The SCEAS System
Navigation Menu

Conferences in DBLP

European Conference on Information Warfare and Security (eciw)
2005 (conf/eciw/2005)

  1. Debi Ashenden
    Governance Principles for Sharing Information in the Network Enabled Capability (NEC) Environment. [Citation Graph (0, 0)][DBLP]
    ECIW, 2005, pp:1-8 [Conf]
  2. Nikolaos Avourdiadis, Andrew Blyth
    Data Unification and Data Fusion of Intrusion Detection Logs in a Network Centric Environment. [Citation Graph (0, 0)][DBLP]
    ECIW, 2005, pp:9-20 [Conf]
  3. Theodoros Balopoulos, Stelios Dritsas, Lazaros Gymnopoulos, Maria Karyda, Spyros Kokolakis, Stefanos Gritzalis
    Incorporating Security Requirements Into the Software Development Process. [Citation Graph (0, 0)][DBLP]
    ECIW, 2005, pp:21-28 [Conf]
  4. Richard Baskerville, Robert Sainsbury
    Securing Against the Possibility of an Improbable Event: Concepts for Managing Predictable Threats and Normal Compromises. [Citation Graph (0, 0)][DBLP]
    ECIW, 2005, pp:29-38 [Conf]
  5. Barry Blundell, Huang Xiao Dong, Jill Slay, Benjamin Turnbull, Tom Wilsdon
    Development of a "Zero-Skills" Forensic Laptop Registration and Identification Tool. [Citation Graph (0, 0)][DBLP]
    ECIW, 2005, pp:39-46 [Conf]
  6. William J. Buchanan, Jamie Graves, Lionel Saliou, H. Al Sebea, Nikos Migas
    Agent-based Forensic Investigations with an Integrated Framework. [Citation Graph (0, 0)][DBLP]
    ECIW, 2005, pp:47-52 [Conf]
  7. T. B. Busuttil, Matthew J. Warren
    An Approach for Critical Information Infrastructure Protection. [Citation Graph (0, 0)][DBLP]
    ECIW, 2005, pp:53-62 [Conf]
  8. Catharina Candolin
    Securing the Infrastructure in Information Operations. [Citation Graph (0, 0)][DBLP]
    ECIW, 2005, pp:63-72 [Conf]
  9. Geoffrey Darnton
    Content Analysis as a Tool of Information Warfare. [Citation Graph (0, 0)][DBLP]
    ECIW, 2005, pp:73-82 [Conf]
  10. Marios Panagiotis Efthymiopoulos
    Is NATO in Need of a Renewed Security Concept? [Citation Graph (0, 0)][DBLP]
    ECIW, 2005, pp:83-90 [Conf]
  11. Grigorios Fragkos, Andrew Blyth
    Architecture for Near Real-Time Threat Assessment Using IDS Data. [Citation Graph (0, 0)][DBLP]
    ECIW, 2005, pp:91-98 [Conf]
  12. Grigorios Fragkos, Konstantinos Xynos, Andrew Blyth
    The use of Computers Idle-Time and Parallel Processing Over a Network to Perform Password Threat Assessment. [Citation Graph (0, 0)][DBLP]
    ECIW, 2005, pp:99-106 [Conf]
  13. Lazaros Gymnopoulos, Stefanos Gritzalis
    Introducing Ontology-based Security Policy Management in the Grid. [Citation Graph (0, 0)][DBLP]
    ECIW, 2005, pp:107-116 [Conf]
  14. Richard Hoad, Andrew Blyth
    Electromagnetic (EM) Susceptibility of information Systems - The Need for Em Detection. [Citation Graph (0, 0)][DBLP]
    ECIW, 2005, pp:117-128 [Conf]
  15. Kay Hughes, Simon R. Wiseman
    Analysis of Information Security Risks: Policy for Protection Through to Implementation. [Citation Graph (0, 0)][DBLP]
    ECIW, 2005, pp:129-140 [Conf]
  16. Aki-Mauri Huhtinen
    Pre-emptive Military Action: The Fight for Recipients - War as a Part of Story Society Created by the Media. [Citation Graph (0, 0)][DBLP]
    ECIW, 2005, pp:141-150 [Conf]
  17. William Hutchinson
    The 'Will' and Information Operations. [Citation Graph (0, 0)][DBLP]
    ECIW, 2005, pp:151-156 [Conf]
  18. Lory Kimsoeun, Takakazu Kurokawa, Keisuke Iwai
    Finite Field Parallel Multiplier for FPGA. [Citation Graph (0, 0)][DBLP]
    ECIW, 2005, pp:157-164 [Conf]
  19. Pertti Kuokkanen
    Risk Consequence Analysis as a Part of Anticipatory Decision-Making Using a Bayesian Network. [Citation Graph (0, 0)][DBLP]
    ECIW, 2005, pp:165-174 [Conf]
  20. Rauno Kuusisto, Tuija Kuusisto, Leigh Armistead
    Common Operational Picture, Situation Awareness and Information Operations. [Citation Graph (0, 0)][DBLP]
    ECIW, 2005, pp:175-186 [Conf]
  21. Tuija Kuusisto, Rauno Kuusisto, Terhi Yliniemi
    Information Needs of Strategic Level Decision-Makers in Crisis Situations. [Citation Graph (0, 0)][DBLP]
    ECIW, 2005, pp:187-194 [Conf]
  22. Tara Leweling, Ron Walters
