a Network Centric Environment. ECIW 2005: 9-20 - Theodoros Balopoulos, Stelios Dritsas, Lazaros Gymnopoulos, Maria Karyda, Spyros Kokolakis, Stefanos Gritzalis:
Incorporating Security Requirements Into the Software Development Process. ECIW 2005: 21-28 - Richard L. Baskerville, Robert Sainsbury:
Securing Against the Possibility of an Improbable Event: Concepts for Managing Predictable Threats and Normal Compromises. ECIW 2005: 29-38 - Barry Blundell, Huang Xiao Dong, Jill Slay, Benjamin P. Turnbull, Tom Wilsdon:
Development of a "Zero-Skills" Forensic Laptop Registration and Identification Tool. ECIW 2005: 39-46 - William J. Buchanan, Jamie Graves, Lionel Saliou, Hussain Al Sebea, Nikos Migas:
Agent-based Forensic Investigations with an Integrated Framework. ECIW 2005: 47-52 - T. B. Busuttil, Matthew J. Warren:
An Approach for Critical Information Infrastructure Protection. ECIW 2005: 53-62 - Catharina Candolin:
Securing the Infrastructure in Information Operations. ECIW 2005: 63-72 - Geoffrey Darnton:
Content Analysis as a Tool of Information Warfare. ECIW 2005: 73-82 - Marios Panagiotis Efthymiopoulos:
Is NATO in Need of a Renewed Security Concept? ECIW 2005: 83-90 - Grigorios Fragkos, Andrew Blyth:
Architecture for Near Real-Time Threat Assessment Using IDS Data. ECIW 2005: 91-98 - Grigorios Fragkos, Konstantinos Xynos, Andrew Blyth:
The use of Computers Idle-Time and Parallel Processing Over a Network to Perform Password Threat Assessment. ECIW 2005: 99-106 - Lazaros Gymnopoulos, Stefanos Gritzalis:
Introducing Ontology-based Security Policy Management in the Grid. ECIW 2005: 107-116 - Richard Hoad, Andrew Blyth:
Electromagnetic (EM) Susceptibility of information Systems - The Need for Em Detection. ECIW 2005: 117-128 - Kay Hughes, Simon R. Wiseman:
Analysis of Information Security Risks: Policy for Protection Through to Implementation. ECIW 2005: 129-140 - Aki-Mauri Huhtinen:
Pre-emptive Military Action: The Fight for Recipients - War as a Part of Story Society Created by the Media. ECIW 2005: 141-150 - William Hutchinson:
The 'Will' and Information Operations. ECIW 2005: 151-156 - Lory Kimsoeun, Takakazu Kurokawa, Keisuke Iwai:
Finite Field Parallel Multiplier for FPGA. ECIW 2005: 157-164 - Pertti Kuokkanen:
Risk Consequence Analysis as a Part of Anticipatory Decision-Making Using a Bayesian Network. ECIW 2005: 165-174 - Rauno Kuusisto, Tuija Kuusisto, Leigh Armistead:
Common Operational Picture, Situation Awareness and Information Operations. ECIW 2005: 175-186 - Tuija Kuusisto, Rauno Kuusisto, Terhi Yliniemi:
Information Needs of Strategic Level Decision-Makers in Crisis Situations. ECIW 2005: 187-194 - Tara Leweling, Ron Walters:
The Evolution of US Military Conceptions of Information Warfare and Information Operations, 1979-2004: An Initial Report. ECIW 2005: 195-204 - David Llamas, Alan Miller, Colin Allison:
An Evaluation Framework for the Analysis of Covert Channels in the TCP/IP Protocol Suite. ECIW 2005: 205-214 - Eveline Lubbers:
The Threat Response Spy Files: A Case Study About an Arms Manufacturer, a Private Intelligence Company and Many Infiltrators. ECIW 2005: 215-224 - Vivienne Mee, Iain Sutherland:
Windows Event Logs and Their Forensic Usefulness. ECIW 2005: 225-238 - Evangelos Moustakas, Penny Duquenoy, C. Ranganathan:
Phish or Treat? Understanding the Tactics and Responses to Electronic Identity Theft on the Internet. ECIW 2005: 239-248 - Graeme Pye, Matthew J. Warren:
Australian Commercial - Critical Infrastructure Management Protection. ECIW 2005: 249-360 - Jari Rantapelkonen:
Targeting a Warlord - The Challenges of Information Operations in Afghanistan. ECIW 2005: 261-270 - Shukor Abd Razak, Steven Furnell, Phillip J. Brooke:
A Two-Tier Intrusion Detection System for Mobile Ad Hoc Networks. ECIW 2005: 271-280 - Huw Read, Andrew Blyth:
Visualisation Techniques: Their Application Within Unified Intrusion Detection Systems Data. ECIW 2005: 281-292 - Robert Rowlingson:
Inside and out? The Information Security Threat From Insiders. ECIW 2005: 293-302 - Lionel Saliou, William J. Buchanan, Jamie Graves, Jose Munoz:
Novel Framework for Automated Security Abstraction, Modelling, Implementation and Verification. ECIW 2005: 303-312 - Ville Salmensuu, Joakim Koskela, Teemupekka Virtanen:
Security in Symbian Smartphones: Threats, Needed Functionalities and Existing Implementations. ECIW 2005: 313-324 - Corey D. Schou, Dan Kuehl, Leigh Armistead:
Information Operations Education: Lessons Learned from Information Assurance. ECIW 2005: 325-334 - Pekka Sillanpää, Mikko Voipio, Teemupekka Virtanen:
Technical Comparison of Domain Keys and Sender ID. ECIW 2005: 335-344 - Michael Stubbings:
The use of Balanced Scorecards for Information Security. ECIW 2005: 345-354 - Theodore Tryfonas, Vivienne Mee, Iain Sutherland, Paula Thomas:
Distribution of Offensive Material Over Computer Networks: A Research Agenda. ECIW 2005: 355-362 - Craig Valli:
Issues Relating to the Forensics Analysis of PDA and Telephony (PDAT) Enabled Devices. ECIW 2005: 363-368 - Stilianos Vidalis, Andrew Jones:
Analyzing Threat Agents and Their Attributes. ECIW 2005: 369-380 - Mikko Voipio:
Mail Stream Analysis Using Self-Organizing Map. ECIW 2005: 381-390 - Ken Webb:
Is There a Need for Enhancing National Security Against Terrorists Conducting Information Warfare? A Confident Performance for Australia Context. ECIW 2005: 391-400 - Patricia A. H. Williams:
Where are the Policies for PDA Usage in the Australian Healthcare Environment? ECIW 2005: 401-408 - Tom Wilsdon, Jill Slay:
Towards A Validation Framework for Forensic Computing Tools in Australia. ECIW 2005: 409-414 - Omar Zakaria:
Information Security Culture and Leadership. ECIW 2005: 415-
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.