The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "ECIW"( http://dblp.L3S.de/Venues/ECIW )

URL (DBLP): http://dblp.uni-trier.de/db/conf/eciw

Publication years (Num. hits)
2005 (45)
Publication types (Num. hits)
inproceedings(44) proceedings(1)
Venues (Conferences, Journals, ...)
ECIW(45)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
No Growbag Graphs found.

Results
Found 45 publication records. Showing 45 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Evangelos Moustakas, Penny Duquenoy, C. Ranganathan Phish or Treat? Understanding the Tactics and Responses to Electronic Identity Theft on the Internet. Search on Bibsonomy ECIW The full citation details ... 2005 DBLP  BibTeX  RDF
1Jari Rantapelkonen Targeting a Warlord - The Challenges of Information Operations in Afghanistan. Search on Bibsonomy ECIW The full citation details ... 2005 DBLP  BibTeX  RDF
1Patricia A. H. Williams Where are the Policies for PDA Usage in the Australian Healthcare Environment? Search on Bibsonomy ECIW The full citation details ... 2005 DBLP  BibTeX  RDF
1Ville Salmensuu, Joakim Koskela, Teemupekka Virtanen Security in Symbian Smartphones: Threats, Needed Functionalities and Existing Implementations. Search on Bibsonomy ECIW The full citation details ... 2005 DBLP  BibTeX  RDF
1Debi Ashenden Governance Principles for Sharing Information in the Network Enabled Capability (NEC) Environment. Search on Bibsonomy ECIW The full citation details ... 2005 DBLP  BibTeX  RDF
1Nikolaos Avourdiadis, Andrew Blyth Data Unification and Data Fusion of Intrusion Detection Logs in a Network Centric Environment. Search on Bibsonomy ECIW The full citation details ... 2005 DBLP  BibTeX  RDF
1 4th European Conference on Information Warfare and Security, University of Glamorgan, UK, 11-12 July 2005 Search on Bibsonomy ECIW The full citation details ... 2005 DBLP  BibTeX  RDF
1Richard L. Baskerville, Robert Sainsbury Securing Against the Possibility of an Improbable Event: Concepts for Managing Predictable Threats and Normal Compromises. Search on Bibsonomy ECIW The full citation details ... 2005 DBLP  BibTeX  RDF
1Rauno Kuusisto, Tuija Kuusisto, Leigh Armistead Common Operational Picture, Situation Awareness and Information Operations. Search on Bibsonomy ECIW The full citation details ... 2005 DBLP  BibTeX  RDF
1Theodore Tryfonas, Vivienne Mee, Iain Sutherland, Paula Thomas Distribution of Offensive Material Over Computer Networks: A Research Agenda. Search on Bibsonomy ECIW The full citation details ... 2005 DBLP  BibTeX  RDF
1Stilianos Vidalis, Andrew Jones Analyzing Threat Agents and Their Attributes. Search on Bibsonomy ECIW The full citation details ... 2005 DBLP  BibTeX  RDF
1Tuija Kuusisto, Rauno Kuusisto, Terhi Yliniemi Information Needs of Strategic Level Decision-Makers in Crisis Situations. Search on Bibsonomy ECIW The full citation details ... 2005 DBLP  BibTeX  RDF
1Tara Leweling, Ron Walters The Evolution of US Military Conceptions of Information Warfare and Information Operations, 1979-2004: An Initial Report. Search on Bibsonomy ECIW The full citation details ... 2005 DBLP  BibTeX  RDF
1Grigorios Fragkos, Andrew Blyth Architecture for Near Real-Time Threat Assessment Using IDS Data. Search on Bibsonomy ECIW The full citation details ... 2005 DBLP  BibTeX  RDF
1Shukor Abd Razak, Steven Furnell, Phillip J. Brooke A Two-Tier Intrusion Detection System for Mobile Ad Hoc Networks. Search on Bibsonomy ECIW The full citation details ... 2005 DBLP  BibTeX  RDF
1Eveline Lubbers The Threat Response Spy Files: A Case Study About an Arms Manufacturer, a Private Intelligence Company and Many Infiltrators. Search on Bibsonomy ECIW The full citation details ... 2005 DBLP  BibTeX  RDF
1Aki-Mauri Huhtinen Pre-emptive Military Action: The Fight for Recipients - War as a Part of Story Society Created by the Media. Search on Bibsonomy ECIW The full citation details ... 2005 DBLP  BibTeX  RDF
1Tom Wilsdon, Jill Slay Towards A Validation Framework for Forensic Computing Tools in Australia. Search on Bibsonomy ECIW The full citation details ... 2005 DBLP  BibTeX  RDF
1Marios Panagiotis Efthymiopoulos Is NATO in Need of a Renewed Security Concept? Search on Bibsonomy ECIW The full citation details ... 2005 DBLP  BibTeX  RDF
1Grigorios Fragkos, Konstantinos Xynos, Andrew Blyth The use of Computers Idle-Time and Parallel Processing Over a Network to Perform Password Threat Assessment. Search on Bibsonomy ECIW The full citation details ... 2005 DBLP  BibTeX  RDF
1Huw Read, Andrew Blyth Visualisation Techniques: Their Application Within Unified Intrusion Detection Systems Data. Search on Bibsonomy ECIW The full citation details ... 2005 DBLP  BibTeX  RDF