    The Evolution of US Military Conceptions of Information Warfare and Information Operations, 1979-2004: An Initial Report. [Citation Graph (0, 0)][DBLP]
    ECIW, 2005, pp:195-204 [Conf]
  23. David Llamas, Alan Miller, Colin Allison
    An Evaluation Framework for the Analysis of Covert Channels in the TCP/IP Protocol Suite. [Citation Graph (0, 0)][DBLP]
    ECIW, 2005, pp:205-214 [Conf]
  24. Eveline Lubbers
    The Threat Response Spy Files: A Case Study About an Arms Manufacturer, a Private Intelligence Company and Many Infiltrators. [Citation Graph (0, 0)][DBLP]
    ECIW, 2005, pp:215-224 [Conf]
  25. Vivienne Mee, Iain Sutherland
    Windows Event Logs and Their Forensic Usefulness. [Citation Graph (0, 0)][DBLP]
    ECIW, 2005, pp:225-238 [Conf]
  26. Evangelos Moustakas, Penny Duquenoy, C. Ranganathan
    Phish or Treat? Understanding the Tactics and Responses to Electronic Identity Theft on the Internet. [Citation Graph (0, 0)][DBLP]
    ECIW, 2005, pp:239-248 [Conf]
  27. Graeme Pye, Matthew J. Warren
    Australian Commercial - Critical Infrastructure Management Protection. [Citation Graph (0, 0)][DBLP]
    ECIW, 2005, pp:249-360 [Conf]
  28. Jari Rantapelkonen
    Targeting a Warlord - The Challenges of Information Operations in Afghanistan. [Citation Graph (0, 0)][DBLP]
    ECIW, 2005, pp:261-270 [Conf]
  29. Shukor A. Razak, Steven Furnell, Phillip J. Brooke
    A Two-Tier Intrusion Detection System for Mobile Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    ECIW, 2005, pp:271-280 [Conf]
  30. Huw Read, Andrew Blyth
    Visualisation Techniques: Their Application Within Unified Intrusion Detection Systems Data. [Citation Graph (0, 0)][DBLP]
    ECIW, 2005, pp:281-292 [Conf]
  31. Robert Rowlingson
    Inside and out? The Information Security Threat From Insiders. [Citation Graph (0, 0)][DBLP]
    ECIW, 2005, pp:293-302 [Conf]
  32. Lionel Saliou, William J. Buchanan, Jamie Graves, Jose Munoz
    Novel Framework for Automated Security Abstraction, Modelling, Implementation and Verification. [Citation Graph (0, 0)][DBLP]
    ECIW, 2005, pp:303-312 [Conf]
  33. Ville Salmensuu, Joakim Koskela, Teemupekka Virtanen
    Security in Symbian Smartphones: Threats, Needed Functionalities and Existing Implementations. [Citation Graph (0, 0)][DBLP]
    ECIW, 2005, pp:313-324 [Conf]
  34. Corey D. Schou, Dan Kuehl, Leigh Armistead
    Information Operations Education: Lessons Learned from Information Assurance. [Citation Graph (0, 0)][DBLP]
    ECIW, 2005, pp:325-334 [Conf]
  35. Pekka Sillanpää, Mikko Voipio, Teemupekka Virtanen
    Technical Comparison of Domain Keys and Sender ID. [Citation Graph (0, 0)][DBLP]
    ECIW, 2005, pp:335-344 [Conf]
  36. Michael Stubbings
    The use of Balanced Scorecards for Information Security. [Citation Graph (0, 0)][DBLP]
    ECIW, 2005, pp:345-354 [Conf]
  37. Theodore Tryfonas, Vivienne Mee, Iain Sutherland, Paula Thomas
    Distribution of Offensive Material Over Computer Networks: A Research Agenda. [Citation Graph (0, 0)][DBLP]
    ECIW, 2005, pp:355-362 [Conf]
  38. Craig Valli
    Issues Relating to the Forensics Analysis of PDA and Telephony (PDAT) Enabled Devices. [Citation Graph (0, 0)][DBLP]
    ECIW, 2005, pp:363-368 [Conf]
  39. Stilianos Vidalis, Andrew Jones
    Analyzing Threat Agents and Their Attributes. [Citation Graph (0, 0)][DBLP]
    ECIW, 2005, pp:369-380 [Conf]
  40. Mikko Voipio
    Mail Stream Analysis Using Self-Organizing Map. [Citation Graph (0, 0)][DBLP]
    ECIW, 2005, pp:381-390 [Conf]
  41. Ken Webb
    Is There a Need for Enhancing National Security Against Terrorists Conducting Information Warfare? A Confident Performance for Australia Context. [Citation Graph (0, 0)][DBLP]
    ECIW, 2005, pp:391-400 [Conf]
  42. Patricia A. H. Williams
    Where are the Policies for PDA Usage in the Australian Healthcare Environment? [Citation Graph (0, 0)][DBLP]
    ECIW, 2005, pp:401-408 [Conf]
  43. Tom Wilsdon, Jill Slay
    Towards A Validation Framework for Forensic Computing Tools in Australia. [Citation Graph (0, 0)][DBLP]
    ECIW, 2005, pp:409-414 [Conf]
  44. Omar Zakaria
    Information Security Culture and Leadership. [Citation Graph (0, 0)][DBLP]
    ECIW, 2005, pp:415-0 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002