Abstract is missing.
- Governance Principles for Sharing Information in the Network Enabled Capability (NEC) EnvironmentDebi Ashenden. 1-8
- Data Unification and Data Fusion of Intrusion Detection Logs in a Network Centric EnvironmentNikolaos Avourdiadis, Andrew Blyth. 9-20
- Incorporating Security Requirements Into the Software Development ProcessTheodoros Balopoulos, Stelios Dritsas, Lazaros Gymnopoulos, Maria Karyda, Spyros Kokolakis, Stefanos Gritzalis. 21-28
- Securing Against the Possibility of an Improbable Event: Concepts for Managing Predictable Threats and Normal CompromisesRichard Baskerville, Robert Sainsbury. 29-38
- Development of a Zero-Skills Forensic Laptop Registration and Identification ToolBarry Blundell, Huang Xiao Dong, Jill Slay, Benjamin Turnbull, Tom Wilsdon. 39-46
- Agent-based Forensic Investigations with an Integrated FrameworkWilliam J. Buchanan, Jamie Graves, Lionel Saliou, H. Al Sebea, Nikos Migas. 47-52
- An Approach for Critical Information Infrastructure ProtectionT. B. Busuttil, Matthew J. Warren. 53-62
- Securing the Infrastructure in Information OperationsCatharina Candolin. 63-72
- Content Analysis as a Tool of Information WarfareGeoffrey Darnton. 73-82
- Is NATO in Need of a Renewed Security Concept?Marios Panagiotis Efthymiopoulos. 83-90
- Architecture for Near Real-Time Threat Assessment Using IDS DataGrigorios Fragkos, Andrew Blyth. 91-98
- The use of Computers Idle-Time and Parallel Processing Over a Network to Perform Password Threat AssessmentGrigorios Fragkos, Konstantinos Xynos, Andrew Blyth. 99-106
- Introducing Ontology-based Security Policy Management in the GridLazaros Gymnopoulos, Stefanos Gritzalis. 107-116
- Electromagnetic (EM) Susceptibility of information Systems - The Need for Em DetectionRichard Hoad, Andrew Blyth. 117-128
- Analysis of Information Security Risks: Policy for Protection Through to ImplementationKay Hughes, Simon R. Wiseman. 129-140
- Pre-emptive Military Action: The Fight for Recipients - War as a Part of Story Society Created by the MediaAki-Mauri Huhtinen. 141-150
- The Will and Information OperationsWilliam Hutchinson. 151-156
- Finite Field Parallel Multiplier for FPGALory Kimsoeun, Takakazu Kurokawa, Keisuke Iwai. 157-164
- Risk Consequence Analysis as a Part of Anticipatory Decision-Making Using a Bayesian NetworkPertti Kuokkanen. 165-174
- Common Operational Picture, Situation Awareness and Information OperationsRauno Kuusisto, Tuija Kuusisto, Leigh Armistead. 175-186
- Information Needs of Strategic Level Decision-Makers in Crisis SituationsTuija Kuusisto, Rauno Kuusisto, Terhi Yliniemi. 187-194
- The Evolution of US Military Conceptions of Information Warfare and Information Operations, 1979-2004: An Initial ReportTara Leweling, Ron Walters. 195-204
- An Evaluation Framework for the Analysis of Covert Channels in the TCP/IP Protocol SuiteDavid Llamas, Alan Miller, Colin Allison. 205-214
- The Threat Response Spy Files: A Case Study About an Arms Manufacturer, a Private Intelligence Company and Many InfiltratorsEveline Lubbers. 215-224
- Windows Event Logs and Their Forensic UsefulnessVivienne Mee, Iain Sutherland. 225-238
- Phish or Treat? Understanding the Tactics and Responses to Electronic Identity Theft on the InternetEvangelos Moustakas, Penny Duquenoy, C. Ranganathan. 239-248
- Australian Commercial - Critical Infrastructure Management ProtectionGraeme Pye, Matthew J. Warren. 249-360
- Targeting a Warlord - The Challenges of Information Operations in AfghanistanJari Rantapelkonen. 261-270
- A Two-Tier Intrusion Detection System for Mobile Ad Hoc NetworksShukor A. Razak, Steven Furnell, Phillip J. Brooke. 271-280
- Visualisation Techniques: Their Application Within Unified Intrusion Detection Systems DataHuw Read, Andrew Blyth. 281-292
- Inside and out? The Information Security Threat From InsidersRobert Rowlingson. 293-302
- Novel Framework for Automated Security Abstraction, Modelling, Implementation and VerificationLionel Saliou, William J. Buchanan, Jamie Graves, Jose Munoz. 303-312
- Security in Symbian Smartphones: Threats, Needed Functionalities and Existing ImplementationsVille Salmensuu, Joakim Koskela, Teemupekka Virtanen. 313-324
- Information Operations Education: Lessons Learned from Information AssuranceCorey D. Schou, Dan Kuehl, Leigh Armistead. 325-334
- Technical Comparison of Domain Keys and Sender IDPekka Sillanpää, Mikko Voipio, Teemupekka Virtanen. 335-344
- The use of Balanced Scorecards for Information SecurityMichael Stubbings. 345-354
- Distribution of Offensive Material Over Computer Networks: A Research AgendaTheodore Tryfonas, Vivienne Mee, Iain Sutherland, Paula Thomas. 355-362
- Issues Relating to the Forensics Analysis of PDA and Telephony (PDAT) Enabled DevicesCraig Valli. 363-368
- Analyzing Threat Agents and Their AttributesStilianos Vidalis, Andrew Jones. 369-380
- Mail Stream Analysis Using Self-Organizing MapMikko Voipio. 381-390
- Is There a Need for Enhancing National Security Against Terrorists Conducting Information Warfare? A Confident Performance for Australia ContextKen Webb. 391-400
- Where are the Policies for PDA Usage in the Australian Healthcare Environment?Patricia A. H. Williams. 401-408
- Towards A Validation Framework for Forensic Computing Tools in AustraliaTom Wilsdon, Jill Slay. 409-414
- Information Security Culture and LeadershipOmar Zakaria. 415