Conferences in DBLP
Debi Ashenden Governance Principles for Sharing Information in the Network Enabled Capability (NEC) Environment. [Citation Graph (0, 0)][DBLP ] ECIW, 2005, pp:1-8 [Conf ] Nikolaos Avourdiadis , Andrew Blyth Data Unification and Data Fusion of Intrusion Detection Logs in a Network Centric Environment. [Citation Graph (0, 0)][DBLP ] ECIW, 2005, pp:9-20 [Conf ] Theodoros Balopoulos , Stelios Dritsas , Lazaros Gymnopoulos , Maria Karyda , Spyros Kokolakis , Stefanos Gritzalis Incorporating Security Requirements Into the Software Development Process. [Citation Graph (0, 0)][DBLP ] ECIW, 2005, pp:21-28 [Conf ] Richard Baskerville , Robert Sainsbury Securing Against the Possibility of an Improbable Event: Concepts for Managing Predictable Threats and Normal Compromises. [Citation Graph (0, 0)][DBLP ] ECIW, 2005, pp:29-38 [Conf ] Barry Blundell , Huang Xiao Dong , Jill Slay , Benjamin Turnbull , Tom Wilsdon Development of a "Zero-Skills" Forensic Laptop Registration and Identification Tool. [Citation Graph (0, 0)][DBLP ] ECIW, 2005, pp:39-46 [Conf ] William J. Buchanan , Jamie Graves , Lionel Saliou , H. Al Sebea , Nikos Migas Agent-based Forensic Investigations with an Integrated Framework. [Citation Graph (0, 0)][DBLP ] ECIW, 2005, pp:47-52 [Conf ] T. B. Busuttil , Matthew J. Warren An Approach for Critical Information Infrastructure Protection. [Citation Graph (0, 0)][DBLP ] ECIW, 2005, pp:53-62 [Conf ] Catharina Candolin Securing the Infrastructure in Information Operations. [Citation Graph (0, 0)][DBLP ] ECIW, 2005, pp:63-72 [Conf ] Geoffrey Darnton Content Analysis as a Tool of Information Warfare. [Citation Graph (0, 0)][DBLP ] ECIW, 2005, pp:73-82 [Conf ] Marios Panagiotis Efthymiopoulos Is NATO in Need of a Renewed Security Concept? [Citation Graph (0, 0)][DBLP ] ECIW, 2005, pp:83-90 [Conf ] Grigorios Fragkos , Andrew Blyth Architecture for Near Real-Time Threat Assessment Using IDS Data. [Citation Graph (0, 0)][DBLP ] ECIW, 2005, pp:91-98 [Conf ] Grigorios Fragkos , Konstantinos Xynos , Andrew Blyth The use of Computers Idle-Time and Parallel Processing Over a Network to Perform Password Threat Assessment. [Citation Graph (0, 0)][DBLP ] ECIW, 2005, pp:99-106 [Conf ] Lazaros Gymnopoulos , Stefanos Gritzalis Introducing Ontology-based Security Policy Management in the Grid. [Citation Graph (0, 0)][DBLP ] ECIW, 2005, pp:107-116 [Conf ] Richard Hoad , Andrew Blyth Electromagnetic (EM) Susceptibility of information Systems - The Need for Em Detection. [Citation Graph (0, 0)][DBLP ] ECIW, 2005, pp:117-128 [Conf ] Kay Hughes , Simon R. Wiseman Analysis of Information Security Risks: Policy for Protection Through to Implementation. [Citation Graph (0, 0)][DBLP ] ECIW, 2005, pp:129-140 [Conf ] Aki-Mauri Huhtinen Pre-emptive Military Action: The Fight for Recipients - War as a Part of Story Society Created by the Media. [Citation Graph (0, 0)][DBLP ] ECIW, 2005, pp:141-150 [Conf ] William Hutchinson The 'Will' and Information Operations. [Citation Graph (0, 0)][DBLP ] ECIW, 2005, pp:151-156 [Conf ] Lory Kimsoeun , Takakazu Kurokawa , Keisuke Iwai Finite Field Parallel Multiplier for FPGA. [Citation Graph (0, 0)][DBLP ] ECIW, 2005, pp:157-164 [Conf ] Pertti Kuokkanen Risk Consequence Analysis as a Part of Anticipatory Decision-Making Using a Bayesian Network. [Citation Graph (0, 0)][DBLP ] ECIW, 2005, pp:165-174 [Conf ] Rauno Kuusisto , Tuija Kuusisto , Leigh Armistead Common Operational Picture, Situation Awareness and Information Operations. [Citation Graph (0, 0)][DBLP ] ECIW, 2005, pp:175-186 [Conf ] Tuija Kuusisto , Rauno Kuusisto , Terhi Yliniemi Information Needs of Strategic Level Decision-Makers in Crisis Situations. [Citation Graph (0, 0)][DBLP ] ECIW, 2005, pp:187-194 [Conf ] Tara Leweling , Ron Walters The Evolution of US Military Conceptions of Information Warfare and Information Operations, 