(0 Item)

The 10th European Conference on Information Warfare and Security

Academic Conferences - The 10th European Conference on Information Warfare and Security
Academic Conferences

By : Academic Conferences Limited

Date : 2011

Location : Estonia / Tallinn

PDF 78p
Description :

The Conference on Information Warfare and Information Security illustrated the depth of the information operations’ research area, with the subject matter ranging from the highly technical to the more strategic visions of the use and influence of information.

Keywords :

information warfare, information security, cyber defence

Keywords inside documents :

security ,cyber ,systems ,paper ,computer ,based ,technology ,keywords ,abstract ,system ,internet ,critical ,infrastructure ,mobile ,analysis

Product/ documentation details
The 10th European Conference on Information Warfare and Security

Company Description : The document contains the abstracts and biographies of the 10th European Conference on Information Warfare and Security as per the description.

Product Type : Academic Proceedings

Author : Rain Ottis

PDF 78p

Languages : English

 

 

The Conference brought together individuals working in the area of Information Warfare and Information Security in order to share knowledge and develop new ideas with their peers.

 

The 10th European Conference on Information Warfare and Security (ECIW 2011), was hosted by the Institute of Cybernetics (IoC) at Tallinn University of Technology in collaboration with the Cooperative Cyber Defence Centre of Excellence (CCD COE) in Tallinn, Estonia.

 

The Conference Chair was Vahur Kotkas from IoC.

 

The opening keynote was given by Mr Raul Rebane from StratCom and the second day will be opened by Prof Enn Tyugu from CCD COE and IoC.

Paper Title

Author(s)

Guide Page

Page No.

Preface

 

vii

iv

Biographies of Conference Chairs, Programme Chair, Keynote Speaker and Mini-track Chairs

 

viii

v

Biographies of contributing authors

 

x

vi

Legitimate Defenses Against Dangerous Archenemies. The Justifications by U.S. Presidents for the Initiation of Military Operations in the Persian Gulf and Kosovo, 1991-2003

Kari Alenius

1

1

Use of Compression Methods for Data Security Assurance

Dominic Asamoah and William Oblitey

1

6

Cyber Security: Time for Engagement and Debate

Debi Ashenden

2

11

This is not a Cyber war, its a...? Wikileaks, Anonymous and the Politics of Hegemony

David Barnard-Wills

3

17

Potential Threats of UAS Swarms and the Countermeasure’s Need

Laurent Beaudoin, Antoine Gademer, Loica Avanthey, Vincent Germain and Vincent Vittori

4

24

Developing Intelligence in the Field of Financing Terror - an Analytical Model of Anti-Terror Inter Agency and Cross Border Cooperation: The Security of Financial Systems Dimension

Alexander Bligh

4

31

A Secure Architecture for Electronic Ticketing Based on the Portuguese e-ID Card

Paul Crocker and Vasco Nicolau

5

38

Evaluation of the Armed Forces Websites of the European Countries

Pedro Cunha, Parcídio Gonçalves, Vítor Sá, Sérgio Tenreiro de Magalhães and Miguel Pimenta

6

50

Estonia After the 2007 Cyber Attacks: Legal, Strategic and Organisational Changes in Cyber Security

Christian Czosseck, Rain Ottis and Anna-Maria Talihärm

7

57

An Usage-Centric Botnet Taxonomy

Christian Czosseck and Karlis Podins

8

65

User-Centric Information Security Systems - A Living lab Approach

Moses Dlamini, Jan Eloff, Marek Zielinksi, Jason Chuang1 and Danie Smit

9

73

Intrusion Detection Through Keystroke Dynamics

João Ferreira, Henrique Santos and Bernardo Patrão

9

81

The Computer Security of Public/Open Computer Spaces: Feedback of a Field Study in Europe

Eric Filiol

10

91

Perverting eMails: A new Dimension in Internet (in)Security

Eric Filiol, Jonathan Dechaux and Jean-Paul Fizaine

11

106

Evaluating Cyber Security Awareness in South Africa

Marthie Grobler, Joey Jansen van Vuuren and Jannie Zaaiman

12

113

Missionaries of Peace – The Creation of the Italian Identity in the Representation of the Political Discussion in Favour of Italy’s Participation in the Iraq War in Il Corriere della Sera

Marja Härmänmaa

13

122

Thoughts of war Theorists on Information Operations

Arto Hirvelä

14

127

Live-Action Role-Play as a Scenario-Based Training Tool for Security and Emergency Services

Sara Hjalmarsson

14

132

Computer Games as the Representation of Military Information Operations – A Philosophical Description of Cyborgizing of Propaganda Warfare

Aki-Mauri Huhtinen

16

141

Information Security Culture or Information Safety Culture – What do Words Convey?