1Theodoros Balopoulos, Stelios Dritsas, Lazaros Gymnopoulos, Maria Karyda 0001, Spyros Kokolakis, Stefanos Gritzalis Incorporating Security Requirements Into the Software Development Process. Search on Bibsonomy ECIW The full citation details ... 2005 DBLP  BibTeX  RDF
1Lionel Saliou, William J. Buchanan, Jamie Graves, Jose Munoz Novel Framework for Automated Security Abstraction, Modelling, Implementation and Verification. Search on Bibsonomy ECIW The full citation details ... 2005 DBLP  BibTeX  RDF
1Barry Blundell, Huang Xiao Dong, Jill Slay, Benjamin P. Turnbull, Tom Wilsdon Development of a "Zero-Skills" Forensic Laptop Registration and Identification Tool. Search on Bibsonomy ECIW The full citation details ... 2005 DBLP  BibTeX  RDF
1Omar Zakaria Information Security Culture and Leadership. Search on Bibsonomy ECIW The full citation details ... 2005 DBLP  BibTeX  RDF
1Vivienne Mee, Iain Sutherland Windows Event Logs and Their Forensic Usefulness. Search on Bibsonomy ECIW The full citation details ... 2005 DBLP  BibTeX  RDF
1Corey D. Schou, Dan Kuehl, Leigh Armistead Information Operations Education: Lessons Learned from Information Assurance. Search on Bibsonomy ECIW The full citation details ... 2005 DBLP  BibTeX  RDF
1Richard Hoad, Andrew Blyth Electromagnetic (EM) Susceptibility of information Systems - The Need for Em Detection. Search on Bibsonomy ECIW The full citation details ... 2005 DBLP  BibTeX  RDF
1Pertti Kuokkanen Risk Consequence Analysis as a Part of Anticipatory Decision-Making Using a Bayesian Network. Search on Bibsonomy ECIW The full citation details ... 2005 DBLP  BibTeX  RDF
1Michael Stubbings The use of Balanced Scorecards for Information Security. Search on Bibsonomy ECIW The full citation details ... 2005 DBLP  BibTeX  RDF
1Mikko Voipio Mail Stream Analysis Using Self-Organizing Map. Search on Bibsonomy ECIW The full citation details ... 2005 DBLP  BibTeX  RDF
1Ken Webb Is There a Need for Enhancing National Security Against Terrorists Conducting Information Warfare? A Confident Performance for Australia Context. Search on Bibsonomy ECIW The full citation details ... 2005 DBLP  BibTeX  RDF
1Lory Kimsoeun, Takakazu Kurokawa, Keisuke Iwai Finite Field Parallel Multiplier for FPGA. Search on Bibsonomy ECIW The full citation details ... 2005 DBLP  BibTeX  RDF
1Geoffrey Darnton Content Analysis as a Tool of Information Warfare. Search on Bibsonomy ECIW The full citation details ... 2005 DBLP  BibTeX  RDF
1Catharina Candolin Securing the Infrastructure in Information Operations. Search on Bibsonomy ECIW The full citation details ... 2005 DBLP  BibTeX  RDF
1Craig Valli Issues Relating to the Forensics Analysis of PDA and Telephony (PDAT) Enabled Devices. Search on Bibsonomy ECIW The full citation details ... 2005 DBLP  BibTeX  RDF
1Graeme Pye, Matthew J. Warren Australian Commercial - Critical Infrastructure Management Protection. Search on Bibsonomy ECIW The full citation details ... 2005 DBLP  BibTeX  RDF
1Kay Hughes, Simon R. Wiseman Analysis of Information Security Risks: Policy for Protection Through to Implementation. Search on Bibsonomy ECIW The full citation details ... 2005 DBLP  BibTeX  RDF
1William Hutchinson The 'Will' and Information Operations. Search on Bibsonomy ECIW The full citation details ... 2005 DBLP  BibTeX  RDF
1David Llamas, Alan Miller, Colin Allison An Evaluation Framework for the Analysis of Covert Channels in the TCP/IP Protocol Suite. Search on Bibsonomy ECIW The full citation details ... 2005 DBLP  BibTeX  RDF
1T. B. Busuttil, Matthew J. Warren An Approach for Critical Information Infrastructure Protection. Search on Bibsonomy ECIW The full citation details ... 2005 DBLP  BibTeX  RDF
1Robert Rowlingson Inside and out? The Information Security Threat From Insiders. Search on Bibsonomy ECIW The full citation details ... 2005 DBLP  BibTeX  RDF
1William J. Buchanan, Jamie Graves, Lionel Saliou, Hussain Al Sebea, Nikos Migas Agent-based Forensic Investigations with an Integrated Framework. Search on Bibsonomy ECIW The full citation details ... 2005 DBLP  BibTeX  RDF
1Lazaros Gymnopoulos, Stefanos Gritzalis Introducing Ontology-based Security Policy Management in the Grid. Search on Bibsonomy ECIW The full citation details ... 2005 DBLP  BibTeX  RDF
1Pekka Sillanpää, Mikko Voipio, Teemupekka Virtanen Technical Comparison of Domain Keys and Sender ID. Search on Bibsonomy ECIW The full citation details ... 2005 DBLP  BibTeX  RDF
Displaying result #1 - #45 of 45 (100 per page; Change: )
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license