1979-2004: An Initial Report. [Citation Graph (0, 0)][DBLP ] ECIW, 2005, pp:195-204 [Conf ] David Llamas , Alan Miller , Colin Allison An Evaluation Framework for the Analysis of Covert Channels in the TCP/IP Protocol Suite. [Citation Graph (0, 0)][DBLP ] ECIW, 2005, pp:205-214 [Conf ] Eveline Lubbers The Threat Response Spy Files: A Case Study About an Arms Manufacturer, a Private Intelligence Company and Many Infiltrators. [Citation Graph (0, 0)][DBLP ] ECIW, 2005, pp:215-224 [Conf ] Vivienne Mee , Iain Sutherland Windows Event Logs and Their Forensic Usefulness. [Citation Graph (0, 0)][DBLP ] ECIW, 2005, pp:225-238 [Conf ] Evangelos Moustakas , Penny Duquenoy , C. Ranganathan Phish or Treat? Understanding the Tactics and Responses to Electronic Identity Theft on the Internet. [Citation Graph (0, 0)][DBLP ] ECIW, 2005, pp:239-248 [Conf ] Graeme Pye , Matthew J. Warren Australian Commercial - Critical Infrastructure Management Protection. [Citation Graph (0, 0)][DBLP ] ECIW, 2005, pp:249-360 [Conf ] Jari Rantapelkonen Targeting a Warlord - The Challenges of Information Operations in Afghanistan. [Citation Graph (0, 0)][DBLP ] ECIW, 2005, pp:261-270 [Conf ] Shukor A. Razak , Steven Furnell , Phillip J. Brooke A Two-Tier Intrusion Detection System for Mobile Ad Hoc Networks. [Citation Graph (0, 0)][DBLP ] ECIW, 2005, pp:271-280 [Conf ] Huw Read , Andrew Blyth Visualisation Techniques: Their Application Within Unified Intrusion Detection Systems Data. [Citation Graph (0, 0)][DBLP ] ECIW, 2005, pp:281-292 [Conf ] Robert Rowlingson Inside and out? The Information Security Threat From Insiders. [Citation Graph (0, 0)][DBLP ] ECIW, 2005, pp:293-302 [Conf ] Lionel Saliou , William J. Buchanan , Jamie Graves , Jose Munoz Novel Framework for Automated Security Abstraction, Modelling, Implementation and Verification. [Citation Graph (0, 0)][DBLP ] ECIW, 2005, pp:303-312 [Conf ] Ville Salmensuu , Joakim Koskela , Teemupekka Virtanen Security in Symbian Smartphones: Threats, Needed Functionalities and Existing Implementations. [Citation Graph (0, 0)][DBLP ] ECIW, 2005, pp:313-324 [Conf ] Corey D. Schou , Dan Kuehl , Leigh Armistead Information Operations Education: Lessons Learned from Information Assurance. [Citation Graph (0, 0)][DBLP ] ECIW, 2005, pp:325-334 [Conf ] Pekka Sillanpää , Mikko Voipio , Teemupekka Virtanen Technical Comparison of Domain Keys and Sender ID. [Citation Graph (0, 0)][DBLP ] ECIW, 2005, pp:335-344 [Conf ] Michael Stubbings The use of Balanced Scorecards for Information Security. [Citation Graph (0, 0)][DBLP ] ECIW, 2005, pp:345-354 [Conf ] Theodore Tryfonas , Vivienne Mee , Iain Sutherland , Paula Thomas Distribution of Offensive Material Over Computer Networks: A Research Agenda. [Citation Graph (0, 0)][DBLP ] ECIW, 2005, pp:355-362 [Conf ] Craig Valli Issues Relating to the Forensics Analysis of PDA and Telephony (PDAT) Enabled Devices. [Citation Graph (0, 0)][DBLP ] ECIW, 2005, pp:363-368 [Conf ] Stilianos Vidalis , Andrew Jones Analyzing Threat Agents and Their Attributes. [Citation Graph (0, 0)][DBLP ] ECIW, 2005, pp:369-380 [Conf ] Mikko Voipio Mail Stream Analysis Using Self-Organizing Map. [Citation Graph (0, 0)][DBLP ] ECIW, 2005, pp:381-390 [Conf ] Ken Webb Is There a Need for Enhancing National Security Against Terrorists Conducting Information Warfare? A Confident Performance for Australia Context. [Citation Graph (0, 0)][DBLP ] ECIW, 2005, pp:391-400 [Conf ] Patricia A. H. Williams Where are the Policies for PDA Usage in the Australian Healthcare Environment? [Citation Graph (0, 0)][DBLP ] ECIW, 2005, pp:401-408 [Conf ] Tom Wilsdon , Jill Slay Towards A Validation Framework for Forensic Computing Tools in Australia. [Citation Graph (0, 0)][DBLP ] ECIW, 2005, pp:409-414 [Conf ] Omar Zakaria Information Security Culture and Leadership. [Citation Graph (0, 0)][DBLP ] ECIW, 2005, pp:415-0 [Conf ]