researchr
explore
Tags
Journals
Conferences
Authors
Profiles
Groups
calendar
New Conferences
Events
Deadlines
search
search
You are not signed in
Sign in
Sign up
Links
Filter by Year
OR
AND
NOT
1
2005
Filter by Tag
OR
AND
NOT
1
C++
Meta-Environment
abstraction
analysis
architecture
case study
context-aware
data-flow
meta-model
meta-objects
mobile
ontologies
ontology
principles
protocol
rule-based
security
systematic-approach
Filter by Author
[+]
OR
AND
NOT
1
Aki-Mauri Huhtinen
Alan Miller
Andrew Blyth
Andrew Jones
Grigorios Fragkos
Iain Sutherland
Jamie Graves
Jill Slay
Lazaros Gymnopoulos
Leigh Armistead
Lionel Saliou
Matthew J. Warren
Mikko Voipio
Rauno Kuusisto
Stefanos Gritzalis
Teemupekka Virtanen
Tom Wilsdon
Tuija Kuusisto
Vivienne Mee
William J. Buchanan
Filter by Top terms
[+]
OR
AND
NOT
1
analysis
assessment
australia
australian
data
detection
environment
forensic
framework
information
infrastructure
intrusion
need
network
operations
protection
security
threat
using
warfare
ECIW (eciw)
Editions
Publications
Viewing Publication 1 - 45 from 45
2005
4th European Conference on Information Warfare and Security, University of Glamorgan, UK, 11-12 July 2005
Academic Conferences Limited, Reading, UK,
2005.
Governance Principles for Sharing Information in the Network Enabled Capability (NEC) Environment
Debi Ashenden
.
eciw 2005
:
1-8
Data Unification and Data Fusion of Intrusion Detection Logs in a Network Centric Environment
Nikolaos Avourdiadis
,
Andrew Blyth
.
eciw 2005
:
9-20
Incorporating Security Requirements Into the Software Development Process
Theodoros Balopoulos
,
Stelios Dritsas
,
Lazaros Gymnopoulos
,
Maria Karyda
,
Spyros Kokolakis
,
Stefanos Gritzalis
.
eciw 2005
:
21-28
Securing Against the Possibility of an Improbable Event: Concepts for Managing Predictable Threats and Normal Compromises
Richard Baskerville
,
Robert Sainsbury
.
eciw 2005
:
29-38
Development of a Zero-Skills Forensic Laptop Registration and Identification Tool
Barry Blundell
,
Huang Xiao Dong
,
Jill Slay
,
Benjamin Turnbull
,
Tom Wilsdon
.
eciw 2005
:
39-46
Agent-based Forensic Investigations with an Integrated Framework
William J. Buchanan
,
Jamie Graves
,
Lionel Saliou
,
H. Al Sebea
,
Nikos Migas
.
eciw 2005
:
47-52
An Approach for Critical Information Infrastructure Protection
T. B. Busuttil
,
Matthew J. Warren
.
eciw 2005
:
53-62
Securing the Infrastructure in Information Operations
Catharina Candolin
.
eciw 2005
:
63-72
Content Analysis as a Tool of Information Warfare
Geoffrey Darnton
.
eciw 2005
:
73-82
Is NATO in Need of a Renewed Security Concept?
Marios Panagiotis Efthymiopoulos
.
eciw 2005
:
83-90
Architecture for Near Real-Time Threat Assessment Using IDS Data
Grigorios Fragkos
,
Andrew Blyth
.
eciw 2005
:
91-98
The use of Computers Idle-Time and Parallel Processing Over a Network to Perform Password Threat Assessment
Grigorios Fragkos
,
Konstantinos Xynos
,
Andrew Blyth
.
eciw 2005
:
99-106
Introducing Ontology-based Security Policy Management in the Grid
Lazaros Gymnopoulos
,
Stefanos Gritzalis
.
eciw 2005
:
107-116
Electromagnetic (EM) Susceptibility of information Systems - The Need for Em Detection
Richard Hoad
,
Andrew Blyth
.
eciw 2005
:
117-128
Analysis of Information Security Risks: Policy for Protection Through to Implementation
Kay Hughes
,
Simon R. Wiseman
.
eciw 2005
:
129-140
Pre-emptive Military Action: The Fight for Recipients - War as a Part of Story Society Created by the Media
Aki-Mauri Huhtinen
.
eciw 2005
:
141-150
The Will and Information Operations
William Hutchinson
.
