Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Evangelos Moustakas, Penny Duquenoy, C. Ranganathan |
Phish or Treat? Understanding the Tactics and Responses to Electronic Identity Theft on the Internet. |
ECIW |
2005 |
DBLP BibTeX RDF |
|
1 | Jari Rantapelkonen |
Targeting a Warlord - The Challenges of Information Operations in Afghanistan. |
ECIW |
2005 |
DBLP BibTeX RDF |
|
1 | Patricia A. H. Williams |
Where are the Policies for PDA Usage in the Australian Healthcare Environment? |
ECIW |
2005 |
DBLP BibTeX RDF |
|
1 | Ville Salmensuu, Joakim Koskela, Teemupekka Virtanen |
Security in Symbian Smartphones: Threats, Needed Functionalities and Existing Implementations. |
ECIW |
2005 |
DBLP BibTeX RDF |
|
1 | Debi Ashenden |
Governance Principles for Sharing Information in the Network Enabled Capability (NEC) Environment. |
ECIW |
2005 |
DBLP BibTeX RDF |
|
1 | Nikolaos Avourdiadis, Andrew Blyth |
Data Unification and Data Fusion of Intrusion Detection Logs in a Network Centric Environment. |
ECIW |
2005 |
DBLP BibTeX RDF |
|
1 | |
4th European Conference on Information Warfare and Security, University of Glamorgan, UK, 11-12 July 2005 |
ECIW |
2005 |
DBLP BibTeX RDF |
|
1 | Richard L. Baskerville, Robert Sainsbury |
Securing Against the Possibility of an Improbable Event: Concepts for Managing Predictable Threats and Normal Compromises. |
ECIW |
2005 |
DBLP BibTeX RDF |
|
1 | Rauno Kuusisto, Tuija Kuusisto, Leigh Armistead |
Common Operational Picture, Situation Awareness and Information Operations. |
ECIW |
2005 |
DBLP BibTeX RDF |
|
1 | Theodore Tryfonas, Vivienne Mee, Iain Sutherland, Paula Thomas |
Distribution of Offensive Material Over Computer Networks: A Research Agenda. |
ECIW |
2005 |
DBLP BibTeX RDF |
|
1 | Stilianos Vidalis, Andrew Jones |
Analyzing Threat Agents and Their Attributes. |
ECIW |
2005 |
DBLP BibTeX RDF |
|
1 | Tuija Kuusisto, Rauno Kuusisto, Terhi Yliniemi |
Information Needs of Strategic Level Decision-Makers in Crisis Situations. |
ECIW |
2005 |
DBLP BibTeX RDF |
|
1 | Tara Leweling, Ron Walters |
The Evolution of US Military Conceptions of Information Warfare and Information Operations, 1979-2004: An Initial Report. |
ECIW |
2005 |
DBLP BibTeX RDF |
|
1 | Grigorios Fragkos, Andrew Blyth |
Architecture for Near Real-Time Threat Assessment Using IDS Data. |
ECIW |
2005 |
DBLP BibTeX RDF |
|
1 | Shukor Abd Razak, Steven Furnell, Phillip J. Brooke |
A Two-Tier Intrusion Detection System for Mobile Ad Hoc Networks. |
ECIW |
2005 |
DBLP BibTeX RDF |
|
1 | Eveline Lubbers |
The Threat Response Spy Files: A Case Study About an Arms Manufacturer, a Private Intelligence Company and Many Infiltrators. |
ECIW |
2005 |
DBLP BibTeX RDF |
|
1 | Aki-Mauri Huhtinen |
Pre-emptive Military Action: The Fight for Recipients - War as a Part of Story Society Created by the Media. |
ECIW |
2005 |
DBLP BibTeX RDF |
|
1 | Tom Wilsdon, Jill Slay |
Towards A Validation Framework for Forensic Computing Tools in Australia. |
ECIW |
2005 |
DBLP BibTeX RDF |
|
1 | Marios Panagiotis Efthymiopoulos |
Is NATO in Need of a Renewed Security Concept? |
ECIW |
2005 |
DBLP BibTeX RDF |
|
1 | Grigorios Fragkos, Konstantinos Xynos, Andrew Blyth |
The use of Computers Idle-Time and Parallel Processing Over a Network to Perform Password Threat Assessment. |
ECIW |
2005 |
DBLP BibTeX RDF |
|
1 | Huw Read, Andrew Blyth |
Visualisation Techniques: Their Application Within Unified Intrusion Detection Systems Data. |
ECIW |
2005 |
DBLP BibTeX RDF |
|
