3rd European Conference on Information Warfare and Security : Royal Holloway, University of London, UK, 28 - 29 June 2004 ; [ECIW 2004] (English)
- New search for: Royal Holloway
- Further information on Royal Holloway:
- http://d-nb.info/gnd/5127949-6
- New search for: Jones, Andy
- New search for: Royal Holloway
- Further information on Royal Holloway:
- http://d-nb.info/gnd/5127949-6
2004
-
ISBN:
- Conference Proceedings / Print
-
Title:3rd European Conference on Information Warfare and Security : Royal Holloway, University of London, UK, 28 - 29 June 2004 ; [ECIW 2004]
-
Additional title:Proceedings of 3rd European Conference on Information Warfare and Security
-
Contributors:
-
Conference:European Conference on Information Warfare and Security ; 3 ; 2004 ; London
ECIW ; 3 ; 2004 ; London -
Publisher:
- New search for: Academic Conferences
-
Place of publication:Reading
-
Publication date:2004
-
Size:X, 399 S.
-
ISBN:
-
Type of media:Conference Proceedings
-
Type of material:Print
-
Language:English
- New search for: 54.38
- Further information on Basic classification
-
Keywords:
-
Classification:
BKL: 54.38 Computersicherheit -
Source:
Table of contents conference proceedings
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 1
-
Analysis and Detection of Cruising Computer VirusesAbimbola, A. / Munoz, J. M. / Buchanan, W. J. et al. | 2004
- 9
-
Enabling Network-centric Warfare by Securing the Core InfrastructureAho, P. / Candolin, C. et al. | 2004
- 15
-
Information Warfare Action Plans for e-BusinessBaskerville, R. et al. | 2004
- 21
-
A Model for Detecting Malicious GroupsBraynov, S. et al. | 2004
- 31
-
Covert Channel Analysis and Detection with Reverse Proxy Servers using Microsoft WindowsBuchanan, W. J. / Llamas, D. et al. | 2004
- 41
-
Cyberterrorism: Academic PerspectivesConway, M. et al. | 2004
- 51
-
Towards a Real-time Solution to the Security Threats Posed by Authorised InsidersCorzo, C. / Zhang, N. et al. | 2004
- 61
-
Information Warfare and Human Rights LawDarnton, G. et al. | 2004
- 71
-
Factors Affecting the Adoption of IT Risk AnalysisDimopoulos, V. / Furnell, S. / Barlow, I. / Lines, B. et al. | 2004
- 81
-
PIFF: Personnel Identification Friend or FoeGleason, K. M. et al. | 2004
- 89
-
The Last Mile: Applying Traditional Methods for Perpetrator Identification in Forensic Computing InvestigationsHannan, M. / Turner, P. et al. | 2004
- 97
-
The Implications of Hardware Encryption Devices on Forensic Computing InvestigationsHannan, M. / Wilsdon, T. et al. | 2004
- 109
-
Quantifying Assurance of Knowledge Based AuthenticationHastings, N. E. / Dodson, D. F. et al. | 2004
- 117
-
An Internet Attack Early Warning Database in FinlandHeinonen, A. / Virtanen, T. et al. | 2004
- 125
-
US Television: Militarising the Civilian American After 9/11Himberg, J. B. et al. | 2004
- 129
-
Electromagnetic (EM) Threats to Information Security - Applicability of the EMC Directive and Information Security GuidelinesHoad, R. / Jones, A. et al. | 2004
- 139
-
Shaping the Information Space for Law EnforcementHorne, B. et al. | 2004
- 147
-
The Use of Network Centric Warfare by Non-State ActorsHu, C. et al. | 2004
- 157
-
Soldiers as Politicians - The Fabric of True PRHuhtinen, A.-M. et al. | 2004
- 165
-
The Influence of Maskirovka on Contemporary Western Deception Theory and PracticeHutchinson, W. et al. | 2004
- 175
-
Where is the Information/Evidence Hidden in the System?Jones, A. / Meyler, C. et al. | 2004
- 183
-
The Importance of Deploying Deception Techniques in an Information Operations (IO) EnvironmentKazmi, Z. / Jones, A. et al. | 2004
- 189
-
Identity Theft - How Well are the Irish Protecting Themselves?Keaney, A. / Remenyi, D. et al. | 2004
- 199
-
FPGA Implementations of Symmetric-Key Cryptographic Techniques in CRYPTREC Recommended ListKurokawa, T. / Yamazaki, Y. / Kwon, O. et al. | 2004
- 211
-
Situation Officer as a Decisive Enabler - Theoretical Framework to Analyse Information Flows and ActionKuusisto, R. / Huhtakallio, J. / Kuusisto, T. et al. | 2004
- 221
-
Unite Security Culture: May a unified security culture be plausible?Kuusisto, R. / Nyberg, K. / Virtanen, T. et al. | 2004
- 231
-
System Approach to Information OperationsKuusisto, T. / Kuusisto, R. / Armistead, L. et al. | 2004
- 241
-
A Conceptual Framework of Critical InformationKuusisto, T. / Kuusisto, R. / Hyytiainen, M. et al. | 2004
- 249
-
Critical Infrastructure Protection: Comparison of CountriesMarasea, P. / Warren, M. et al. | 2004
- 261
-
A Proposed Implementation of a Real-time Intrusion Prevention System for Commercial Enterprise DatabasesMattsson, U. et al. | 2004
- 269
-
`Masquerade' Attacks and a Process for Their DetectionMelnikov, D. A. / Jones, A. et al. | 2004
- 279
-
Static Image Data Hiding and Encryption MethodMelnikov, D. A. / Jones, A. et al. | 2004
- 285
-
Using I-TRIZ for Failure Prediction in e-Surveillance and Interception Intelligence Systems: The Case of Information Overload as a Potential `Weapon of the weak' in Future Information WarfareMizrachi, Y. et al. | 2004
- 295
-
FIDES - A Middleware e-Commerce Security SolutionNenadic, A. / Zhang, N. / Barton, S. et al. | 2004
- 305
-
Future Challenges for Information Security - Issues for LawmakersNisbet, C. et al. | 2004
- 311
-
The Threat of Electronic Terrorism: The Perceptions of Australian Essential Infrastructure EnvironmentsOlding, A. / de Salas, K. et al. | 2004
- 317
-
Anonymising Data in a Peer-To-Peer Based Distributed Intrusion Detection System - A Possible ApproachPilgermann, M. / Blyth, A. et al. | 2004
- 327
-
With PRT's in Afghanistan, Armed Forces Roll Into New Information FrontRantapelkonen, J. et al. | 2004
- 337
-
Perceptions and Risks of RMA and Information Warfare to ThailandRattanaphol, J. / Darnton, G. et al. | 2004
- 347
-
An Investigation of the Effect of Work Place Culture on the Security of User PasswordsSlay, J. / Drymalik, C. et al. | 2004
- 359
-
WITS - Wireless Intrusion Tracking SystemValli, C. et al. | 2004
- 365
-
Wireless Jacks - An Analysis of 802.11 Wireless Denial of Service Attacks and HijacksWoodward, A. et al. | 2004
- 371
-
OHT-Online-HTML Tracer for Detecting Terrorist Activities on the WebZaafrany, O. / Shapira, B. / Elovici, Y. / Last, M. / Kandel, A. / Schneider, M. / Friedman, M. et al. | 2004
- 379
-
Information Security Culture: A Taxonomy of Positive Security BehaviourZakaria, O. et al. | 2004
- 387
-
Theory Versus Practice - Insights From the Approaches of Tasmanian Businesses to the Implementation of Information SecurityZimmerli, M. / de Salas, K. et al. | 2004