ECIW 2009
   ECIW 2008 Home
   Biographies
   Committee
   Photo Gallery
   Proceedings 2008
   Programme
   Venue Information
   ECIW Future
   ECIW Past
   Research Seminars
   Publishers
   Sponsorship and
   Exhibitor Information
   About ACI
ECIW 2008
Home >> ECIW >> ECIW 2008 >> eciw08-proceedings
WWW ACI   At a glance Calendar Contact us

Proceedings of ECIW 2008
The 7th European Conference on Information Warfare and Security
held at the University of Plymouth, UK
30 June – 1 July 2008

 

The proceedings for this conference are listed on the Index to Scientific and Technical Proceedings (ISTP/ISI Proceedings), the Index to Social Sciences & Humanities Proceedings (ISSHP) and the Index to Social Sciences & Humanities Proceedings (ISSHP/ISI Proceedings).

 

 

The proceedings of the above conference are now available to purchase in two formats, Book or CD-ROM:

UK AND EUROPE: Cost, including post and packing is £60.00

REST OF THE WORLD: Cost, including post and packing is £65.00

Cost for CD is £50, including post and packing, to UK and Europe and £55 to anywhere else in the world.


The Contents of the Proceedings are shown below.

If you would like to download and read the Abstracts of the papers presented at the Conference, please click here

To order the Proceedings, please click here

Search the full text of this proceedings


 

 

Paper Title

Author(s)

Page No.

Preface

 

iv

Biographies of Conference Chairs, Programme Chair, Keynote Speaker and Mini-track Chairs

 

vi

Biographies of contributing authors

 

vii

SANAsms: Secure Short Messaging System for Secure GSM Mobile Communication

Nor Badrul Anuar, Muhammad Azlan Ibrahim, Ainuddin Wahid Abdul Wahab and Omar Zakaria
University of Malaya, Kuala Lumpur, Malaysia

1-6

Information Security at Airports

Katalin Emese Bite
Budapest University of Technology and Economics, Hungary

7-16

A Multi-layered Security Architecture for Modelling Critical Infrastructure

Clive Blackwell
Royal Holloway, University of London, Egham, UK

17-24

NetS-X - The Network Security Experience

Alice Boit, Helmut Eirund, Thomas Geimer, Joao Collier de Mendonca, Alexander Ott, and Richard Sethmann
University of Applied Sciences Bremen, Germany

25-34

A Study on the Security of RFID with Enhancing Privacy Protection

Henry Ker-Chang Chang, Li-Chih Yen and Wen-Chi Huang
Chang Gung University Tao-Yuan Taiwan, ROC

35-40

Hacking the Human: Countering the Socially Engineered Attack

Andrea Cullen1 and Ian Mann2
1
University of Bradford UK
2ECSC Ltd Bradford UK

41-50

Malware Analysis: The Art of Detecting Malicious Activities

Fadi El-moussa and Andy Jones
BT Security Research Centre, Adastral Park, Ipswich, UK

51-60

Malware-Based Information Leakage Over IPSEC Tunnels

Eric Filiol1, Frédéric Jennequin1  and Delaunay Guillaume2
1Army Signals Academy (ESAT)
Rennes France
2Université Rennes I, Saint-Malo France

61-70

Towards Fit for Purpose Security in Military Systems

Linda Finch and Richard Vaughan
General Dynamics United Kingdom Limited, Newbridge ,UK

71-80

A Simple Metric for Interdependencies in the Technological Networks

Vincenzo Fioriti and Annamaria Fioriti
Ente per le Nuove Tecnologie, l’Energia e l’Ambiente Roma, Italy

81-86

3D Tactics and Information Deception

Chris Flaherty
Visiting Fellow, University of New South Wales, Australia

87-94

Malicious Electromagnetic (EM) Threats to Information Processing Installations – How do we Respond and Protect?

Richard Hoad1 and Iain Sutherland2
1QinetiQ Ltd, Farnborough, UK
2University of Glamorgan, Wales, UK

95-102

Propaganda Dilemmas for Environmental Security

William Hutchinson
Edith Cowan University Perth Australia

103-110

Ensuring Privacy in a Network Centric Environment

Anssi Kärkkäinen and Catharina Candolin
The Finnish Defence Forces Helsinki Finland

111-118

Validation of 1-N OT Algorithms in Privacy-Preserving Investigations

Zbigniew Kwecka, William Buchanan, Duncan Spiers and Lionel Saliou
School of Computing, Napier University, Edinburgh, UK

119-128

Publication of Ministry of Defence Strategy As a Semiotic Sign

Marko Laaksonen
National Defence University Helsinki Finland

129-136

The Finnish Defence Forces C4ISR System from Systems Thinking Perspective

Martti Lehto
National Defense University Helsinki, Finland

137-144

Unknown Malicious Code Detection – Practical Issues

Robert Moskovitch and Yuval Elovici
Ben Gurion University, Beer Sheva, Israel

145-152

“Where you are” Based Authentication: An Improved Security Protocol Using BAN Logic

Nabih Abdelmajid 1, Hossain Alamgir 1, Simon Shepherd1, and Khaded Mahmoud2
1University of Bradford, UK
2Zarqa Private University, Jordan

153-162

Analysis of the 2007 Cyber Attacks Against Estonia from the Information Warfare Perspective

Rain Ottis
Cooperative Cyber Defence Centre of Excellence, Tallinn, Estonia

163-168

An Ontology Based Approach to Data Surveillance

Teresa Pereira1 and Henrique Santos2
1
Polytechnic Institute of Viana do Castelo Valença Portugal
2University of Minho Guimarães, Portugal

169-174

Is a Computational Grid a Suitable Platform or High Performance Digital Forensics?

Nick Pringle and Iain Sutherland
University of Glamorgan Wales UK

175-184

Considerations for Modelling Critical Infrastructure Systems

Graeme Pye and Matthew Warren
Deakin University, Geelong, Australia

185-196

Operational Security, Manipulation of Information, and Decision-Making in Network-Enabled Warfare

Petri Siivonen
Finnish CIS School, Signals Regiment, Finland

197-202

Structured Textual Data Monitoring Based on a Rough Set Classifier

Sérgio Tenreiro de Magalhães1, Leonel Santos2, Luís Amaral2, Henrique Santos2, Kenneth Revett3, and Hamid Jahankhani4
1Universidade Católica Portuguesa Braga Portugal
2University of Minho Guimarães Portugal
3University of Westminster London, UK
4University of East London UK

203-210

Electronic Activism: Threats, Implications and Responses

Allen Wareham1 and Steven Furnell1, 2
1
University of Plymouth UK
2Edith Cowan University Perth Australia

211-218

Can an Adapted Clinical Governance Model be used to Improve Medical Information Security?

Patricia Williams
Edith Cowan University, Perth, Australia

219-228

A Modular Data Mining Architecture for Intrusion Detection Systems’ Data

Konstantinos Xynos and Andrew Blyth
University of Glamorgan, Wales, UK

229-237

 

Updated 2 July 2008

Academic Conferences Limited - Curtis Farm, Kidmore End, Nr Reading, RG4 9AY, England - Tel: +44 (0)1189 724148 - Fax: +44 (0)1189 724691
eMail: info@academic-conferences.org- Copyright 2008 Academic Conferences Limited - registered in England - No: 4719488 - VAT No: 812 5366 38