Ilona Ilvonen

17

148

Strategic Communication and Revolution in Military Affairs: Describing Actions and Effects

Saara Jantunen

18

155

A Case-Study on American Perspectives on Cyber and Security

Saara Jantunen and Aki-Mauri Huhtinen

18

163

Evolutionary Algorithms for Optimal Selection of Security Measures

Jüri Kivimaa and Toomas Kirt

19

172

Botnet Detection: A Numerical and Heuristic Analysis

Luís Mendonça and Henrique Santos

20

185

Analysis and Modelling of Critical Infrastructure Systems

Graeme Pye and Matthew Warren

21

194

Modelling Relational Aspects of Critical Infrastructure Systems

Graeme Pye and Matthew Warren

21

202

A Study on Cyber Secured eGovernance in an Educational Institute: Performance and User Satisfaction

Kasi Raju

22

211

Steps towards Monitoring Cyberarms Compliance

Neil Rowe, Simson Garfinkel, Robert Beverl, and Panayotis Yannakogeorgos

22

221

Distributed Denial of Service Attacks as Threat Vectors to Economic Infrastructure: Motives, Estimated Losses and Defense Against the HTTP/1.1 GET and SYN Floods Nightmares

Libor Sarga and Roman Jašek

23

228

Legal Protection of Digital Information in the era of Information Warfare

Małgorzata Skórzewska-Amberg

24

237

Criteria for a Personal Information Security Agent

Ewald Stieger and Rossouw von Solms

25

245

International Criminal Cooperation in the Context of Cyber Incidents

Anna-Maria Talihärm

26

253

Methods for Detecting Important Events and Knowledge From Data Security Logs

Risto Vaarandi

27

261

Locating the Enemy

Marja Vuorinen

28

267

Australian National Critical Infrastructure Protection: A Case Study

Matthew Warren and Shona Leitch

29

375

PhD Papers

31

281

Security Considerations for Virtual Platform Provisioning

Mudassar Aslam and Christian Gehrmann

33

283

A Mobile and Quick Terrorism

Anthony Desnos and Geoffroy Gueguen

34

291

Regulatory Compliance to Ensure Information Security: Financial Supervision Perspective

Andro Kull

34

298

Behaviour Profiling for Transparent Authentication for Mobile Devices

Fudong Li, Nathan Clarke, Maria Papadaki and Paul Dowland

36

307

Description of a Practical Application of an Information Security Audit Framework

Teresa Pereira and Henrique Santos

37

315

Fight Over Images of the State Armed Forces and Private Security Contractors

Mirva Salminen

37

323

Non Academics

39

331

A Proposal for Domain Name System (DNS) Security Metrics Framework

Andrea Rigoni and Salvatore Di Blasi

41

333

Work in progress

43

337

Malicious Flash Crash Attacks by Quote Stuffing: This is the way the (Financial) World Could end

Robert Erra

45

339

Posters

47

 

Assessment of Mission Risk; Role of Protection of Information and Communication Technology Resources

Joobin Choobineh, Evan Anderson and Michael Grimaila

 

49

 

Constantly Evolving Cybercrime Forensic Challenges

Abhaya Induruwa

49

 

Finding Patterns in the Alerts of Intrusion Detection Systems

Francisco Ribeiro and Henrique Santos

50

 

Presentation Only

53

 

The Image of the Afghan War Visual Strategic Communication Narratives of the Isaf-Operation

Noora Kotilainen

 

54

 

Cloud-Based Shared Mental Model in Cyber Criminals

Daniel Ching Wa Ng

55

         

 

The 10th European Conference on Information Warfare and Security

Company Description : The document contains the abstracts and biographies of the 10th European Conference on Information Warfare and Security as per the description.

Product Type : Academic Proceedings

Author : Rain Ottis

PDF 78p

Languages : English

Organizer : Academic Conferences Limited

Academic Conferences International (ACI) is based near Reading, South Oxfordshire in the UK with a North American office in Montreal, Canada. ACI operates on a world-wide basis, holding conferences in Continental Europe, North and South America, the Middle East and Africa. The primary service provided by ACI is the management of academic conferences on behalf of universities and other higher education institutions. Once a call for papers has closed they arrange for them to be checked for appropriateness and then send selected authors a notification inviting them to submit a full paper. On receipt of full papers they distribute them out to members of the programme committee for double blind reviewing. They receive the reviewers’ comments and pass them onto the authors. Once a paper has been accepted for publication and presentation at the conference they prepare and publish the conference proceedings, both in electronic and paper form.