1 | Theodoros Balopoulos, Stelios Dritsas, Lazaros Gymnopoulos, Maria Karyda 0001, Spyros Kokolakis, Stefanos Gritzalis |
Incorporating Security Requirements Into the Software Development Process. |
ECIW |
2005 |
DBLP BibTeX RDF |
|
1 | Lionel Saliou, William J. Buchanan, Jamie Graves, Jose Munoz |
Novel Framework for Automated Security Abstraction, Modelling, Implementation and Verification. |
ECIW |
2005 |
DBLP BibTeX RDF |
|
1 | Barry Blundell, Huang Xiao Dong, Jill Slay, Benjamin P. Turnbull, Tom Wilsdon |
Development of a "Zero-Skills" Forensic Laptop Registration and Identification Tool. |
ECIW |
2005 |
DBLP BibTeX RDF |
|
1 | Omar Zakaria |
Information Security Culture and Leadership. |
ECIW |
2005 |
DBLP BibTeX RDF |
|
1 | Vivienne Mee, Iain Sutherland |
Windows Event Logs and Their Forensic Usefulness. |
ECIW |
2005 |
DBLP BibTeX RDF |
|
1 | Corey D. Schou, Dan Kuehl, Leigh Armistead |
Information Operations Education: Lessons Learned from Information Assurance. |
ECIW |
2005 |
DBLP BibTeX RDF |
|
1 | Richard Hoad, Andrew Blyth |
Electromagnetic (EM) Susceptibility of information Systems - The Need for Em Detection. |
ECIW |
2005 |
DBLP BibTeX RDF |
|
1 | Pertti Kuokkanen |
Risk Consequence Analysis as a Part of Anticipatory Decision-Making Using a Bayesian Network. |
ECIW |
2005 |
DBLP BibTeX RDF |
|
1 | Michael Stubbings |
The use of Balanced Scorecards for Information Security. |
ECIW |
2005 |
DBLP BibTeX RDF |
|
1 | Mikko Voipio |
Mail Stream Analysis Using Self-Organizing Map. |
ECIW |
2005 |
DBLP BibTeX RDF |
|
1 | Ken Webb |
Is There a Need for Enhancing National Security Against Terrorists Conducting Information Warfare? A Confident Performance for Australia Context. |
ECIW |
2005 |
DBLP BibTeX RDF |
|
1 | Lory Kimsoeun, Takakazu Kurokawa, Keisuke Iwai |
Finite Field Parallel Multiplier for FPGA. |
ECIW |
2005 |
DBLP BibTeX RDF |
|
1 | Geoffrey Darnton |
Content Analysis as a Tool of Information Warfare. |
ECIW |
2005 |
DBLP BibTeX RDF |
|
1 | Catharina Candolin |
Securing the Infrastructure in Information Operations. |
ECIW |
2005 |
DBLP BibTeX RDF |
|
1 | Craig Valli |
Issues Relating to the Forensics Analysis of PDA and Telephony (PDAT) Enabled Devices. |
ECIW |
2005 |
DBLP BibTeX RDF |
|
1 | Graeme Pye, Matthew J. Warren |
Australian Commercial - Critical Infrastructure Management Protection. |
ECIW |
2005 |
DBLP BibTeX RDF |
|
1 | Kay Hughes, Simon R. Wiseman |
Analysis of Information Security Risks: Policy for Protection Through to Implementation. |
ECIW |
2005 |
DBLP BibTeX RDF |
|
1 | William Hutchinson |
The 'Will' and Information Operations. |
ECIW |
2005 |
DBLP BibTeX RDF |
|
1 | David Llamas, Alan Miller, Colin Allison |
An Evaluation Framework for the Analysis of Covert Channels in the TCP/IP Protocol Suite. |
ECIW |
2005 |
DBLP BibTeX RDF |
|
1 | T. B. Busuttil, Matthew J. Warren |
An Approach for Critical Information Infrastructure Protection. |
ECIW |
2005 |
DBLP BibTeX RDF |
|
1 | Robert Rowlingson |
Inside and out? The Information Security Threat From Insiders. |
ECIW |
2005 |
DBLP BibTeX RDF |
|
1 | William J. Buchanan, Jamie Graves, Lionel Saliou, Hussain Al Sebea, Nikos Migas |
Agent-based Forensic Investigations with an Integrated Framework. |
ECIW |
2005 |
DBLP BibTeX RDF |
|
1 | Lazaros Gymnopoulos, Stefanos Gritzalis |
Introducing Ontology-based Security Policy Management in the Grid. |
ECIW |
2005 |
DBLP BibTeX RDF |
|
1 | Pekka Sillanpää, Mikko Voipio, Teemupekka Virtanen |
Technical Comparison of Domain Keys and Sender ID. |
ECIW |
2005 |
DBLP BibTeX RDF |
|