eciw 2005
:
151-156
Finite Field Parallel Multiplier for FPGA
Lory Kimsoeun
,
Takakazu Kurokawa
,
Keisuke Iwai
.
eciw 2005
:
157-164
Risk Consequence Analysis as a Part of Anticipatory Decision-Making Using a Bayesian Network
Pertti Kuokkanen
.
eciw 2005
:
165-174
Common Operational Picture, Situation Awareness and Information Operations
Rauno Kuusisto
,
Tuija Kuusisto
,
Leigh Armistead
.
eciw 2005
:
175-186
Information Needs of Strategic Level Decision-Makers in Crisis Situations
Tuija Kuusisto
,
Rauno Kuusisto
,
Terhi Yliniemi
.
eciw 2005
:
187-194
The Evolution of US Military Conceptions of Information Warfare and Information Operations, 1979-2004: An Initial Report
Tara Leweling
,
Ron Walters
.
eciw 2005
:
195-204
An Evaluation Framework for the Analysis of Covert Channels in the TCP/IP Protocol Suite
David Llamas
,
Alan Miller
,
Colin Allison
.
eciw 2005
:
205-214
The Threat Response Spy Files: A Case Study About an Arms Manufacturer, a Private Intelligence Company and Many Infiltrators
Eveline Lubbers
.
eciw 2005
:
215-224
Windows Event Logs and Their Forensic Usefulness
Vivienne Mee
,
Iain Sutherland
.
eciw 2005
:
225-238
Phish or Treat? Understanding the Tactics and Responses to Electronic Identity Theft on the Internet
Evangelos Moustakas
,
Penny Duquenoy
,
C. Ranganathan
.
eciw 2005
:
239-248
Australian Commercial - Critical Infrastructure Management Protection
Graeme Pye
,
Matthew J. Warren
.
eciw 2005
:
249-360
Targeting a Warlord - The Challenges of Information Operations in Afghanistan
Jari Rantapelkonen
.
eciw 2005
:
261-270
A Two-Tier Intrusion Detection System for Mobile Ad Hoc Networks
Shukor A. Razak
,
Steven Furnell
,
Phillip J. Brooke
.
eciw 2005
:
271-280
Visualisation Techniques: Their Application Within Unified Intrusion Detection Systems Data
Huw Read
,
Andrew Blyth
.
eciw 2005
:
281-292
Inside and out? The Information Security Threat From Insiders
Robert Rowlingson
.
eciw 2005
:
293-302
Novel Framework for Automated Security Abstraction, Modelling, Implementation and Verification
Lionel Saliou
,
William J. Buchanan
,
Jamie Graves
,
Jose Munoz
.
eciw 2005
:
303-312
Security in Symbian Smartphones: Threats, Needed Functionalities and Existing Implementations
Ville Salmensuu
,
Joakim Koskela
,
Teemupekka Virtanen
.
eciw 2005
:
313-324
Information Operations Education: Lessons Learned from Information Assurance
Corey D. Schou
,
Dan Kuehl
,
Leigh Armistead
.
eciw 2005
:
325-334
Technical Comparison of Domain Keys and Sender ID
Pekka Sillanpää
,
Mikko Voipio
,
Teemupekka Virtanen
.
eciw 2005
:
335-344
The use of Balanced Scorecards for Information Security
Michael Stubbings
.
eciw 2005
:
345-354
Distribution of Offensive Material Over Computer Networks: A Research Agenda
Theodore Tryfonas
,
Vivienne Mee
,
Iain Sutherland
,
Paula Thomas
.
eciw 2005
:
355-362
Issues Relating to the Forensics Analysis of PDA and Telephony (PDAT) Enabled Devices
Craig Valli
.
eciw 2005
:
363-368
Analyzing Threat Agents and Their Attributes
Stilianos Vidalis
,
Andrew Jones
.
eciw 2005
:
369-380
Mail Stream Analysis Using Self-Organizing Map
Mikko Voipio
.
eciw 2005
:
381-390
Is There a Need for Enhancing National Security Against Terrorists Conducting Information Warfare? A Confident Performance for Australia Context
Ken Webb
.
eciw 2005
:
391-400
Where are the Policies for PDA Usage in the Australian Healthcare Environment?
Patricia A. H. Williams
.
eciw 2005
:
401-408
Towards A Validation Framework for Forensic Computing Tools in Australia
Tom Wilsdon
,
Jill Slay
.
eciw 2005
:
409-414
Information Security Culture and Leadership
Omar Zakaria
.
eciw 2005
:
415
Sign in
or
sign up
to see more results.